#! /bin/sh
# Generated from testsuite.at by GNU Autoconf 2.69.
#
# Copyright (C) 2009-2012 Free Software Foundation, Inc.
#
# This test suite is free software; the Free Software Foundation gives
# unlimited permission to copy, distribute and modify it.
## -------------------- ##
## M4sh Initialization. ##
## -------------------- ##

# Be more Bourne compatible
DUALCASE=1; export DUALCASE # for MKS sh
if test -n "${ZSH_VERSION+set}" && (emulate sh) >/dev/null 2>&1; then :
  emulate sh
  NULLCMD=:
  # Pre-4.2 versions of Zsh do word splitting on ${1+"$@"}, which
  # is contrary to our usage.  Disable this feature.
  alias -g '${1+"$@"}'='"$@"'
  setopt NO_GLOB_SUBST
else
  case `(set -o) 2>/dev/null` in #(
  *posix*) :
    set -o posix ;; #(
  *) :
     ;;
esac
fi


as_nl='
'
export as_nl
# Printing a long string crashes Solaris 7 /usr/bin/printf.
as_echo='\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\'
as_echo=$as_echo$as_echo$as_echo$as_echo$as_echo
as_echo=$as_echo$as_echo$as_echo$as_echo$as_echo$as_echo
# Prefer a ksh shell builtin over an external printf program on Solaris,
# but without wasting forks for bash or zsh.
if test -z "$BASH_VERSION$ZSH_VERSION" \
    && (test "X`print -r -- $as_echo`" = "X$as_echo") 2>/dev/null; then
  as_echo='print -r --'
  as_echo_n='print -rn --'
elif (test "X`printf %s $as_echo`" = "X$as_echo") 2>/dev/null; then
  as_echo='printf %s\n'
  as_echo_n='printf %s'
else
  if test "X`(/usr/ucb/echo -n -n $as_echo) 2>/dev/null`" = "X-n $as_echo"; then
    as_echo_body='eval /usr/ucb/echo -n "$1$as_nl"'
    as_echo_n='/usr/ucb/echo -n'
  else
    as_echo_body='eval expr "X$1" : "X\\(.*\\)"'
    as_echo_n_body='eval
      arg=$1;
      case $arg in #(
      *"$as_nl"*)
	expr "X$arg" : "X\\(.*\\)$as_nl";
	arg=`expr "X$arg" : ".*$as_nl\\(.*\\)"`;;
      esac;
      expr "X$arg" : "X\\(.*\\)" | tr -d "$as_nl"
    '
    export as_echo_n_body
    as_echo_n='sh -c $as_echo_n_body as_echo'
  fi
  export as_echo_body
  as_echo='sh -c $as_echo_body as_echo'
fi

# The user is always right.
if test "${PATH_SEPARATOR+set}" != set; then
  PATH_SEPARATOR=:
  (PATH='/bin;/bin'; FPATH=$PATH; sh -c :) >/dev/null 2>&1 && {
    (PATH='/bin:/bin'; FPATH=$PATH; sh -c :) >/dev/null 2>&1 ||
      PATH_SEPARATOR=';'
  }
fi


# IFS
# We need space, tab and new line, in precisely that order.  Quoting is
# there to prevent editors from complaining about space-tab.
# (If _AS_PATH_WALK were called with IFS unset, it would disable word
# splitting by setting IFS to empty value.)
IFS=" ""	$as_nl"

# Find who we are.  Look in the path if we contain no directory separator.
as_myself=
case $0 in #((
  *[\\/]* ) as_myself=$0 ;;
  *) as_save_IFS=$IFS; IFS=$PATH_SEPARATOR
for as_dir in $PATH
do
  IFS=$as_save_IFS
  test -z "$as_dir" && as_dir=.
    test -r "$as_dir/$0" && as_myself=$as_dir/$0 && break
  done
IFS=$as_save_IFS

     ;;
esac
# We did not find ourselves, most probably we were run as `sh COMMAND'
# in which case we are not to be found in the path.
if test "x$as_myself" = x; then
  as_myself=$0
fi
if test ! -f "$as_myself"; then
  $as_echo "$as_myself: error: cannot find myself; rerun with an absolute file name" >&2
  exit 1
fi

# Unset variables that we do not need and which cause bugs (e.g. in
# pre-3.0 UWIN ksh).  But do not cause bugs in bash 2.01; the "|| exit 1"
# suppresses any "Segmentation fault" message there.  '((' could
# trigger a bug in pdksh 5.2.14.
for as_var in BASH_ENV ENV MAIL MAILPATH
do eval test x\${$as_var+set} = xset \
  && ( (unset $as_var) || exit 1) >/dev/null 2>&1 && unset $as_var || :
done
PS1='$ '
PS2='> '
PS4='+ '

# NLS nuisances.
LC_ALL=C
export LC_ALL
LANGUAGE=C
export LANGUAGE

# CDPATH.
(unset CDPATH) >/dev/null 2>&1 && unset CDPATH

if test "x$CONFIG_SHELL" = x; then
  as_bourne_compatible="if test -n \"\${ZSH_VERSION+set}\" && (emulate sh) >/dev/null 2>&1; then :
  emulate sh
  NULLCMD=:
  # Pre-4.2 versions of Zsh do word splitting on \${1+\"\$@\"}, which
  # is contrary to our usage.  Disable this feature.
  alias -g '\${1+\"\$@\"}'='\"\$@\"'
  setopt NO_GLOB_SUBST
else
  case \`(set -o) 2>/dev/null\` in #(
  *posix*) :
    set -o posix ;; #(
  *) :
     ;;
esac
fi
"
  as_required="as_fn_return () { (exit \$1); }
as_fn_success () { as_fn_return 0; }
as_fn_failure () { as_fn_return 1; }
as_fn_ret_success () { return 0; }
as_fn_ret_failure () { return 1; }

exitcode=0
as_fn_success || { exitcode=1; echo as_fn_success failed.; }
as_fn_failure && { exitcode=1; echo as_fn_failure succeeded.; }
as_fn_ret_success || { exitcode=1; echo as_fn_ret_success failed.; }
as_fn_ret_failure && { exitcode=1; echo as_fn_ret_failure succeeded.; }
if ( set x; as_fn_ret_success y && test x = \"\$1\" ); then :

else
  exitcode=1; echo positional parameters were not saved.
fi
test x\$exitcode = x0 || exit 1
test -x / || exit 1"
  as_suggested="  as_lineno_1=";as_suggested=$as_suggested$LINENO;as_suggested=$as_suggested" as_lineno_1a=\$LINENO
  as_lineno_2=";as_suggested=$as_suggested$LINENO;as_suggested=$as_suggested" as_lineno_2a=\$LINENO
  eval 'test \"x\$as_lineno_1'\$as_run'\" != \"x\$as_lineno_2'\$as_run'\" &&
  test \"x\`expr \$as_lineno_1'\$as_run' + 1\`\" = \"x\$as_lineno_2'\$as_run'\"' || exit 1
test \$(( 1 + 1 )) = 2 || exit 1"
  if (eval "$as_required") 2>/dev/null; then :
  as_have_required=yes
else
  as_have_required=no
fi
  if test x$as_have_required = xyes && (eval "$as_suggested") 2>/dev/null; then :

else
  as_save_IFS=$IFS; IFS=$PATH_SEPARATOR
as_found=false
for as_dir in /bin$PATH_SEPARATOR/usr/bin$PATH_SEPARATOR$PATH
do
  IFS=$as_save_IFS
  test -z "$as_dir" && as_dir=.
  as_found=:
  case $as_dir in #(
	 /*)
	   for as_base in sh bash ksh sh5; do
	     # Try only shells that exist, to save several forks.
	     as_shell=$as_dir/$as_base
	     if { test -f "$as_shell" || test -f "$as_shell.exe"; } &&
		    { $as_echo "$as_bourne_compatible""$as_required" | as_run=a "$as_shell"; } 2>/dev/null; then :
  CONFIG_SHELL=$as_shell as_have_required=yes
		   if { $as_echo "$as_bourne_compatible""$as_suggested" | as_run=a "$as_shell"; } 2>/dev/null; then :
  break 2
fi
fi
	   done;;
       esac
  as_found=false
done
$as_found || { if { test -f "$SHELL" || test -f "$SHELL.exe"; } &&
	      { $as_echo "$as_bourne_compatible""$as_required" | as_run=a "$SHELL"; } 2>/dev/null; then :
  CONFIG_SHELL=$SHELL as_have_required=yes
fi; }
IFS=$as_save_IFS


      if test "x$CONFIG_SHELL" != x; then :
  export CONFIG_SHELL
             # We cannot yet assume a decent shell, so we have to provide a
# neutralization value for shells without unset; and this also
# works around shells that cannot unset nonexistent variables.
# Preserve -v and -x to the replacement shell.
BASH_ENV=/dev/null
ENV=/dev/null
(unset BASH_ENV) >/dev/null 2>&1 && unset BASH_ENV ENV
case $- in # ((((
  *v*x* | *x*v* ) as_opts=-vx ;;
  *v* ) as_opts=-v ;;
  *x* ) as_opts=-x ;;
  * ) as_opts= ;;
esac
exec $CONFIG_SHELL $as_opts "$as_myself" ${1+"$@"}
# Admittedly, this is quite paranoid, since all the known shells bail
# out after a failed `exec'.
$as_echo "$0: could not re-execute with $CONFIG_SHELL" >&2
exit 255
fi

    if test x$as_have_required = xno; then :
  $as_echo "$0: This script requires a shell more modern than all"
  $as_echo "$0: the shells that I found on your system."
  if test x${ZSH_VERSION+set} = xset ; then
    $as_echo "$0: In particular, zsh $ZSH_VERSION has bugs and should"
    $as_echo "$0: be upgraded to zsh 4.3.4 or later."
  else
    $as_echo "$0: Please tell bug-autoconf@gnu.org about your system,
$0: including any error possibly output before this
$0: message. Then install a modern shell, or manually run
$0: the script under such a shell if you do have one."
  fi
  exit 1
fi
fi
fi
SHELL=${CONFIG_SHELL-/bin/sh}
export SHELL
# Unset more variables known to interfere with behavior of common tools.
CLICOLOR_FORCE= GREP_OPTIONS=
unset CLICOLOR_FORCE GREP_OPTIONS

## --------------------- ##
## M4sh Shell Functions. ##
## --------------------- ##
# as_fn_unset VAR
# ---------------
# Portably unset VAR.
as_fn_unset ()
{
  { eval $1=; unset $1;}
}
as_unset=as_fn_unset

# as_fn_set_status STATUS
# -----------------------
# Set $? to STATUS, without forking.
as_fn_set_status ()
{
  return $1
} # as_fn_set_status

# as_fn_exit STATUS
# -----------------
# Exit the shell with STATUS, even in a "trap 0" or "set -e" context.
as_fn_exit ()
{
  set +e
  as_fn_set_status $1
  exit $1
} # as_fn_exit

# as_fn_mkdir_p
# -------------
# Create "$as_dir" as a directory, including parents if necessary.
as_fn_mkdir_p ()
{

  case $as_dir in #(
  -*) as_dir=./$as_dir;;
  esac
  test -d "$as_dir" || eval $as_mkdir_p || {
    as_dirs=
    while :; do
      case $as_dir in #(
      *\'*) as_qdir=`$as_echo "$as_dir" | sed "s/'/'\\\\\\\\''/g"`;; #'(
      *) as_qdir=$as_dir;;
      esac
      as_dirs="'$as_qdir' $as_dirs"
      as_dir=`$as_dirname -- "$as_dir" ||
$as_expr X"$as_dir" : 'X\(.*[^/]\)//*[^/][^/]*/*$' \| \
	 X"$as_dir" : 'X\(//\)[^/]' \| \
	 X"$as_dir" : 'X\(//\)$' \| \
	 X"$as_dir" : 'X\(/\)' \| . 2>/dev/null ||
$as_echo X"$as_dir" |
    sed '/^X\(.*[^/]\)\/\/*[^/][^/]*\/*$/{
	    s//\1/
	    q
	  }
	  /^X\(\/\/\)[^/].*/{
	    s//\1/
	    q
	  }
	  /^X\(\/\/\)$/{
	    s//\1/
	    q
	  }
	  /^X\(\/\).*/{
	    s//\1/
	    q
	  }
	  s/.*/./; q'`
      test -d "$as_dir" && break
    done
    test -z "$as_dirs" || eval "mkdir $as_dirs"
  } || test -d "$as_dir" || as_fn_error $? "cannot create directory $as_dir"


} # as_fn_mkdir_p

# as_fn_executable_p FILE
# -----------------------
# Test if FILE is an executable regular file.
as_fn_executable_p ()
{
  test -f "$1" && test -x "$1"
} # as_fn_executable_p
# as_fn_append VAR VALUE
# ----------------------
# Append the text in VALUE to the end of the definition contained in VAR. Take
# advantage of any shell optimizations that allow amortized linear growth over
# repeated appends, instead of the typical quadratic growth present in naive
# implementations.
if (eval "as_var=1; as_var+=2; test x\$as_var = x12") 2>/dev/null; then :
  eval 'as_fn_append ()
  {
    eval $1+=\$2
  }'
else
  as_fn_append ()
  {
    eval $1=\$$1\$2
  }
fi # as_fn_append

# as_fn_arith ARG...
# ------------------
# Perform arithmetic evaluation on the ARGs, and store the result in the
# global $as_val. Take advantage of shells that can avoid forks. The arguments
# must be portable across $(()) and expr.
if (eval "test \$(( 1 + 1 )) = 2") 2>/dev/null; then :
  eval 'as_fn_arith ()
  {
    as_val=$(( $* ))
  }'
else
  as_fn_arith ()
  {
    as_val=`expr "$@" || test $? -eq 1`
  }
fi # as_fn_arith


# as_fn_error STATUS ERROR [LINENO LOG_FD]
# ----------------------------------------
# Output "`basename $0`: error: ERROR" to stderr. If LINENO and LOG_FD are
# provided, also output the error to LOG_FD, referencing LINENO. Then exit the
# script with STATUS, using 1 if that was 0.
as_fn_error ()
{
  as_status=$1; test $as_status -eq 0 && as_status=1
  if test "$4"; then
    as_lineno=${as_lineno-"$3"} as_lineno_stack=as_lineno_stack=$as_lineno_stack
    $as_echo "$as_me:${as_lineno-$LINENO}: error: $2" >&$4
  fi
  $as_echo "$as_me: error: $2" >&2
  as_fn_exit $as_status
} # as_fn_error

if expr a : '\(a\)' >/dev/null 2>&1 &&
   test "X`expr 00001 : '.*\(...\)'`" = X001; then
  as_expr=expr
else
  as_expr=false
fi

if (basename -- /) >/dev/null 2>&1 && test "X`basename -- / 2>&1`" = "X/"; then
  as_basename=basename
else
  as_basename=false
fi

as_me=`$as_basename -- "$0" ||
$as_expr X/"$0" : '.*/\([^/][^/]*\)/*$' \| \
	 X"$0" : 'X\(//\)$' \| \
	 X"$0" : 'X\(/\)' \| . 2>/dev/null ||
$as_echo X/"$0" |
    sed '/^.*\/\([^/][^/]*\)\/*$/{
	    s//\1/
	    q
	  }
	  /^X\/\(\/\/\)$/{
	    s//\1/
	    q
	  }
	  /^X\/\(\/\).*/{
	    s//\1/
	    q
	  }
	  s/.*/./; q'`

if (as_dir=`dirname -- /` && test "X$as_dir" = X/) >/dev/null 2>&1; then
  as_dirname=dirname
else
  as_dirname=false
fi

# Avoid depending upon Character Ranges.
as_cr_letters='abcdefghijklmnopqrstuvwxyz'
as_cr_LETTERS='ABCDEFGHIJKLMNOPQRSTUVWXYZ'
as_cr_Letters=$as_cr_letters$as_cr_LETTERS
as_cr_digits='0123456789'
as_cr_alnum=$as_cr_Letters$as_cr_digits


  as_lineno_1=$LINENO as_lineno_1a=$LINENO
  as_lineno_2=$LINENO as_lineno_2a=$LINENO
  eval 'test "x$as_lineno_1'$as_run'" != "x$as_lineno_2'$as_run'" &&
  test "x`expr $as_lineno_1'$as_run' + 1`" = "x$as_lineno_2'$as_run'"' || {
  # Blame Lee E. McMahon (1931-1989) for sed's syntax.  :-)
  sed -n '
    p
    /[$]LINENO/=
  ' <$as_myself |
    sed '
      s/[$]LINENO.*/&-/
      t lineno
      b
      :lineno
      N
      :loop
      s/[$]LINENO\([^'$as_cr_alnum'_].*\n\)\(.*\)/\2\1\2/
      t loop
      s/-\n.*//
    ' >$as_me.lineno &&
  chmod +x "$as_me.lineno" ||
    { $as_echo "$as_me: error: cannot create $as_me.lineno; rerun with a POSIX shell" >&2; as_fn_exit 1; }

  # If we had to re-execute with $CONFIG_SHELL, we're ensured to have
  # already done that, so ensure we don't try to do so again and fall
  # in an infinite loop.  This has already happened in practice.
  _as_can_reexec=no; export _as_can_reexec
  # Don't try to exec as it changes $[0], causing all sort of problems
  # (the dirname of $[0] is not the place where we might find the
  # original and so on.  Autoconf is especially sensitive to this).
  . "./$as_me.lineno"
  # Exit status is that of the last command.
  exit
}

ECHO_C= ECHO_N= ECHO_T=
case `echo -n x` in #(((((
-n*)
  case `echo 'xy\c'` in
  *c*) ECHO_T='	';;	# ECHO_T is single tab character.
  xy)  ECHO_C='\c';;
  *)   echo `echo ksh88 bug on AIX 6.1` > /dev/null
       ECHO_T='	';;
  esac;;
*)
  ECHO_N='-n';;
esac

rm -f conf$$ conf$$.exe conf$$.file
if test -d conf$$.dir; then
  rm -f conf$$.dir/conf$$.file
else
  rm -f conf$$.dir
  mkdir conf$$.dir 2>/dev/null
fi
if (echo >conf$$.file) 2>/dev/null; then
  if ln -s conf$$.file conf$$ 2>/dev/null; then
    as_ln_s='ln -s'
    # ... but there are two gotchas:
    # 1) On MSYS, both `ln -s file dir' and `ln file dir' fail.
    # 2) DJGPP < 2.04 has no symlinks; `ln -s' creates a wrapper executable.
    # In both cases, we have to default to `cp -pR'.
    ln -s conf$$.file conf$$.dir 2>/dev/null && test ! -f conf$$.exe ||
      as_ln_s='cp -pR'
  elif ln conf$$.file conf$$ 2>/dev/null; then
    as_ln_s=ln
  else
    as_ln_s='cp -pR'
  fi
else
  as_ln_s='cp -pR'
fi
rm -f conf$$ conf$$.exe conf$$.dir/conf$$.file conf$$.file
rmdir conf$$.dir 2>/dev/null

if mkdir -p . 2>/dev/null; then
  as_mkdir_p='mkdir -p "$as_dir"'
else
  test -d ./-p && rmdir ./-p
  as_mkdir_p=false
fi

as_test_x='test -x'
as_executable_p=as_fn_executable_p

# Sed expression to map a string onto a valid CPP name.
as_tr_cpp="eval sed 'y%*$as_cr_letters%P$as_cr_LETTERS%;s%[^_$as_cr_alnum]%_%g'"

# Sed expression to map a string onto a valid variable name.
as_tr_sh="eval sed 'y%*+%pp%;s%[^_$as_cr_alnum]%_%g'"





SHELL=${CONFIG_SHELL-/bin/sh}

# How were we run?
at_cli_args="$@"


# Not all shells have the 'times' builtin; the subshell is needed to make
# sure we discard the 'times: not found' message from the shell.
at_times_p=false
(times) >/dev/null 2>&1 && at_times_p=:

# CLI Arguments to pass to the debugging scripts.
at_debug_args=
# -e sets to true
at_errexit_p=false
# Shall we be verbose?  ':' means no, empty means yes.
at_verbose=:
at_quiet=
# Running several jobs in parallel, 0 means as many as test groups.
at_jobs=1
at_traceon=:
at_trace_echo=:
at_check_filter_trace=:

# Shall we keep the debug scripts?  Must be `:' when the suite is
# run by a debug script, so that the script doesn't remove itself.
at_debug_p=false
# Display help message?
at_help_p=false
# Display the version message?
at_version_p=false
# List test groups?
at_list_p=false
# --clean
at_clean=false
# Test groups to run
at_groups=
# Whether to rerun failed tests.
at_recheck=
# Whether a write failure occurred
at_write_fail=0

# The directory we run the suite in.  Default to . if no -C option.
at_dir=`pwd`
# An absolute reference to this testsuite script.
case $as_myself in
  [\\/]* | ?:[\\/]* ) at_myself=$as_myself ;;
  * ) at_myself=$at_dir/$as_myself ;;
esac
# Whether -C is in effect.
at_change_dir=false

# Whether to enable colored test results.
at_color=auto
# List of the tested programs.
at_tested=''
# As many question marks as there are digits in the last test group number.
# Used to normalize the test group numbers so that `ls' lists them in
# numerical order.
at_format='???'
# Description of all the test groups.
at_help_all="1;firewall-cmd.at:5;basic options;offline panic reload;
2;firewall-cmd.at:28;get/list options;offline zone service icmp;
3;firewall-cmd.at:44;default zone;offline zone;
4;firewall-cmd.at:56;user zone;offline zone;
5;firewall-cmd.at:71;zone interfaces;offline zone;
6;firewall-cmd.at:169;zone sources;offline zone;
7;firewall-cmd.at:221;services;offline service;
8;firewall-cmd.at:265;user services;offline service;
9;firewall-cmd.at:337;ports;offline port;
10;firewall-cmd.at:394;source ports;offline port;
11;firewall-cmd.at:431;protocols;offline protocol;
12;firewall-cmd.at:459;masquerade;offline masquerade nat;
13;firewall-cmd.at:473;forward ports;offline port forward_port;
14;firewall-cmd.at:533;ICMP block;offline icmp;
15;firewall-cmd.at:579;user ICMP types;offline icmp;
16;firewall-cmd.at:602;ipset;offline ipset;
17;firewall-cmd.at:655;user helpers;offline helper;
18;firewall-cmd.at:683;direct;offline direct;
19;firewall-cmd.at:756;direct nat;offline direct nat;
20;firewall-cmd.at:780;direct passthrough;offline direct passthrough;
21;firewall-cmd.at:819;direct ebtables;offline direct ebtables;
22;firewall-cmd.at:864;lockdown;offline lockdown;
23;firewall-cmd.at:931;rich rules good;offline rich;
24;firewall-cmd.at:960;rich rules audit;offline rich;
25;firewall-cmd.at:968;rich rules priority;offline rich;
26;firewall-cmd.at:1582;rich rules bad;offline rich;
27;firewall-cmd.at:1618;config validation;offline check_config;
28;firewall-offline-cmd.at:17;lokkit migration;offline lokkit;
29;firewalld.conf.at:1;firewalld.conf;nftables dbus;
30;service.at:1;dbus api - services;nftables dbus service rhbz1721414;
31;firewall-cmd.at:5;basic options;nftables panic reload;
32;firewall-cmd.at:28;get/list options;nftables zone service icmp;
33;firewall-cmd.at:44;default zone;nftables zone;
34;firewall-cmd.at:56;user zone;nftables zone;
35;firewall-cmd.at:71;zone interfaces;nftables zone;
36;firewall-cmd.at:169;zone sources;nftables zone;
37;firewall-cmd.at:221;services;nftables service;
38;firewall-cmd.at:265;user services;nftables service;
39;firewall-cmd.at:337;ports;nftables port;
40;firewall-cmd.at:394;source ports;nftables port;
41;firewall-cmd.at:431;protocols;nftables protocol;
42;firewall-cmd.at:459;masquerade;nftables masquerade nat;
43;firewall-cmd.at:473;forward ports;nftables port forward_port;
44;firewall-cmd.at:533;ICMP block;nftables icmp;
45;firewall-cmd.at:579;user ICMP types;nftables icmp;
46;firewall-cmd.at:602;ipset;nftables ipset;
47;firewall-cmd.at:655;user helpers;nftables helper;
48;firewall-cmd.at:683;direct;nftables direct;
49;firewall-cmd.at:756;direct nat;nftables direct nat;
50;firewall-cmd.at:780;direct passthrough;nftables direct passthrough;
51;firewall-cmd.at:819;direct ebtables;nftables direct ebtables;
52;firewall-cmd.at:864;lockdown;nftables lockdown;
53;firewall-cmd.at:931;rich rules good;nftables rich;
54;firewall-cmd.at:960;rich rules audit;nftables rich;
55;firewall-cmd.at:968;rich rules priority;nftables rich;
56;firewall-cmd.at:1582;rich rules bad;nftables rich;
57;firewall-cmd.at:1618;config validation;nftables check_config;
58;rhbz1514043.at:1;--set-log-denied does not zero config;nftables log_denied rhbz1514043;
59;rhbz1498923.at:1;invalid direct rule causes reload error;nftables direct reload rhbz1498923;
60;pr181.at:1;combined zones name length check;nftables zone gh181;
61;gh287.at:1;ICMP block inversion;nftables icmp gh287;
62;individual_calls.at:1;individual calls;nftables individual_calls;
63;rhbz1534571.at:3;rule deduplication;nftables rhbz1534571;
64;gh290.at:1;invalid syntax in xml files;nftables xml direct zone gh290;
65;icmp_block_in_forward_chain.at:1;ICMP block present FORWARD chain;nftables icmp;
66;pr323.at:1;GRE proto helper;nftables helper gh323;
67;rhbz1506742.at:1;ipset with timeout;nftables ipset rhbz1506742;
68;rhbz1594657.at:1;no log untracked passthrough queries;nftables direct passthrough rhbz1594657;
69;rhbz1571957.at:1;set-log-denied w/ ICMP block inversion;nftables log_denied rhbz1571957 icmp;
70;rhbz1404076.at:1;query single port added with range;nftables port rhbz1404076;
71;gh366.at:1;service destination multiple IP versions;nftables service gh366;
72;rhbz1601610.at:1;ipset duplicate entries;nftables ipset rhbz1601610;
73;gh303.at:1;unicode in XML;nftables xml unicode service gh303;
74;gh335.at:1;forward-port toaddr enables IP forwarding;nftables port forward_port gh335;
75;gh482.at:1;remove forward-port after reload;nftables gh482 rhbz1637675 rich forward_port;
76;gh478.at:1;rich rule marks every packet;nftables rich mark gh478;
77;gh453.at:1;nftables helper objects;nftables helper gh453;
78;gh258.at:1;zone dispatch layout;nftables zone gh258 gh441 rhbz1713823;
79;rhbz1715977.at:1;rich rule destination with service destination;nftables rich service rhbz1715977;
80;python.at:3;firewalld_test.py;nftables python;
81;python.at:8;firewalld_config.py;nftables python;
82;python.at:13;firewalld_rich.py;nftables python;
83;python.at:18;firewalld_direct.py;nftables python;
84;rfc3964_ipv4.at:1;RFC3964_IPv4;nftables rfc3964_ipv4;
85;service_include.at:1;service include;nftables service xml gh273 rhbz1720300;
86;firewall-cmd.at:5;basic options;iptables panic reload;
87;firewall-cmd.at:28;get/list options;iptables zone service icmp;
88;firewall-cmd.at:44;default zone;iptables zone;
89;firewall-cmd.at:56;user zone;iptables zone;
90;firewall-cmd.at:71;zone interfaces;iptables zone;
91;firewall-cmd.at:169;zone sources;iptables zone;
92;firewall-cmd.at:221;services;iptables service;
93;firewall-cmd.at:265;user services;iptables service;
94;firewall-cmd.at:337;ports;iptables port;
95;firewall-cmd.at:394;source ports;iptables port;
96;firewall-cmd.at:431;protocols;iptables protocol;
97;firewall-cmd.at:459;masquerade;iptables masquerade nat;
98;firewall-cmd.at:473;forward ports;iptables port forward_port;
99;firewall-cmd.at:533;ICMP block;iptables icmp;
100;firewall-cmd.at:579;user ICMP types;iptables icmp;
101;firewall-cmd.at:602;ipset;iptables ipset;
102;firewall-cmd.at:655;user helpers;iptables helper;
103;firewall-cmd.at:683;direct;iptables direct;
104;firewall-cmd.at:756;direct nat;iptables direct nat;
105;firewall-cmd.at:780;direct passthrough;iptables direct passthrough;
106;firewall-cmd.at:819;direct ebtables;iptables direct ebtables;
107;firewall-cmd.at:864;lockdown;iptables lockdown;
108;firewall-cmd.at:931;rich rules good;iptables rich;
109;firewall-cmd.at:960;rich rules audit;iptables rich;
110;firewall-cmd.at:968;rich rules priority;iptables rich;
111;firewall-cmd.at:1582;rich rules bad;iptables rich;
112;firewall-cmd.at:1618;config validation;iptables check_config;
113;rhbz1514043.at:1;--set-log-denied does not zero config;iptables log_denied rhbz1514043;
114;rhbz1498923.at:1;invalid direct rule causes reload error;iptables direct reload rhbz1498923;
115;pr181.at:1;combined zones name length check;iptables zone gh181;
116;gh287.at:1;ICMP block inversion;iptables icmp gh287;
117;individual_calls.at:1;individual calls;iptables individual_calls;
118;rhbz1534571.at:3;rule deduplication;iptables rhbz1534571;
119;gh290.at:1;invalid syntax in xml files;iptables xml direct zone gh290;
120;icmp_block_in_forward_chain.at:1;ICMP block present FORWARD chain;iptables icmp;
121;pr323.at:1;GRE proto helper;iptables helper gh323;
122;rhbz1506742.at:1;ipset with timeout;iptables ipset rhbz1506742;
123;rhbz1594657.at:1;no log untracked passthrough queries;iptables direct passthrough rhbz1594657;
124;rhbz1571957.at:1;set-log-denied w/ ICMP block inversion;iptables log_denied rhbz1571957 icmp;
125;rhbz1404076.at:1;query single port added with range;iptables port rhbz1404076;
126;gh366.at:1;service destination multiple IP versions;iptables service gh366;
127;rhbz1601610.at:1;ipset duplicate entries;iptables ipset rhbz1601610;
128;gh303.at:1;unicode in XML;iptables xml unicode service gh303;
129;gh335.at:1;forward-port toaddr enables IP forwarding;iptables port forward_port gh335;
130;gh482.at:1;remove forward-port after reload;iptables gh482 rhbz1637675 rich forward_port;
131;gh478.at:1;rich rule marks every packet;iptables rich mark gh478;
132;gh258.at:1;zone dispatch layout;iptables zone gh258 gh441 rhbz1713823;
133;rhbz1715977.at:1;rich rule destination with service destination;iptables rich service rhbz1715977;
134;python.at:3;firewalld_test.py;iptables python;
135;python.at:8;firewalld_config.py;iptables python;
136;python.at:13;firewalld_rich.py;iptables python;
137;python.at:18;firewalld_direct.py;iptables python;
138;rfc3964_ipv4.at:1;RFC3964_IPv4;iptables rfc3964_ipv4;
139;service_include.at:1;service include;iptables service xml gh273 rhbz1720300;
"
# List of the all the test groups.
at_groups_all=`$as_echo "$at_help_all" | sed 's/;.*//'`

# at_fn_validate_ranges NAME...
# -----------------------------
# Validate and normalize the test group number contained in each variable
# NAME. Leading zeroes are treated as decimal.
at_fn_validate_ranges ()
{
  for at_grp
  do
    eval at_value=\$$at_grp
    if test $at_value -lt 1 || test $at_value -gt 139; then
      $as_echo "invalid test group: $at_value" >&2
      exit 1
    fi
    case $at_value in
      0*) # We want to treat leading 0 as decimal, like expr and test, but
	  # AS_VAR_ARITH treats it as octal if it uses $(( )).
	  # With XSI shells, ${at_value#${at_value%%[1-9]*}} avoids the
	  # expr fork, but it is not worth the effort to determine if the
	  # shell supports XSI when the user can just avoid leading 0.
	  eval $at_grp='`expr $at_value + 0`' ;;
    esac
  done
}

at_prev=
for at_option
do
  # If the previous option needs an argument, assign it.
  if test -n "$at_prev"; then
    at_option=$at_prev=$at_option
    at_prev=
  fi

  case $at_option in
  *=?*) at_optarg=`expr "X$at_option" : '[^=]*=\(.*\)'` ;;
  *)    at_optarg= ;;
  esac

  # Accept the important Cygnus configure options, so we can diagnose typos.

  case $at_option in
    --help | -h )
	at_help_p=:
	;;

    --list | -l )
	at_list_p=:
	;;

    --version | -V )
	at_version_p=:
	;;

    --clean | -c )
	at_clean=:
	;;

    --color )
	at_color=always
	;;
    --color=* )
	case $at_optarg in
	no | never | none) at_color=never ;;
	auto | tty | if-tty) at_color=auto ;;
	always | yes | force) at_color=always ;;
	*) at_optname=`echo " $at_option" | sed 's/^ //; s/=.*//'`
	   as_fn_error $? "unrecognized argument to $at_optname: $at_optarg" ;;
	esac
	;;

    --debug | -d )
	at_debug_p=:
	;;

    --errexit | -e )
	at_debug_p=:
	at_errexit_p=:
	;;

    --verbose | -v )
	at_verbose=; at_quiet=:
	;;

    --trace | -x )
	at_traceon='set -x'
	at_trace_echo=echo
	at_check_filter_trace=at_fn_filter_trace
	;;

    [0-9] | [0-9][0-9] | [0-9][0-9][0-9] | [0-9][0-9][0-9][0-9])
	at_fn_validate_ranges at_option
	as_fn_append at_groups "$at_option$as_nl"
	;;

    # Ranges
    [0-9]- | [0-9][0-9]- | [0-9][0-9][0-9]- | [0-9][0-9][0-9][0-9]-)
	at_range_start=`echo $at_option |tr -d X-`
	at_fn_validate_ranges at_range_start
	at_range=`$as_echo "$at_groups_all" | \
	  sed -ne '/^'$at_range_start'$/,$p'`
	as_fn_append at_groups "$at_range$as_nl"
	;;

    -[0-9] | -[0-9][0-9] | -[0-9][0-9][0-9] | -[0-9][0-9][0-9][0-9])
	at_range_end=`echo $at_option |tr -d X-`
	at_fn_validate_ranges at_range_end
	at_range=`$as_echo "$at_groups_all" | \
	  sed -ne '1,/^'$at_range_end'$/p'`
	as_fn_append at_groups "$at_range$as_nl"
	;;

    [0-9]-[0-9] | [0-9]-[0-9][0-9] | [0-9]-[0-9][0-9][0-9] | \
    [0-9]-[0-9][0-9][0-9][0-9] | [0-9][0-9]-[0-9][0-9] | \
    [0-9][0-9]-[0-9][0-9][0-9] | [0-9][0-9]-[0-9][0-9][0-9][0-9] | \
    [0-9][0-9][0-9]-[0-9][0-9][0-9] | \
    [0-9][0-9][0-9]-[0-9][0-9][0-9][0-9] | \
    [0-9][0-9][0-9][0-9]-[0-9][0-9][0-9][0-9] )
	at_range_start=`expr $at_option : '\(.*\)-'`
	at_range_end=`expr $at_option : '.*-\(.*\)'`
	if test $at_range_start -gt $at_range_end; then
	  at_tmp=$at_range_end
	  at_range_end=$at_range_start
	  at_range_start=$at_tmp
	fi
	at_fn_validate_ranges at_range_start at_range_end
	at_range=`$as_echo "$at_groups_all" | \
	  sed -ne '/^'$at_range_start'$/,/^'$at_range_end'$/p'`
	as_fn_append at_groups "$at_range$as_nl"
	;;

    # Directory selection.
    --directory | -C )
	at_prev=--directory
	;;
    --directory=* )
	at_change_dir=:
	at_dir=$at_optarg
	if test x- = "x$at_dir" ; then
	  at_dir=./-
	fi
	;;

    # Parallel execution.
    --jobs | -j )
	at_jobs=0
	;;
    --jobs=* | -j[0-9]* )
	if test -n "$at_optarg"; then
	  at_jobs=$at_optarg
	else
	  at_jobs=`expr X$at_option : 'X-j\(.*\)'`
	fi
	case $at_jobs in *[!0-9]*)
	  at_optname=`echo " $at_option" | sed 's/^ //; s/[0-9=].*//'`
	  as_fn_error $? "non-numeric argument to $at_optname: $at_jobs" ;;
	esac
	;;

    # Keywords.
    --keywords | -k )
	at_prev=--keywords
	;;
    --keywords=* )
	at_groups_selected=$at_help_all
	at_save_IFS=$IFS
	IFS=,
	set X $at_optarg
	shift
	IFS=$at_save_IFS
	for at_keyword
	do
	  at_invert=
	  case $at_keyword in
	  '!'*)
	    at_invert="-v"
	    at_keyword=`expr "X$at_keyword" : 'X!\(.*\)'`
	    ;;
	  esac
	  # It is on purpose that we match the test group titles too.
	  at_groups_selected=`$as_echo "$at_groups_selected" |
	      grep -i $at_invert "^[1-9][^;]*;.*[; ]$at_keyword[ ;]"`
	done
	# Smash the keywords.
	at_groups_selected=`$as_echo "$at_groups_selected" | sed 's/;.*//'`
	as_fn_append at_groups "$at_groups_selected$as_nl"
	;;
    --recheck)
	at_recheck=:
	;;

    *=*)
	at_envvar=`expr "x$at_option" : 'x\([^=]*\)='`
	# Reject names that are not valid shell variable names.
	case $at_envvar in
	  '' | [0-9]* | *[!_$as_cr_alnum]* )
	    as_fn_error $? "invalid variable name: \`$at_envvar'" ;;
	esac
	at_value=`$as_echo "$at_optarg" | sed "s/'/'\\\\\\\\''/g"`
	# Export now, but save eval for later and for debug scripts.
	export $at_envvar
	as_fn_append at_debug_args " $at_envvar='$at_value'"
	;;

     *) $as_echo "$as_me: invalid option: $at_option" >&2
	$as_echo "Try \`$0 --help' for more information." >&2
	exit 1
	;;
  esac
done

# Verify our last option didn't require an argument
if test -n "$at_prev"; then :
  as_fn_error $? "\`$at_prev' requires an argument"
fi

# The file containing the suite.
at_suite_log=$at_dir/$as_me.log

# Selected test groups.
if test -z "$at_groups$at_recheck"; then
  at_groups=$at_groups_all
else
  if test -n "$at_recheck" && test -r "$at_suite_log"; then
    at_oldfails=`sed -n '
      /^Failed tests:$/,/^Skipped tests:$/{
	s/^[ ]*\([1-9][0-9]*\):.*/\1/p
      }
      /^Unexpected passes:$/,/^## Detailed failed tests/{
	s/^[ ]*\([1-9][0-9]*\):.*/\1/p
      }
      /^## Detailed failed tests/q
      ' "$at_suite_log"`
    as_fn_append at_groups "$at_oldfails$as_nl"
  fi
  # Sort the tests, removing duplicates.
  at_groups=`$as_echo "$at_groups" | sort -nu | sed '/^$/d'`
fi

if test x"$at_color" = xalways \
   || { test x"$at_color" = xauto && test -t 1; }; then
  at_red=`printf '\033[0;31m'`
  at_grn=`printf '\033[0;32m'`
  at_lgn=`printf '\033[1;32m'`
  at_blu=`printf '\033[1;34m'`
  at_std=`printf '\033[m'`
else
  at_red= at_grn= at_lgn= at_blu= at_std=
fi

# Help message.
if $at_help_p; then
  cat <<_ATEOF || at_write_fail=1
Usage: $0 [OPTION]... [VARIABLE=VALUE]... [TESTS]

Run all the tests, or the selected TESTS, given by numeric ranges, and
save a detailed log file.  Upon failure, create debugging scripts.

Do not change environment variables directly.  Instead, set them via
command line arguments.  Set \`AUTOTEST_PATH' to select the executables
to exercise.  Each relative directory is expanded as build and source
directories relative to the top level of this distribution.
E.g., from within the build directory /tmp/foo-1.0, invoking this:

  $ $0 AUTOTEST_PATH=bin

is equivalent to the following, assuming the source directory is /src/foo-1.0:

  PATH=/tmp/foo-1.0/bin:/src/foo-1.0/bin:\$PATH $0
_ATEOF
cat <<_ATEOF || at_write_fail=1

Operation modes:
  -h, --help     print the help message, then exit
  -V, --version  print version number, then exit
  -c, --clean    remove all the files this test suite might create and exit
  -l, --list     describes all the tests, or the selected TESTS
_ATEOF
cat <<_ATEOF || at_write_fail=1

Execution tuning:
  -C, --directory=DIR
                 change to directory DIR before starting
      --color[=never|auto|always]
                 disable colored test results, or enable even without terminal
  -j, --jobs[=N]
                 Allow N jobs at once; infinite jobs with no arg (default 1)
  -k, --keywords=KEYWORDS
                 select the tests matching all the comma-separated KEYWORDS
                 multiple \`-k' accumulate; prefixed \`!' negates a KEYWORD
      --recheck  select all tests that failed or passed unexpectedly last time
  -e, --errexit  abort as soon as a test fails; implies --debug
  -v, --verbose  force more detailed output
                 default for debugging scripts
  -d, --debug    inhibit clean up and top-level logging
                 default for debugging scripts
  -x, --trace    enable tests shell tracing
_ATEOF
cat <<_ATEOF || at_write_fail=1

Report bugs to <https://github.com/firewalld/firewalld>.
firewalld home page: <http://firewalld.org/>.
_ATEOF
  exit $at_write_fail
fi

# List of tests.
if $at_list_p; then
  cat <<_ATEOF || at_write_fail=1
firewalld 0.7.1 test suite test groups:

 NUM: FILE-NAME:LINE     TEST-GROUP-NAME
      KEYWORDS

_ATEOF
  # Pass an empty line as separator between selected groups and help.
  $as_echo "$at_groups$as_nl$as_nl$at_help_all" |
    awk 'NF == 1 && FS != ";" {
	   selected[$ 1] = 1
	   next
	 }
	 /^$/ { FS = ";" }
	 NF > 0 {
	   if (selected[$ 1]) {
	     printf " %3d: %-18s %s\n", $ 1, $ 2, $ 3
	     if ($ 4) {
	       lmax = 79
	       indent = "     "
	       line = indent
	       len = length (line)
	       n = split ($ 4, a, " ")
	       for (i = 1; i <= n; i++) {
		 l = length (a[i]) + 1
		 if (i > 1 && len + l > lmax) {
		   print line
		   line = indent " " a[i]
		   len = length (line)
		 } else {
		   line = line " " a[i]
		   len += l
		 }
	       }
	       if (n)
		 print line
	     }
	   }
	 }' || at_write_fail=1
  exit $at_write_fail
fi
if $at_version_p; then
  $as_echo "$as_me (firewalld 0.7.1)" &&
  cat <<\_ATEOF || at_write_fail=1

Copyright (C) 2012 Free Software Foundation, Inc.
This test suite is free software; the Free Software Foundation gives
unlimited permission to copy, distribute and modify it.
_ATEOF
  exit $at_write_fail
fi

# Should we print banners?  Yes if more than one test is run.
case $at_groups in #(
  *$as_nl* )
      at_print_banners=: ;; #(
  * ) at_print_banners=false ;;
esac
# Text for banner N, set to a single space once printed.
# Banner 1. firewall-offline-cmd.at:1
# Category starts at test group 1.
at_banner_text_1="firewall-offline-cmd"
# Banner 2. dbus.at:1
# Category starts at test group 29.
at_banner_text_2="dbus"
# Banner 3. firewall-cmd.at:1
# Category starts at test group 31.
at_banner_text_3="firewall-cmd (nftables)"
# Banner 4. regression.at:1
# Category starts at test group 58.
at_banner_text_4="regression (nftables)"
# Banner 5. python.at:1
# Category starts at test group 80.
at_banner_text_5="python (nftables)"
# Banner 6. features.at:1
# Category starts at test group 84.
at_banner_text_6="features (nftables)"
# Banner 7. firewall-cmd.at:1
# Category starts at test group 86.
at_banner_text_7="firewall-cmd (iptables)"
# Banner 8. regression.at:1
# Category starts at test group 113.
at_banner_text_8="regression (iptables)"
# Banner 9. python.at:1
# Category starts at test group 134.
at_banner_text_9="python (iptables)"
# Banner 10. features.at:1
# Category starts at test group 138.
at_banner_text_10="features (iptables)"

# Take any -C into account.
if $at_change_dir ; then
  test x != "x$at_dir" && cd "$at_dir" \
    || as_fn_error $? "unable to change directory"
  at_dir=`pwd`
fi

# Load the config files for any default variable assignments.
for at_file in atconfig atlocal
do
  test -r $at_file || continue
  . ./$at_file || as_fn_error $? "invalid content: $at_file"
done

# Autoconf <=2.59b set at_top_builddir instead of at_top_build_prefix:
: "${at_top_build_prefix=$at_top_builddir}"

# Perform any assignments requested during argument parsing.
eval "$at_debug_args"

# atconfig delivers names relative to the directory the test suite is
# in, but the groups themselves are run in testsuite-dir/group-dir.
if test -n "$at_top_srcdir"; then
  builddir=../..
  for at_dir_var in srcdir top_srcdir top_build_prefix
  do
    eval at_val=\$at_$at_dir_var
    case $at_val in
      [\\/$]* | ?:[\\/]* ) at_prefix= ;;
      *) at_prefix=../../ ;;
    esac
    eval "$at_dir_var=\$at_prefix\$at_val"
  done
fi

## -------------------- ##
## Directory structure. ##
## -------------------- ##

# This is the set of directories and files used by this script
# (non-literals are capitalized):
#
# TESTSUITE         - the testsuite
# TESTSUITE.log     - summarizes the complete testsuite run
# TESTSUITE.dir/    - created during a run, remains after -d or failed test
# + at-groups/      - during a run: status of all groups in run
# | + NNN/          - during a run: meta-data about test group NNN
# | | + check-line  - location (source file and line) of current AT_CHECK
# | | + status      - exit status of current AT_CHECK
# | | + stdout      - stdout of current AT_CHECK
# | | + stder1      - stderr, including trace
# | | + stderr      - stderr, with trace filtered out
# | | + test-source - portion of testsuite that defines group
# | | + times       - timestamps for computing duration
# | | + pass        - created if group passed
# | | + xpass       - created if group xpassed
# | | + fail        - created if group failed
# | | + xfail       - created if group xfailed
# | | + skip        - created if group skipped
# + at-stop         - during a run: end the run if this file exists
# + at-source-lines - during a run: cache of TESTSUITE line numbers for extraction
# + 0..NNN/         - created for each group NNN, remains after -d or failed test
# | + TESTSUITE.log - summarizes the group results
# | + ...           - files created during the group

# The directory the whole suite works in.
# Should be absolute to let the user `cd' at will.
at_suite_dir=$at_dir/$as_me.dir
# The file containing the suite ($at_dir might have changed since earlier).
at_suite_log=$at_dir/$as_me.log
# The directory containing helper files per test group.
at_helper_dir=$at_suite_dir/at-groups
# Stop file: if it exists, do not start new jobs.
at_stop_file=$at_suite_dir/at-stop
# The fifo used for the job dispatcher.
at_job_fifo=$at_suite_dir/at-job-fifo

if $at_clean; then
  test -d "$at_suite_dir" &&
    find "$at_suite_dir" -type d ! -perm -700 -exec chmod u+rwx \{\} \;
  rm -f -r "$at_suite_dir" "$at_suite_log"
  exit $?
fi

# Don't take risks: use only absolute directories in PATH.
#
# For stand-alone test suites (ie. atconfig was not found),
# AUTOTEST_PATH is relative to `.'.
#
# For embedded test suites, AUTOTEST_PATH is relative to the top level
# of the package.  Then expand it into build/src parts, since users
# may create executables in both places.
AUTOTEST_PATH=`$as_echo "$AUTOTEST_PATH" | sed "s|:|$PATH_SEPARATOR|g"`
at_path=
as_save_IFS=$IFS; IFS=$PATH_SEPARATOR
for as_dir in $AUTOTEST_PATH $PATH
do
  IFS=$as_save_IFS
  test -z "$as_dir" && as_dir=.
    test -n "$at_path" && as_fn_append at_path $PATH_SEPARATOR
case $as_dir in
  [\\/]* | ?:[\\/]* )
    as_fn_append at_path "$as_dir"
    ;;
  * )
    if test -z "$at_top_build_prefix"; then
      # Stand-alone test suite.
      as_fn_append at_path "$as_dir"
    else
      # Embedded test suite.
      as_fn_append at_path "$at_top_build_prefix$as_dir$PATH_SEPARATOR"
      as_fn_append at_path "$at_top_srcdir/$as_dir"
    fi
    ;;
esac
  done
IFS=$as_save_IFS


# Now build and simplify PATH.
#
# There might be directories that don't exist, but don't redirect
# builtins' (eg., cd) stderr directly: Ultrix's sh hates that.
at_new_path=
as_save_IFS=$IFS; IFS=$PATH_SEPARATOR
for as_dir in $at_path
do
  IFS=$as_save_IFS
  test -z "$as_dir" && as_dir=.
    test -d "$as_dir" || continue
case $as_dir in
  [\\/]* | ?:[\\/]* ) ;;
  * ) as_dir=`(cd "$as_dir" && pwd) 2>/dev/null` ;;
esac
case $PATH_SEPARATOR$at_new_path$PATH_SEPARATOR in
  *$PATH_SEPARATOR$as_dir$PATH_SEPARATOR*) ;;
  $PATH_SEPARATOR$PATH_SEPARATOR) at_new_path=$as_dir ;;
  *) as_fn_append at_new_path "$PATH_SEPARATOR$as_dir" ;;
esac
  done
IFS=$as_save_IFS

PATH=$at_new_path
export PATH

# Setting up the FDs.



# 5 is the log file.  Not to be overwritten if `-d'.
if $at_debug_p; then
  at_suite_log=/dev/null
else
  : >"$at_suite_log"
fi
exec 5>>"$at_suite_log"

# Banners and logs.
$as_echo "## --------------------------- ##
## firewalld 0.7.1 test suite. ##
## --------------------------- ##"
{
  $as_echo "## --------------------------- ##
## firewalld 0.7.1 test suite. ##
## --------------------------- ##"
  echo

  $as_echo "$as_me: command line was:"
  $as_echo "  \$ $0 $at_cli_args"
  echo

  # If ChangeLog exists, list a few lines in case it might help determining
  # the exact version.
  if test -n "$at_top_srcdir" && test -f "$at_top_srcdir/ChangeLog"; then
    $as_echo "## ---------- ##
## ChangeLog. ##
## ---------- ##"
    echo
    sed 's/^/| /;10q' "$at_top_srcdir/ChangeLog"
    echo
  fi

  {
cat <<_ASUNAME
## --------- ##
## Platform. ##
## --------- ##

hostname = `(hostname || uname -n) 2>/dev/null | sed 1q`
uname -m = `(uname -m) 2>/dev/null || echo unknown`
uname -r = `(uname -r) 2>/dev/null || echo unknown`
uname -s = `(uname -s) 2>/dev/null || echo unknown`
uname -v = `(uname -v) 2>/dev/null || echo unknown`

/usr/bin/uname -p = `(/usr/bin/uname -p) 2>/dev/null || echo unknown`
/bin/uname -X     = `(/bin/uname -X) 2>/dev/null     || echo unknown`

/bin/arch              = `(/bin/arch) 2>/dev/null              || echo unknown`
/usr/bin/arch -k       = `(/usr/bin/arch -k) 2>/dev/null       || echo unknown`
/usr/convex/getsysinfo = `(/usr/convex/getsysinfo) 2>/dev/null || echo unknown`
/usr/bin/hostinfo      = `(/usr/bin/hostinfo) 2>/dev/null      || echo unknown`
/bin/machine           = `(/bin/machine) 2>/dev/null           || echo unknown`
/usr/bin/oslevel       = `(/usr/bin/oslevel) 2>/dev/null       || echo unknown`
/bin/universe          = `(/bin/universe) 2>/dev/null          || echo unknown`

_ASUNAME

as_save_IFS=$IFS; IFS=$PATH_SEPARATOR
for as_dir in $PATH
do
  IFS=$as_save_IFS
  test -z "$as_dir" && as_dir=.
    $as_echo "PATH: $as_dir"
  done
IFS=$as_save_IFS

}
  echo

  # Contents of the config files.
  for at_file in atconfig atlocal
  do
    test -r $at_file || continue
    $as_echo "$as_me: $at_file:"
    sed 's/^/| /' $at_file
    echo
  done
} >&5


## ------------------------- ##
## Autotest shell functions. ##
## ------------------------- ##

# at_fn_banner NUMBER
# -------------------
# Output banner NUMBER, provided the testsuite is running multiple groups and
# this particular banner has not yet been printed.
at_fn_banner ()
{
  $at_print_banners || return 0
  eval at_banner_text=\$at_banner_text_$1
  test "x$at_banner_text" = "x " && return 0
  eval "at_banner_text_$1=\" \""
  if test -z "$at_banner_text"; then
    $at_first || echo
  else
    $as_echo "$as_nl$at_banner_text$as_nl"
  fi
} # at_fn_banner

# at_fn_check_prepare_notrace REASON LINE
# ---------------------------------------
# Perform AT_CHECK preparations for the command at LINE for an untraceable
# command; REASON is the reason for disabling tracing.
at_fn_check_prepare_notrace ()
{
  $at_trace_echo "Not enabling shell tracing (command contains $1)"
  $as_echo "$2" >"$at_check_line_file"
  at_check_trace=: at_check_filter=:
  : >"$at_stdout"; : >"$at_stderr"
}

# at_fn_check_prepare_trace LINE
# ------------------------------
# Perform AT_CHECK preparations for the command at LINE for a traceable
# command.
at_fn_check_prepare_trace ()
{
  $as_echo "$1" >"$at_check_line_file"
  at_check_trace=$at_traceon at_check_filter=$at_check_filter_trace
  : >"$at_stdout"; : >"$at_stderr"
}

# at_fn_check_prepare_dynamic COMMAND LINE
# ----------------------------------------
# Decide if COMMAND at LINE is traceable at runtime, and call the appropriate
# preparation function.
at_fn_check_prepare_dynamic ()
{
  case $1 in
    *$as_nl*)
      at_fn_check_prepare_notrace 'an embedded newline' "$2" ;;
    *)
      at_fn_check_prepare_trace "$2" ;;
  esac
}

# at_fn_filter_trace
# ------------------
# Remove the lines in the file "$at_stderr" generated by "set -x" and print
# them to stderr.
at_fn_filter_trace ()
{
  mv "$at_stderr" "$at_stder1"
  grep '^ *+' "$at_stder1" >&2
  grep -v '^ *+' "$at_stder1" >"$at_stderr"
}

# at_fn_log_failure FILE-LIST
# ---------------------------
# Copy the files in the list on stdout with a "> " prefix, and exit the shell
# with a failure exit code.
at_fn_log_failure ()
{
  for file
    do $as_echo "$file:"; sed 's/^/> /' "$file"; done
  echo 1 > "$at_status_file"
  exit 1
}

# at_fn_check_skip EXIT-CODE LINE
# -------------------------------
# Check whether EXIT-CODE is a special exit code (77 or 99), and if so exit
# the test group subshell with that same exit code. Use LINE in any report
# about test failure.
at_fn_check_skip ()
{
  case $1 in
    99) echo 99 > "$at_status_file"; at_failed=:
	$as_echo "$2: hard failure"; exit 99;;
    77) echo 77 > "$at_status_file"; exit 77;;
  esac
}

# at_fn_check_status EXPECTED EXIT-CODE LINE
# ------------------------------------------
# Check whether EXIT-CODE is the EXPECTED exit code, and if so do nothing.
# Otherwise, if it is 77 or 99, exit the test group subshell with that same
# exit code; if it is anything else print an error message referring to LINE,
# and fail the test.
at_fn_check_status ()
{
  case $2 in
    $1 ) ;;
    77) echo 77 > "$at_status_file"; exit 77;;
    99) echo 99 > "$at_status_file"; at_failed=:
	$as_echo "$3: hard failure"; exit 99;;
    *) $as_echo "$3: exit code was $2, expected $1"
      at_failed=:;;
  esac
}

# at_fn_diff_devnull FILE
# -----------------------
# Emit a diff between /dev/null and FILE. Uses "test -s" to avoid useless diff
# invocations.
at_fn_diff_devnull ()
{
  test -s "$1" || return 0
  $at_diff "$at_devnull" "$1"
}

# at_fn_test NUMBER
# -----------------
# Parse out test NUMBER from the tail of this file.
at_fn_test ()
{
  eval at_sed=\$at_sed$1
  sed "$at_sed" "$at_myself" > "$at_test_source"
}

# at_fn_create_debugging_script
# -----------------------------
# Create the debugging script $at_group_dir/run which will reproduce the
# current test group.
at_fn_create_debugging_script ()
{
  {
    echo "#! /bin/sh" &&
    echo 'test "${ZSH_VERSION+set}" = set && alias -g '\''${1+"$@"}'\''='\''"$@"'\''' &&
    $as_echo "cd '$at_dir'" &&
    $as_echo "exec \${CONFIG_SHELL-$SHELL} \"$at_myself\" -v -d $at_debug_args $at_group \${1+\"\$@\"}" &&
    echo 'exit 1'
  } >"$at_group_dir/run" &&
  chmod +x "$at_group_dir/run"
}

## -------------------------------- ##
## End of autotest shell functions. ##
## -------------------------------- ##
{
  $as_echo "## ---------------- ##
## Tested programs. ##
## ---------------- ##"
  echo
} >&5

# Report what programs are being tested.
for at_program in : $at_tested
do
  test "$at_program" = : && continue
  case $at_program in
    [\\/]* | ?:[\\/]* ) $at_program_=$at_program ;;
    * )
    as_save_IFS=$IFS; IFS=$PATH_SEPARATOR
for as_dir in $PATH
do
  IFS=$as_save_IFS
  test -z "$as_dir" && as_dir=.
    test -f "$as_dir/$at_program" && break
  done
IFS=$as_save_IFS

    at_program_=$as_dir/$at_program ;;
  esac
  if test -f "$at_program_"; then
    {
      $as_echo "$at_srcdir/testsuite.at:1: $at_program_ --version"
      "$at_program_" --version </dev/null
      echo
    } >&5 2>&1
  else
    as_fn_error $? "cannot find $at_program" "$LINENO" 5
  fi
done

{
  $as_echo "## ------------------ ##
## Running the tests. ##
## ------------------ ##"
} >&5

at_start_date=`date`
at_start_time=`date +%s 2>/dev/null`
$as_echo "$as_me: starting at: $at_start_date" >&5

# Create the master directory if it doesn't already exist.
as_dir="$at_suite_dir"; as_fn_mkdir_p ||
  as_fn_error $? "cannot create \`$at_suite_dir'" "$LINENO" 5

# Can we diff with `/dev/null'?  DU 5.0 refuses.
if diff /dev/null /dev/null >/dev/null 2>&1; then
  at_devnull=/dev/null
else
  at_devnull=$at_suite_dir/devnull
  >"$at_devnull"
fi

# Use `diff -u' when possible.
if at_diff=`diff -u "$at_devnull" "$at_devnull" 2>&1` && test -z "$at_diff"
then
  at_diff='diff -u'
else
  at_diff=diff
fi

# Get the last needed group.
for at_group in : $at_groups; do :; done

# Extract the start and end lines of each test group at the tail
# of this file
awk '
BEGIN { FS="" }
/^#AT_START_/ {
  start = NR
}
/^#AT_STOP_/ {
  test = substr ($ 0, 10)
  print "at_sed" test "=\"1," start "d;" (NR-1) "q\""
  if (test == "'"$at_group"'") exit
}' "$at_myself" > "$at_suite_dir/at-source-lines" &&
. "$at_suite_dir/at-source-lines" ||
  as_fn_error $? "cannot create test line number cache" "$LINENO" 5
rm -f "$at_suite_dir/at-source-lines"

# Set number of jobs for `-j'; avoid more jobs than test groups.
set X $at_groups; shift; at_max_jobs=$#
if test $at_max_jobs -eq 0; then
  at_jobs=1
fi
if test $at_jobs -ne 1 &&
   { test $at_jobs -eq 0 || test $at_jobs -gt $at_max_jobs; }; then
  at_jobs=$at_max_jobs
fi

# If parallel mode, don't output banners, don't split summary lines.
if test $at_jobs -ne 1; then
  at_print_banners=false
  at_quiet=:
fi

# Set up helper dirs.
rm -rf "$at_helper_dir" &&
mkdir "$at_helper_dir" &&
cd "$at_helper_dir" &&
{ test -z "$at_groups" || mkdir $at_groups; } ||
as_fn_error $? "testsuite directory setup failed" "$LINENO" 5

# Functions for running a test group.  We leave the actual
# test group execution outside of a shell function in order
# to avoid hitting zsh 4.x exit status bugs.

# at_fn_group_prepare
# -------------------
# Prepare for running a test group.
at_fn_group_prepare ()
{
  # The directory for additional per-group helper files.
  at_job_dir=$at_helper_dir/$at_group
  # The file containing the location of the last AT_CHECK.
  at_check_line_file=$at_job_dir/check-line
  # The file containing the exit status of the last command.
  at_status_file=$at_job_dir/status
  # The files containing the output of the tested commands.
  at_stdout=$at_job_dir/stdout
  at_stder1=$at_job_dir/stder1
  at_stderr=$at_job_dir/stderr
  # The file containing the code for a test group.
  at_test_source=$at_job_dir/test-source
  # The file containing dates.
  at_times_file=$at_job_dir/times

  # Be sure to come back to the top test directory.
  cd "$at_suite_dir"

  # Clearly separate the test groups when verbose.
  $at_first || $at_verbose echo

  at_group_normalized=$at_group

  eval 'while :; do
    case $at_group_normalized in #(
    '"$at_format"'*) break;;
    esac
    at_group_normalized=0$at_group_normalized
  done'


  # Create a fresh directory for the next test group, and enter.
  # If one already exists, the user may have invoked ./run from
  # within that directory; we remove the contents, but not the
  # directory itself, so that we aren't pulling the rug out from
  # under the shell's notion of the current directory.
  at_group_dir=$at_suite_dir/$at_group_normalized
  at_group_log=$at_group_dir/$as_me.log
  if test -d "$at_group_dir"; then
  find "$at_group_dir" -type d ! -perm -700 -exec chmod u+rwx {} \;
  rm -fr "$at_group_dir"/* "$at_group_dir"/.[!.] "$at_group_dir"/.??*
fi ||
    { $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: test directory for $at_group_normalized could not be cleaned" >&5
$as_echo "$as_me: WARNING: test directory for $at_group_normalized could not be cleaned" >&2;}
  # Be tolerant if the above `rm' was not able to remove the directory.
  as_dir="$at_group_dir"; as_fn_mkdir_p

  echo 0 > "$at_status_file"

  # In verbose mode, append to the log file *and* show on
  # the standard output; in quiet mode only write to the log.
  if test -z "$at_verbose"; then
    at_tee_pipe='tee -a "$at_group_log"'
  else
    at_tee_pipe='cat >> "$at_group_log"'
  fi
}

# at_fn_group_banner ORDINAL LINE DESC PAD [BANNER]
# -------------------------------------------------
# Declare the test group ORDINAL, located at LINE with group description DESC,
# and residing under BANNER. Use PAD to align the status column.
at_fn_group_banner ()
{
  at_setup_line="$2"
  test -n "$5" && at_fn_banner $5
  at_desc="$3"
  case $1 in
    [0-9])      at_desc_line="  $1: ";;
    [0-9][0-9]) at_desc_line=" $1: " ;;
    *)          at_desc_line="$1: "  ;;
  esac
  as_fn_append at_desc_line "$3$4"
  $at_quiet $as_echo_n "$at_desc_line"
  echo "#                             -*- compilation -*-" >> "$at_group_log"
}

# at_fn_group_postprocess
# -----------------------
# Perform cleanup after running a test group.
at_fn_group_postprocess ()
{
  # Be sure to come back to the suite directory, in particular
  # since below we might `rm' the group directory we are in currently.
  cd "$at_suite_dir"

  if test ! -f "$at_check_line_file"; then
    sed "s/^ */$as_me: WARNING: /" <<_ATEOF
      A failure happened in a test group before any test could be
      run. This means that test suite is improperly designed.  Please
      report this failure to <https://github.com/firewalld/firewalld>.
_ATEOF
    $as_echo "$at_setup_line" >"$at_check_line_file"
    at_status=99
  fi
  $at_verbose $as_echo_n "$at_group. $at_setup_line: "
  $as_echo_n "$at_group. $at_setup_line: " >> "$at_group_log"
  case $at_xfail:$at_status in
    yes:0)
	at_msg="UNEXPECTED PASS"
	at_res=xpass
	at_errexit=$at_errexit_p
	at_color=$at_red
	;;
    no:0)
	at_msg="ok"
	at_res=pass
	at_errexit=false
	at_color=$at_grn
	;;
    *:77)
	at_msg='skipped ('`cat "$at_check_line_file"`')'
	at_res=skip
	at_errexit=false
	at_color=$at_blu
	;;
    no:* | *:99)
	at_msg='FAILED ('`cat "$at_check_line_file"`')'
	at_res=fail
	at_errexit=$at_errexit_p
	at_color=$at_red
	;;
    yes:*)
	at_msg='expected failure ('`cat "$at_check_line_file"`')'
	at_res=xfail
	at_errexit=false
	at_color=$at_lgn
	;;
  esac
  echo "$at_res" > "$at_job_dir/$at_res"
  # In parallel mode, output the summary line only afterwards.
  if test $at_jobs -ne 1 && test -n "$at_verbose"; then
    $as_echo "$at_desc_line $at_color$at_msg$at_std"
  else
    # Make sure there is a separator even with long titles.
    $as_echo " $at_color$at_msg$at_std"
  fi
  at_log_msg="$at_group. $at_desc ($at_setup_line): $at_msg"
  case $at_status in
    0|77)
      # $at_times_file is only available if the group succeeded.
      # We're not including the group log, so the success message
      # is written in the global log separately.  But we also
      # write to the group log in case they're using -d.
      if test -f "$at_times_file"; then
	at_log_msg="$at_log_msg     ("`sed 1d "$at_times_file"`')'
	rm -f "$at_times_file"
      fi
      $as_echo "$at_log_msg" >> "$at_group_log"
      $as_echo "$at_log_msg" >&5

      # Cleanup the group directory, unless the user wants the files
      # or the success was unexpected.
      if $at_debug_p || test $at_res = xpass; then
	at_fn_create_debugging_script
	if test $at_res = xpass && $at_errexit; then
	  echo stop > "$at_stop_file"
	fi
      else
	if test -d "$at_group_dir"; then
	  find "$at_group_dir" -type d ! -perm -700 -exec chmod u+rwx \{\} \;
	  rm -fr "$at_group_dir"
	fi
	rm -f "$at_test_source"
      fi
      ;;
    *)
      # Upon failure, include the log into the testsuite's global
      # log.  The failure message is written in the group log.  It
      # is later included in the global log.
      $as_echo "$at_log_msg" >> "$at_group_log"

      # Upon failure, keep the group directory for autopsy, and create
      # the debugging script.  With -e, do not start any further tests.
      at_fn_create_debugging_script
      if $at_errexit; then
	echo stop > "$at_stop_file"
      fi
      ;;
  esac
}


## ------------ ##
## Driver loop. ##
## ------------ ##


if (set -m && set +m && set +b) >/dev/null 2>&1; then
  set +b
  at_job_control_on='set -m' at_job_control_off='set +m' at_job_group=-
else
  at_job_control_on=: at_job_control_off=: at_job_group=
fi

for at_signal in 1 2 15; do
  trap 'set +x; set +e
	$at_job_control_off
	at_signal='"$at_signal"'
	echo stop > "$at_stop_file"
	trap "" $at_signal
	at_pgids=
	for at_pgid in `jobs -p 2>/dev/null`; do
	  at_pgids="$at_pgids $at_job_group$at_pgid"
	done
	test -z "$at_pgids" || kill -$at_signal $at_pgids 2>/dev/null
	wait
	if test "$at_jobs" -eq 1 || test -z "$at_verbose"; then
	  echo >&2
	fi
	at_signame=`kill -l $at_signal 2>&1 || echo $at_signal`
	set x $at_signame
	test 0 -gt 2 && at_signame=$at_signal
	{ $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: caught signal $at_signame, bailing out" >&5
$as_echo "$as_me: WARNING: caught signal $at_signame, bailing out" >&2;}
	as_fn_arith 128 + $at_signal && exit_status=$as_val
	as_fn_exit $exit_status' $at_signal
done

rm -f "$at_stop_file"
at_first=:

if test $at_jobs -ne 1 &&
     rm -f "$at_job_fifo" &&
     test -n "$at_job_group" &&
     ( mkfifo "$at_job_fifo" && trap 'exit 1' PIPE STOP TSTP ) 2>/dev/null
then
  # FIFO job dispatcher.

  trap 'at_pids=
	for at_pid in `jobs -p`; do
	  at_pids="$at_pids $at_job_group$at_pid"
	done
	if test -n "$at_pids"; then
	  at_sig=TSTP
	  test "${TMOUT+set}" = set && at_sig=STOP
	  kill -$at_sig $at_pids 2>/dev/null
	fi
	kill -STOP $$
	test -z "$at_pids" || kill -CONT $at_pids 2>/dev/null' TSTP

  echo
  # Turn jobs into a list of numbers, starting from 1.
  at_joblist=`$as_echo "$at_groups" | sed -n 1,${at_jobs}p`

  set X $at_joblist
  shift
  for at_group in $at_groups; do
    $at_job_control_on 2>/dev/null
    (
      # Start one test group.
      $at_job_control_off
      if $at_first; then
	exec 7>"$at_job_fifo"
      else
	exec 6<&-
      fi
      trap 'set +x; set +e
	    trap "" PIPE
	    echo stop > "$at_stop_file"
	    echo >&7
	    as_fn_exit 141' PIPE
      at_fn_group_prepare
      if cd "$at_group_dir" &&
	 at_fn_test $at_group &&
	 . "$at_test_source"
      then :; else
	{ $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: unable to parse test group: $at_group" >&5
$as_echo "$as_me: WARNING: unable to parse test group: $at_group" >&2;}
	at_failed=:
      fi
      at_fn_group_postprocess
      echo >&7
    ) &
    $at_job_control_off
    if $at_first; then
      at_first=false
      exec 6<"$at_job_fifo" 7>"$at_job_fifo"
    fi
    shift # Consume one token.
    if test $# -gt 0; then :; else
      read at_token <&6 || break
      set x $*
    fi
    test -f "$at_stop_file" && break
  done
  exec 7>&-
  # Read back the remaining ($at_jobs - 1) tokens.
  set X $at_joblist
  shift
  if test $# -gt 0; then
    shift
    for at_job
    do
      read at_token
    done <&6
  fi
  exec 6<&-
  wait
else
  # Run serially, avoid forks and other potential surprises.
  for at_group in $at_groups; do
    at_fn_group_prepare
    if cd "$at_group_dir" &&
       at_fn_test $at_group &&
       . "$at_test_source"; then :; else
      { $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: unable to parse test group: $at_group" >&5
$as_echo "$as_me: WARNING: unable to parse test group: $at_group" >&2;}
      at_failed=:
    fi
    at_fn_group_postprocess
    test -f "$at_stop_file" && break
    at_first=false
  done
fi

# Wrap up the test suite with summary statistics.
cd "$at_helper_dir"

# Use ?..???? when the list must remain sorted, the faster * otherwise.
at_pass_list=`for f in */pass; do echo $f; done | sed '/\*/d; s,/pass,,'`
at_skip_list=`for f in */skip; do echo $f; done | sed '/\*/d; s,/skip,,'`
at_xfail_list=`for f in */xfail; do echo $f; done | sed '/\*/d; s,/xfail,,'`
at_xpass_list=`for f in ?/xpass ??/xpass ???/xpass ????/xpass; do
		 echo $f; done | sed '/?/d; s,/xpass,,'`
at_fail_list=`for f in ?/fail ??/fail ???/fail ????/fail; do
		echo $f; done | sed '/?/d; s,/fail,,'`

set X $at_pass_list $at_xpass_list $at_xfail_list $at_fail_list $at_skip_list
shift; at_group_count=$#
set X $at_xpass_list; shift; at_xpass_count=$#; at_xpass_list=$*
set X $at_xfail_list; shift; at_xfail_count=$#
set X $at_fail_list; shift; at_fail_count=$#; at_fail_list=$*
set X $at_skip_list; shift; at_skip_count=$#

as_fn_arith $at_group_count - $at_skip_count && at_run_count=$as_val
as_fn_arith $at_xpass_count + $at_fail_count && at_unexpected_count=$as_val
as_fn_arith $at_xfail_count + $at_fail_count && at_total_fail_count=$as_val

# Back to the top directory.
cd "$at_dir"
rm -rf "$at_helper_dir"

# Compute the duration of the suite.
at_stop_date=`date`
at_stop_time=`date +%s 2>/dev/null`
$as_echo "$as_me: ending at: $at_stop_date" >&5
case $at_start_time,$at_stop_time in
  [0-9]*,[0-9]*)
    as_fn_arith $at_stop_time - $at_start_time && at_duration_s=$as_val
    as_fn_arith $at_duration_s / 60 && at_duration_m=$as_val
    as_fn_arith $at_duration_m / 60 && at_duration_h=$as_val
    as_fn_arith $at_duration_s % 60 && at_duration_s=$as_val
    as_fn_arith $at_duration_m % 60 && at_duration_m=$as_val
    at_duration="${at_duration_h}h ${at_duration_m}m ${at_duration_s}s"
    $as_echo "$as_me: test suite duration: $at_duration" >&5
    ;;
esac

echo
$as_echo "## ------------- ##
## Test results. ##
## ------------- ##"
echo
{
  echo
  $as_echo "## ------------- ##
## Test results. ##
## ------------- ##"
  echo
} >&5

if test $at_run_count = 1; then
  at_result="1 test"
  at_were=was
else
  at_result="$at_run_count tests"
  at_were=were
fi
if $at_errexit_p && test $at_unexpected_count != 0; then
  if test $at_xpass_count = 1; then
    at_result="$at_result $at_were run, one passed"
  else
    at_result="$at_result $at_were run, one failed"
  fi
  at_result="$at_result unexpectedly and inhibited subsequent tests."
  at_color=$at_red
else
  # Don't you just love exponential explosion of the number of cases?
  at_color=$at_red
  case $at_xpass_count:$at_fail_count:$at_xfail_count in
    # So far, so good.
    0:0:0) at_result="$at_result $at_were successful." at_color=$at_grn ;;
    0:0:*) at_result="$at_result behaved as expected." at_color=$at_lgn ;;

    # Some unexpected failures
    0:*:0) at_result="$at_result $at_were run,
$at_fail_count failed unexpectedly." ;;

    # Some failures, both expected and unexpected
    0:*:1) at_result="$at_result $at_were run,
$at_total_fail_count failed ($at_xfail_count expected failure)." ;;
    0:*:*) at_result="$at_result $at_were run,
$at_total_fail_count failed ($at_xfail_count expected failures)." ;;

    # No unexpected failures, but some xpasses
    *:0:*) at_result="$at_result $at_were run,
$at_xpass_count passed unexpectedly." ;;

    # No expected failures, but failures and xpasses
    *:1:0) at_result="$at_result $at_were run,
$at_unexpected_count did not behave as expected ($at_fail_count unexpected failure)." ;;
    *:*:0) at_result="$at_result $at_were run,
$at_unexpected_count did not behave as expected ($at_fail_count unexpected failures)." ;;

    # All of them.
    *:*:1) at_result="$at_result $at_were run,
$at_xpass_count passed unexpectedly,
$at_total_fail_count failed ($at_xfail_count expected failure)." ;;
    *:*:*) at_result="$at_result $at_were run,
$at_xpass_count passed unexpectedly,
$at_total_fail_count failed ($at_xfail_count expected failures)." ;;
  esac

  if test $at_skip_count = 0 && test $at_run_count -gt 1; then
    at_result="All $at_result"
  fi
fi

# Now put skips in the mix.
case $at_skip_count in
  0) ;;
  1) at_result="$at_result
1 test was skipped." ;;
  *) at_result="$at_result
$at_skip_count tests were skipped." ;;
esac

if test $at_unexpected_count = 0; then
  echo "$at_color$at_result$at_std"
  echo "$at_result" >&5
else
  echo "${at_color}ERROR: $at_result$at_std" >&2
  echo "ERROR: $at_result" >&5
  {
    echo
    $as_echo "## ------------------------ ##
## Summary of the failures. ##
## ------------------------ ##"

    # Summary of failed and skipped tests.
    if test $at_fail_count != 0; then
      echo "Failed tests:"
      $SHELL "$at_myself" $at_fail_list --list
      echo
    fi
    if test $at_skip_count != 0; then
      echo "Skipped tests:"
      $SHELL "$at_myself" $at_skip_list --list
      echo
    fi
    if test $at_xpass_count != 0; then
      echo "Unexpected passes:"
      $SHELL "$at_myself" $at_xpass_list --list
      echo
    fi
    if test $at_fail_count != 0; then
      $as_echo "## ---------------------- ##
## Detailed failed tests. ##
## ---------------------- ##"
      echo
      for at_group in $at_fail_list
      do
	at_group_normalized=$at_group

  eval 'while :; do
    case $at_group_normalized in #(
    '"$at_format"'*) break;;
    esac
    at_group_normalized=0$at_group_normalized
  done'

	cat "$at_suite_dir/$at_group_normalized/$as_me.log"
	echo
      done
      echo
    fi
    if test -n "$at_top_srcdir"; then
      sed 'h;s/./-/g;s/^.../## /;s/...$/ ##/;p;x;p;x' <<_ASBOX
## ${at_top_build_prefix}config.log ##
_ASBOX
      sed 's/^/| /' ${at_top_build_prefix}config.log
      echo
    fi
  } >&5

  sed 'h;s/./-/g;s/^.../## /;s/...$/ ##/;p;x;p;x' <<_ASBOX
## $as_me.log was created. ##
_ASBOX

  echo
  if $at_debug_p; then
    at_msg='per-test log files'
  else
    at_msg="\`${at_testdir+${at_testdir}/}$as_me.log'"
  fi
  $as_echo "Please send $at_msg and all information you think might help:

   To: <https://github.com/firewalld/firewalld>
   Subject: [firewalld 0.7.1] $as_me: $at_fail_list${at_fail_list:+ failed${at_xpass_list:+, }}$at_xpass_list${at_xpass_list:+ passed unexpectedly}

You may investigate any problem if you feel able to do so, in which
case the test suite provides a good starting point.  Its output may
be found below \`${at_testdir+${at_testdir}/}$as_me.dir'.
"
  exit 1
fi

exit 0

## ------------- ##
## Actual tests. ##
## ------------- ##
#AT_START_1
at_fn_group_banner 1 'firewall-cmd.at:5' \
  "basic options" "                                  " 1
at_xfail=no
(
  $as_echo "1. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:5"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:5"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:17: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --complete-reload                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --complete-reload                 " "firewall-cmd.at:17"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --complete-reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }


















































































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_1
#AT_START_2
at_fn_group_banner 2 'firewall-cmd.at:28' \
  "get/list options" "                               " 1
at_xfail=no
(
  $as_echo "2. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:28: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:28"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:28: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:28"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi

























































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:34: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zones                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zones                 " "firewall-cmd.at:34"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:35: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-services                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-services                 " "firewall-cmd.at:35"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:36: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-icmptypes                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-icmptypes                 " "firewall-cmd.at:36"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-icmptypes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }












































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:40: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-all-zones                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-all-zones                 " "firewall-cmd.at:40"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-all-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:41: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-all                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-all                 " "firewall-cmd.at:41"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_2
#AT_START_3
at_fn_group_banner 3 'firewall-cmd.at:44' \
  "default zone" "                                   " 1
at_xfail=no
(
  $as_echo "3. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:44: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:44"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:44: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:44"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:47: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --get-default-zone"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --get-default-zone" "firewall-cmd.at:47"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:49: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone=\"home\""
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone=\"home\"" "firewall-cmd.at:49"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone="home"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:50: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --get-default-zone"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --get-default-zone" "firewall-cmd.at:50"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "home
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:52: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone=\"public\""
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone=\"public\"" "firewall-cmd.at:52"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:53: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone" "firewall-cmd.at:53"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:53"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_3
#AT_START_4
at_fn_group_banner 4 'firewall-cmd.at:56' \
  "user zone" "                                      " 1
at_xfail=no
(
  $as_echo "4. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:56: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:56"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:56: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:56"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:60: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone=foobar                 " "firewall-cmd.at:60"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-zone=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:60"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:61: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zones | grep foobar                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:61"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zones | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:61"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:62: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --get-target | grep default                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:62"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --get-target | grep default
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:63: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=BAD                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=BAD                 " "firewall-cmd.at:63"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=BAD
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 110 $at_status "$at_srcdir/firewall-cmd.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:64: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=%%REJECT%%                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=%%REJECT%%                 " "firewall-cmd.at:64"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=%%REJECT%%
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:65: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=DROP                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=DROP                 " "firewall-cmd.at:65"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:66: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=ACCEPT                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=ACCEPT                 " "firewall-cmd.at:66"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --set-target=ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:66"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:67: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --get-target | grep ACCEPT                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:67"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --get-target | grep ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:67"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:68: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --add-service=ssh                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --add-service=ssh                 " "firewall-cmd.at:68"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=foobar --add-service=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:68"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_4
#AT_START_5
at_fn_group_banner 5 'firewall-cmd.at:71' \
  "zone interfaces" "                                " 1
at_xfail=no
(
  $as_echo "5. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:71: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:71"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:71: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:71"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi





















































































































































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:103: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=dmz --get-default-zone"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=dmz --get-default-zone" "firewall-cmd.at:103"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=dmz --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:104: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=dmz --set-default-zone"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=dmz --set-default-zone" "firewall-cmd.at:104"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=dmz --set-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:104"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:107: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --add-interface=perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --add-interface=perm_dummy                 " "firewall-cmd.at:107"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --add-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:107"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:108: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=trusted --add-interface=perm_dummy2                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=trusted --add-interface=perm_dummy2                 " "firewall-cmd.at:108"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=trusted --add-interface=perm_dummy2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:108"
$at_failed && at_fn_log_failure
$at_traceon; }













































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:110: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-interface=perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-interface=perm_dummy                 " "firewall-cmd.at:110"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:110"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:112: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-interface=perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-interface=perm_dummy                 " "firewall-cmd.at:112"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:113: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --list-interfaces                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --list-interfaces                 " "firewall-cmd.at:113"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --list-interfaces
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "perm_dummy
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:113"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:119: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --change-interface=perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --change-interface=perm_dummy                 " "firewall-cmd.at:119"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --change-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:119"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:120: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-interface=perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-interface=perm_dummy                 " "firewall-cmd.at:120"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:120"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:122: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --remove-interface=perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --remove-interface=perm_dummy                 " "firewall-cmd.at:122"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --remove-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:122"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:123: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --query-interface perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --query-interface perm_dummy                 " "firewall-cmd.at:123"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --query-interface perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:123"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:124: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --change-interface=perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --change-interface=perm_dummy                 " "firewall-cmd.at:124"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --change-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:124"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:125: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-interface=perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-interface=perm_dummy                 " "firewall-cmd.at:125"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:125"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:127: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --remove-interface=perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --remove-interface=perm_dummy                 " "firewall-cmd.at:127"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --remove-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:127"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:128: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --query-interface perm_dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --query-interface perm_dummy                 " "firewall-cmd.at:128"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --query-interface perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:128"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:129: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=trusted --remove-interface=perm_dummy2                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=trusted --remove-interface=perm_dummy2                 " "firewall-cmd.at:129"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=trusted --remove-interface=perm_dummy2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:129"
$at_failed && at_fn_log_failure
$at_traceon; }







































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:134: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone=trusted"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone=trusted" "firewall-cmd.at:134"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone=trusted
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:134"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:135: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --get-default-zone"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --get-default-zone" "firewall-cmd.at:135"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "trusted
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:135"
$at_failed && at_fn_log_failure
$at_traceon; }












































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:141: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone=public"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone=public" "firewall-cmd.at:141"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --set-default-zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:141"
$at_failed && at_fn_log_failure
$at_traceon; }























































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:164: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-interface=foobar+                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-interface=foobar+                 " "firewall-cmd.at:164"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-interface=foobar+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:164"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:165: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-interface=foobar+                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-interface=foobar+                 " "firewall-cmd.at:165"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-interface=foobar+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:165"
$at_failed && at_fn_log_failure
$at_traceon; }

































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_5
#AT_START_6
at_fn_group_banner 6 'firewall-cmd.at:169' \
  "zone sources" "                                   " 1
at_xfail=no
(
  $as_echo "6. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:169: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:169"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:169"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:169: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:169"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:169"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi







































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=1.2.3.4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=1.2.3.4                 " "firewall-cmd.at:210"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=1.2.3.4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=1.2.3.4                 " "firewall-cmd.at:210"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources                 " "firewall-cmd.at:210"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:210"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=1.2.3.4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=1.2.3.4                 " "firewall-cmd.at:210"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=1.2.3.4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=1.2.3.4                 " "firewall-cmd.at:210"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=1.2.3.4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=1.2.3.4                 " "firewall-cmd.at:210"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=1.2.3.4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=1.2.3.4                 " "firewall-cmd.at:210"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=1.2.3.4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=1.2.3.4                 " "firewall-cmd.at:210"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }




































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=192.168.1.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=192.168.1.0/24                 " "firewall-cmd.at:211"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=192.168.1.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=192.168.1.0/24                 " "firewall-cmd.at:211"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources                 " "firewall-cmd.at:211"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:211"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=192.168.1.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=192.168.1.0/24                 " "firewall-cmd.at:211"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=192.168.1.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=192.168.1.0/24                 " "firewall-cmd.at:211"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=192.168.1.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=192.168.1.0/24                 " "firewall-cmd.at:211"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=192.168.1.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=192.168.1.0/24                 " "firewall-cmd.at:211"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=192.168.1.0/24                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=192.168.1.0/24                 " "firewall-cmd.at:211"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }






































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=3ffe:501:ffff::/64                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=3ffe:501:ffff::/64                 " "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=3ffe:501:ffff::/64                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=3ffe:501:ffff::/64                 " "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources                 " "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "3ffe:501:ffff::/64
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 3ffe:501:ffff::/64
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=3ffe:501:ffff::/64                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=3ffe:501:ffff::/64                 " "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=3ffe:501:ffff::/64                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=3ffe:501:ffff::/64                 " "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=3ffe:501:ffff::/64                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=3ffe:501:ffff::/64                 " "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=3ffe:501:ffff::/64                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=3ffe:501:ffff::/64                 " "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=3ffe:501:ffff::/64                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=3ffe:501:ffff::/64                 " "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }




































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=dead:beef::babe                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=dead:beef::babe                 " "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=dead:beef::babe                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=dead:beef::babe                 " "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources                 " "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dead:beef::babe
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: dead:beef::babe
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=dead:beef::babe                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=dead:beef::babe                 " "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone public --query-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=dead:beef::babe                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=dead:beef::babe                 " "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --change-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=dead:beef::babe                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=dead:beef::babe                 " "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-zone-of-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=dead:beef::babe                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=dead:beef::babe                 " "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=work --remove-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=dead:beef::babe                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=dead:beef::babe                 " "firewall-cmd.at:212"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone work --query-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }













      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_6
#AT_START_7
at_fn_group_banner 7 'firewall-cmd.at:221' \
  "services" "                                       " 1
at_xfail=no
(
  $as_echo "7. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:221: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:221"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:221"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:221: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:221"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:221"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi


















































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:233: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-service dns                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-service dns                 " "firewall-cmd.at:233"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-service dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:233"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:234: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --list-services                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --list-services                 " "firewall-cmd.at:234"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --list-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dns ssh
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:234"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:236: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-service dns                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-service dns                 " "firewall-cmd.at:236"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-service dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:236"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:237: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --remove-service-from-zone=dns                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --remove-service-from-zone=dns                 " "firewall-cmd.at:237"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --remove-service-from-zone=dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:237"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:242: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-service=dns                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-service=dns                 " "firewall-cmd.at:242"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-service=dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:242"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:243: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-service=smtpssssssss                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-service=smtpssssssss                 " "firewall-cmd.at:243"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-service=smtpssssssss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/firewall-cmd.at:243"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:244: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-service=dns --add-interface=dummy0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-service=dns --add-interface=dummy0                 " "firewall-cmd.at:244"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-service=dns --add-interface=dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:244"
$at_failed && at_fn_log_failure
$at_traceon; }




























































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:253: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-service=http --add-service=nfs                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-service=http --add-service=nfs                 " "firewall-cmd.at:253"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-service=http --add-service=nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:253"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:254: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-service http                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-service http                 " "firewall-cmd.at:254"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:254"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:255: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-service=nfs --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-service=nfs --zone=public                 " "firewall-cmd.at:255"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-service=nfs --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:255"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:256: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-service-from-zone=nfs --remove-service-from-zone=http                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-service-from-zone=nfs --remove-service-from-zone=http                 " "firewall-cmd.at:256"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-service-from-zone=nfs --remove-service-from-zone=http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:256"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:261: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                             --query-service http                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                             --query-service http                 " "firewall-cmd.at:261"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                             --query-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:261"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:262: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                             --query-service nfs                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                             --query-service nfs                 " "firewall-cmd.at:262"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                             --query-service nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:262"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_7
#AT_START_8
at_fn_group_banner 8 'firewall-cmd.at:265' \
  "user services" "                                  " 1
at_xfail=no
(
  $as_echo "8. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:265: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:265"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:265"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:265: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:265"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:265"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:268: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-service=ssh                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-service=ssh                 " "firewall-cmd.at:268"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-service=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 26 $at_status "$at_srcdir/firewall-cmd.at:268"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:270: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-service=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-service=foobar                 " "firewall-cmd.at:270"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-service=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:270"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:271: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-services | grep foobar                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:271"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-services | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:271"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:273: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666                 " "firewall-cmd.at:273"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:273"
$at_failed && at_fn_log_failure
$at_traceon; }


















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:274: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/dummy                 " "firewall-cmd.at:274"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:274"
$at_failed && at_fn_log_failure
$at_traceon; }


















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:275: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/tcp                 " "firewall-cmd.at:275"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:275"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:276: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port=666/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port=666/tcp                 " "firewall-cmd.at:276"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:276"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:277: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=111-222/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=111-222/udp                 " "firewall-cmd.at:277"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:277"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:278: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=111-222/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=111-222/udp                 " "firewall-cmd.at:278"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:278"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:279: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port 111-222/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port 111-222/udp                 " "firewall-cmd.at:279"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:279"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:280: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=111-222/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=111-222/udp                 " "firewall-cmd.at:280"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:280"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:281: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/sctp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/sctp                 " "firewall-cmd.at:281"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:281"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:282: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port=666/sctp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port=666/sctp                 " "firewall-cmd.at:282"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:282"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:283: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port 666/sctp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port 666/sctp                 " "firewall-cmd.at:283"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port 666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:283"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:284: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=666/sctp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=666/sctp                 " "firewall-cmd.at:284"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:284"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:285: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=999/dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=999/dccp                 " "firewall-cmd.at:285"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:285"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:286: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port=999/dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port=999/dccp                 " "firewall-cmd.at:286"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:286"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:287: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port 999/dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port 999/dccp                 " "firewall-cmd.at:287"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-port 999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:287"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:288: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=999/dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=999/dccp                 " "firewall-cmd.at:288"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:288"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:289: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/sctp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/sctp                 " "firewall-cmd.at:289"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:289"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:290: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=999/dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=999/dccp                 " "firewall-cmd.at:290"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:290"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:292: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-protocol=ddp --add-protocol gre                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-protocol=ddp --add-protocol gre                 " "firewall-cmd.at:292"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-protocol=ddp --add-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:292"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:293: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=ddp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=ddp                 " "firewall-cmd.at:293"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:293"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:294: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=gre                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=gre                 " "firewall-cmd.at:294"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:294"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:295: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-protocol ddp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-protocol ddp                 " "firewall-cmd.at:295"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-protocol ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:295"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:296: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-protocol gre                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-protocol gre                 " "firewall-cmd.at:296"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:296"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:297: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=ddp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=ddp                 " "firewall-cmd.at:297"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:297"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:298: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=gre                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=gre                 " "firewall-cmd.at:298"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:298"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:300: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-module=sip                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-module=sip                 " "firewall-cmd.at:300"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-module=sip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:300"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:301: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-module=sip                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-module=sip                 " "firewall-cmd.at:301"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-module=sip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:301"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:302: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-module=ftp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-module=ftp                 " "firewall-cmd.at:302"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --add-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:302"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:303: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-module=ftp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-module=ftp                 " "firewall-cmd.at:303"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:303"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:304: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-module=ftp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-module=ftp                 " "firewall-cmd.at:304"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:304"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:305: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-module=ftp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-module=ftp                 " "firewall-cmd.at:305"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:305"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:307: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv4                 " "firewall-cmd.at:307"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 121 $at_status "$at_srcdir/firewall-cmd.at:307"
$at_failed && at_fn_log_failure
$at_traceon; }


















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:308: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv4:foo                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv4:foo                 " "firewall-cmd.at:308"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv4:foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/firewall-cmd.at:308"
$at_failed && at_fn_log_failure
$at_traceon; }


















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:309: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv4:1.2.3.4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv4:1.2.3.4                 " "firewall-cmd.at:309"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv4:1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:309"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:310: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-destination=ipv4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-destination=ipv4                 " "firewall-cmd.at:310"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:310"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:311: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv6:fd00:dead:beef:ff0::/64                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv6:fd00:dead:beef:ff0::/64                 " "firewall-cmd.at:311"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --set-destination=ipv6:fd00:dead:beef:ff0::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:311"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:311: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64                 " "firewall-cmd.at:311"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:311"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:311: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-destination=ipv6                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-destination=ipv6                 " "firewall-cmd.at:311"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --remove-destination=ipv6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:311"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:311: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64                 " "firewall-cmd.at:311"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:311"
$at_failed && at_fn_log_failure
$at_traceon; }






















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:318: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-service=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-service=foobar                 " "firewall-cmd.at:318"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-service=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:318"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:319: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-services | grep foobar                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:319"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-services | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:319"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:320: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-service=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-service=foobar                 " "firewall-cmd.at:320"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-service=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:320"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:321: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-services | grep foobar                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:321"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-services | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:321"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./foobar-to-be-renamed <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<protocol value="icmp" />
<port protocol="tcp" port="1234" />
</service>















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:323: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-service-from-file=\"./foobar-to-be-renamed\" --name=\"foobar-from-file\"                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-service-from-file=\"./foobar-to-be-renamed\" --name=\"foobar-from-file\"                 " "firewall-cmd.at:323"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-service-from-file="./foobar-to-be-renamed" --name="foobar-from-file"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:323"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:323: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-services | grep foobar-from-file                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:323"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-services | grep foobar-from-file
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:323"
$at_failed && at_fn_log_failure
$at_traceon; }





_ATEOF




      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_8
#AT_START_9
at_fn_group_banner 9 'firewall-cmd.at:337' \
  "ports" "                                          " 1
at_xfail=no
(
  $as_echo "9. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:337: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:337"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:337"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:337: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:337"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:337"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi

























































































































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:361: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=666                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=666                 " "firewall-cmd.at:361"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:361"
$at_failed && at_fn_log_failure
$at_traceon; }


















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:362: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=666/dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=666/dummy                 " "firewall-cmd.at:362"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:362"
$at_failed && at_fn_log_failure
$at_traceon; }


















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:363: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=666/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=666/tcp                 " "firewall-cmd.at:363"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:363"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:364: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port=666/tcp --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port=666/tcp --zone=public                 " "firewall-cmd.at:364"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port=666/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:364"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:365: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=111-222/udp --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=111-222/udp --zone=public                 " "firewall-cmd.at:365"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=111-222/udp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:365"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:366: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=111-222/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=111-222/udp                 " "firewall-cmd.at:366"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:366"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:367: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 111-222/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 111-222/udp                 " "firewall-cmd.at:367"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:367"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:368: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=111-222/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=111-222/udp                 " "firewall-cmd.at:368"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:368"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:370: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=5000/sctp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=5000/sctp                 " "firewall-cmd.at:370"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:370"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:371: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=5000/sctp --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=5000/sctp --zone=public                 " "firewall-cmd.at:371"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=5000/sctp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:371"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:372: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 5000/sctp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 5000/sctp                 " "firewall-cmd.at:372"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:372"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:373: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=5000/sctp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=5000/sctp                 " "firewall-cmd.at:373"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:373"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:374: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=222/dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=222/dccp                 " "firewall-cmd.at:374"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:374"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:375: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=222/dccp --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=222/dccp --zone=public                 " "firewall-cmd.at:375"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=222/dccp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:375"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:376: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 222/dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 222/dccp                 " "firewall-cmd.at:376"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:376"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:377: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=222/dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=222/dccp                 " "firewall-cmd.at:377"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:377"
$at_failed && at_fn_log_failure
$at_traceon; }





























































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:386: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=80/tcp --add-port 443-444/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=80/tcp --add-port 443-444/udp                 " "firewall-cmd.at:386"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-port=80/tcp --add-port 443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:386"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:387: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=80/tcp --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=80/tcp --zone=public                 " "firewall-cmd.at:387"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=80/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:387"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:388: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=443-444/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=443-444/udp                 " "firewall-cmd.at:388"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:388"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:389: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 80/tcp --remove-port=443-444/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 80/tcp --remove-port=443-444/udp                 " "firewall-cmd.at:389"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-port 80/tcp --remove-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:389"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:390: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=80/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=80/tcp                 " "firewall-cmd.at:390"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=80/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:390"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:391: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=443-444/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=443-444/udp                 " "firewall-cmd.at:391"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:391"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_9
#AT_START_10
at_fn_group_banner 10 'firewall-cmd.at:394' \
  "source ports" "                                   " 1
at_xfail=no
(
  $as_echo "10. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:394: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:394"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:394"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:394: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:394"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:394"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi
































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:407: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=666                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=666                 " "firewall-cmd.at:407"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:407"
$at_failed && at_fn_log_failure
$at_traceon; }


















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:408: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=666/dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=666/dummy                 " "firewall-cmd.at:408"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:408"
$at_failed && at_fn_log_failure
$at_traceon; }


















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:409: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=666/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=666/tcp                 " "firewall-cmd.at:409"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:409"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:410: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-source-port=666/tcp --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-source-port=666/tcp --zone=public                 " "firewall-cmd.at:410"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-source-port=666/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:410"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:411: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=111-222/udp --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=111-222/udp --zone=public                 " "firewall-cmd.at:411"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=111-222/udp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:411"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:412: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=111-222/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=111-222/udp                 " "firewall-cmd.at:412"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:412"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:413: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-source-port 111-222/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-source-port 111-222/udp                 " "firewall-cmd.at:413"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-source-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:413"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:414: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=111-222/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=111-222/udp                 " "firewall-cmd.at:414"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:414"
$at_failed && at_fn_log_failure
$at_traceon; }





























































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:423: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=80/tcp --add-source-port 443-444/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=80/tcp --add-source-port 443-444/udp                 " "firewall-cmd.at:423"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-source-port=80/tcp --add-source-port 443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:423"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:424: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=80/tcp --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=80/tcp --zone=public                 " "firewall-cmd.at:424"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=80/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:424"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:425: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=443-444/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=443-444/udp                 " "firewall-cmd.at:425"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:425"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:426: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-source-port 80/tcp --remove-source-port=443-444/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-source-port 80/tcp --remove-source-port=443-444/udp                 " "firewall-cmd.at:426"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-source-port 80/tcp --remove-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:426"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:427: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=80/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=80/tcp                 " "firewall-cmd.at:427"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=80/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:427"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:428: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=443-444/udp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=443-444/udp                 " "firewall-cmd.at:428"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:428"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_10
#AT_START_11
at_fn_group_banner 11 'firewall-cmd.at:431' \
  "protocols" "                                      " 1
at_xfail=no
(
  $as_echo "11. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:431: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:431"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:431"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:431: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:431"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:431"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi

















































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:439: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-protocol=dummy                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-protocol=dummy                 " "firewall-cmd.at:439"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-protocol=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:439"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:440: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-protocol=dccp --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-protocol=dccp --zone=public                 " "firewall-cmd.at:440"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-protocol=dccp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:440"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:441: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=dccp                 " "firewall-cmd.at:441"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:441"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:442: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-protocol dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-protocol dccp                 " "firewall-cmd.at:442"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:442"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:443: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=dccp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=dccp                 " "firewall-cmd.at:443"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:443"
$at_failed && at_fn_log_failure
$at_traceon; }




























































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:451: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-protocol=ddp --add-protocol gre                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-protocol=ddp --add-protocol gre                 " "firewall-cmd.at:451"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-protocol=ddp --add-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:451"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:452: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=ddp --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=ddp --zone=public                 " "firewall-cmd.at:452"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=ddp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:452"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:453: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=gre                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=gre                 " "firewall-cmd.at:453"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:453"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:454: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-protocol ddp --remove-protocol=gre                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-protocol ddp --remove-protocol=gre                 " "firewall-cmd.at:454"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-protocol ddp --remove-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:454"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:455: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=ddp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=ddp                 " "firewall-cmd.at:455"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:455"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:456: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=gre                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=gre                 " "firewall-cmd.at:456"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:456"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_11
#AT_START_12
at_fn_group_banner 12 'firewall-cmd.at:459' \
  "masquerade" "                                     " 1
at_xfail=no
(
  $as_echo "12. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:459: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:459"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:459"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:459: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:459"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:459"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:467: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-masquerade --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-masquerade --zone=public                 " "firewall-cmd.at:467"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-masquerade --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:467"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:468: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-masquerade                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-masquerade                 " "firewall-cmd.at:468"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:468"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:469: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-masquerade                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-masquerade                 " "firewall-cmd.at:469"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:469"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:470: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-masquerade                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-masquerade                 " "firewall-cmd.at:470"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:470"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_12
#AT_START_13
at_fn_group_banner 13 'firewall-cmd.at:473' \
  "forward ports" "                                  " 1
at_xfail=no
(
  $as_echo "13. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:473: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:473"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:473"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:473: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:473"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:473"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi





































































































































































































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:504: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=666                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=666                 " "firewall-cmd.at:504"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/firewall-cmd.at:504"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:505: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=11:proto=tcp:toport=22                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=11:proto=tcp:toport=22                 " "firewall-cmd.at:505"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=11:proto=tcp:toport=22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:505"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:506: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public                 " "firewall-cmd.at:506"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:506"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:507: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=33:proto=tcp:toaddr=4444                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=33:proto=tcp:toaddr=4444                 " "firewall-cmd.at:507"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=33:proto=tcp:toaddr=4444
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/firewall-cmd.at:507"
$at_failed && at_fn_log_failure
$at_traceon; }


















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:508: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public                 " "firewall-cmd.at:508"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:508"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:509: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4                 " "firewall-cmd.at:509"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:509"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:510: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7                 " "firewall-cmd.at:510"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:510"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:511: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public                 " "firewall-cmd.at:511"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:511"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:512: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7                 " "firewall-cmd.at:512"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:512"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:513: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7                 " "firewall-cmd.at:513"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:513"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:514: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7                 " "firewall-cmd.at:514"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:514"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:515: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public                 " "firewall-cmd.at:515"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:515"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:516: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7                 " "firewall-cmd.at:516"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:516"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:517: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7                 " "firewall-cmd.at:517"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:517"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:518: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::                 " "firewall-cmd.at:518"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:518"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:518: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: --zone=public                 " "firewall-cmd.at:518"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:518"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:518: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::                 " "firewall-cmd.at:518"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:518"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:518: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::                 " "firewall-cmd.at:518"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:518"
$at_failed && at_fn_log_failure
$at_traceon; }





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:524: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200                 " "firewall-cmd.at:524"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:524"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:525: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=100:proto=tcp:toport=200                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=100:proto=tcp:toport=200                 " "firewall-cmd.at:525"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:525"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:526: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=88:proto=udp:toport=99 --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=88:proto=udp:toport=99 --zone=public                 " "firewall-cmd.at:526"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=88:proto=udp:toport=99 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:526"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:527: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99                 " "firewall-cmd.at:527"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:527"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:528: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=100:proto=tcp:toport=200                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=100:proto=tcp:toport=200                 " "firewall-cmd.at:528"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:528"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:529: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=88:proto=udp:toport=99                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=88:proto=udp:toport=99                 " "firewall-cmd.at:529"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-forward-port=port=88:proto=udp:toport=99
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:529"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:530: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-forward-ports                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-forward-ports                 " "firewall-cmd.at:530"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-forward-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:530"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_13
#AT_START_14
at_fn_group_banner 14 'firewall-cmd.at:533' \
  "ICMP block" "                                     " 1
at_xfail=no
(
  $as_echo "14. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:533: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:533"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:533"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:533: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:533"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:533"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






























































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:543: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-icmp-block=dummyblock                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-icmp-block=dummyblock                 " "firewall-cmd.at:543"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-icmp-block=dummyblock
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/firewall-cmd.at:543"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:544: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-icmp-block=redirect                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-icmp-block=redirect                 " "firewall-cmd.at:544"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:544"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:545: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=redirect                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=redirect                 " "firewall-cmd.at:545"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:545"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:546: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --remove-icmp-block redirect                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --remove-icmp-block redirect                 " "firewall-cmd.at:546"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --remove-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:546"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:547: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=redirect                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=redirect                 " "firewall-cmd.at:547"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:547"
$at_failed && at_fn_log_failure
$at_traceon; }




































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:553: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-icmp-block-inversion --zone=public                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-icmp-block-inversion --zone=public                 " "firewall-cmd.at:553"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-icmp-block-inversion --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:553"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:554: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-icmp-block-inversion                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-icmp-block-inversion                 " "firewall-cmd.at:554"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:554"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:555: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-icmp-block-inversion                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-icmp-block-inversion                 " "firewall-cmd.at:555"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:555"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:556: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-icmp-block-inversion                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-icmp-block-inversion                 " "firewall-cmd.at:556"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:556"
$at_failed && at_fn_log_failure
$at_traceon; }





































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:571: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation                 " "firewall-cmd.at:571"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:571"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:572: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=echo-reply                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=echo-reply                 " "firewall-cmd.at:572"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:572"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:573: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=router-solicitation                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=router-solicitation                 " "firewall-cmd.at:573"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:573"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:574: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation                 " "firewall-cmd.at:574"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:574"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:575: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=echo-reply                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=echo-reply                 " "firewall-cmd.at:575"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:575"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:576: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=router-solicitation                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=router-solicitation                 " "firewall-cmd.at:576"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=external --query-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:576"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_14
#AT_START_15
at_fn_group_banner 15 'firewall-cmd.at:579' \
  "user ICMP types" "                                " 1
at_xfail=no
(
  $as_echo "15. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:579: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:579"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:579"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:579: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:579"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:579"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:582: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-icmptype=redirect                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-icmptype=redirect                 " "firewall-cmd.at:582"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-icmptype=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 26 $at_status "$at_srcdir/firewall-cmd.at:582"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:584: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-icmptype=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-icmptype=foobar                 " "firewall-cmd.at:584"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-icmptype=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:584"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:585: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-icmptypes | grep foobar                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:585"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-icmptypes | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:585"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:587: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --add-destination=ipv5                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --add-destination=ipv5                 " "firewall-cmd.at:587"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --add-destination=ipv5
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:587"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:588: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --add-destination=ipv4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --add-destination=ipv4                 " "firewall-cmd.at:588"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --add-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:588"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:589: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --remove-destination=ipv4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --remove-destination=ipv4                 " "firewall-cmd.at:589"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --remove-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:589"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:590: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --add-destination=ipv4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --add-destination=ipv4                 " "firewall-cmd.at:590"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --add-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:590"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:591: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --query-destination=ipv4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --query-destination=ipv4                 " "firewall-cmd.at:591"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --query-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:591"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:592: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --remove-destination=ipv4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --remove-destination=ipv4                 " "firewall-cmd.at:592"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --remove-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:592"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:593: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --query-destination=ipv4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --query-destination=ipv4                 " "firewall-cmd.at:593"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --icmptype=foobar --query-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:593"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:595: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-icmp-block=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-icmp-block=foobar                 " "firewall-cmd.at:595"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --add-icmp-block=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:595"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:596: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-icmp-blocks | grep foobar                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:596"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-icmp-blocks | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:596"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:598: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-icmptype=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-icmptype=foobar                 " "firewall-cmd.at:598"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-icmptype=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:598"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:599: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-icmp-blocks | grep foobar                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:599"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --zone=public --list-icmp-blocks | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:599"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_15
#AT_START_16
at_fn_group_banner 16 'firewall-cmd.at:602' \
  "ipset" "                                          " 1
at_xfail=no
(
  $as_echo "16. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:602: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:602"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:602"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:602: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:602"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:602"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi




























    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:608: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip                 " "firewall-cmd.at:608"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:608"
$at_failed && at_fn_log_failure
$at_traceon; }

















































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:626: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 " "firewall-cmd.at:626"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:626"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:630: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip,port                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip,port                 " "firewall-cmd.at:630"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip,port
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:630"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:631: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,1234                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,1234                 " "firewall-cmd.at:631"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:631"
$at_failed && at_fn_log_failure
$at_traceon; }

























































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:634: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 " "firewall-cmd.at:634"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:634"
$at_failed && at_fn_log_failure
$at_traceon; }














































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:638: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip,port                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip,port                 " "firewall-cmd.at:638"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:ip,port
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:638"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:639: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,sctp:1234                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,sctp:1234                 " "firewall-cmd.at:639"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=10.10.10.10,sctp:1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:639"
$at_failed && at_fn_log_failure
$at_traceon; }

























































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:642: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 " "firewall-cmd.at:642"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:642"
$at_failed && at_fn_log_failure
$at_traceon; }
















































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:645: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:mac                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:mac                 " "firewall-cmd.at:645"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-ipset=foobar --type=hash:mac
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:645"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:645: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=12:34:56:78:90:ab                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=12:34:56:78:90:ab                 " "firewall-cmd.at:645"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --ipset=foobar --add-entry=12:34:56:78:90:ab
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:645"
$at_failed && at_fn_log_failure
$at_traceon; }

























































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:645: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar                 " "firewall-cmd.at:645"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:645"
$at_failed && at_fn_log_failure
$at_traceon; }



































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_16
#AT_START_17
at_fn_group_banner 17 'firewall-cmd.at:655' \
  "user helpers" "                                   " 1
at_xfail=no
(
  $as_echo "17. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:655: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:655"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:655"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:655: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:655"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:655"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi





















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:658: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-helper=foobar --module=foo                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-helper=foobar --module=foo                 " "firewall-cmd.at:658"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-helper=foobar --module=foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 132 $at_status "$at_srcdir/firewall-cmd.at:658"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:659: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-helper=foobar --module=nf_conntrack_foo                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-helper=foobar --module=nf_conntrack_foo                 " "firewall-cmd.at:659"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --new-helper=foobar --module=nf_conntrack_foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:659"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:660: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-helpers | grep foobar                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:660"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-helpers | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:660"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:661: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-family | grep ipv4                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:661"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-family | grep ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:661"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:662: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --set-family=ipv5                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --set-family=ipv5                 " "firewall-cmd.at:662"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --set-family=ipv5
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:662"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:663: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --set-family=ipv4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --set-family=ipv4                 " "firewall-cmd.at:663"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --set-family=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:663"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:664: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-family | grep ipv4                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:664"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-family | grep ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:664"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:665: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --set-family=                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --set-family=                 " "firewall-cmd.at:665"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --set-family=
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:665"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:667: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-family                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-family                 " "firewall-cmd.at:667"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-family
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:667"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:669: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-ports                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-ports                 " "firewall-cmd.at:669"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:669"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:672: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --add-port=44/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --add-port=44/tcp                 " "firewall-cmd.at:672"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --add-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:672"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:673: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-ports | grep 44                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:673"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-ports | grep 44
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:673"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:674: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --query-port=44/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --query-port=44/tcp                 " "firewall-cmd.at:674"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --query-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:674"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:675: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --remove-port=44/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --remove-port=44/tcp                 " "firewall-cmd.at:675"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --remove-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:675"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:676: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --query-port=44/tcp                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --query-port=44/tcp                 " "firewall-cmd.at:676"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --query-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:676"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:677: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-ports                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-ports                 " "firewall-cmd.at:677"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --helper=foobar --get-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:677"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:679: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-helper=foobar                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-helper=foobar                 " "firewall-cmd.at:679"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --delete-helper=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:679"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:680: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-helpers | grep foobar                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:680"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --get-helpers | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:680"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_17
#AT_START_18
at_fn_group_banner 18 'firewall-cmd.at:683' \
  "direct" "                                         " 1
at_xfail=no
(
  $as_echo "18. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:683: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:683"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:683"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:683: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:683"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:683"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






























































































































































































































































































































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:726: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --direct --get-default-zone"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --direct --get-default-zone" "firewall-cmd.at:726"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --direct --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:726"
$at_failed && at_fn_log_failure
$at_traceon; }































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:728: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                      --direct                       --list-all                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      --direct                       --list-all                 " "firewall-cmd.at:728"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                      --direct                       --list-all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:728"
$at_failed && at_fn_log_failure
$at_traceon; }




















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:731: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-chain ipv4 filter žluťoučký                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-chain ipv4 filter žluťoučký                 " "firewall-cmd.at:731"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:731"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:732: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-chains ipv4 filter |grep \"žluťoučký\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:732"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-chains ipv4 filter |grep "žluťoučký"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:732"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:733: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-all-chains | grep \"ipv4 filter žluťoučký\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:733"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-all-chains | grep "ipv4 filter žluťoučký"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:733"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:734: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-chain ipv4 filter žluťoučký                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-chain ipv4 filter žluťoučký                 " "firewall-cmd.at:734"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:734"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:735: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 filter žluťoučký 3 -j ACCEPT                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 filter žluťoučký 3 -j ACCEPT                 " "firewall-cmd.at:735"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:735"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:736: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-rules ipv4 filter žluťoučký | grep ACCEPT                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:736"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-rules ipv4 filter žluťoučký | grep ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:736"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:737: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-all-rules | grep \"ipv4 filter žluťoučký 3 -j ACCEPT\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:737"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-all-rules | grep "ipv4 filter žluťoučký 3 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:737"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:738: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT                 " "firewall-cmd.at:738"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:738"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:739: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-rule ipv4 filter žluťoučký 3 -j ACCEPT                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-rule ipv4 filter žluťoučký 3 -j ACCEPT                 " "firewall-cmd.at:739"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:739"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:740: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT                 " "firewall-cmd.at:740"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:740"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:741: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-chain ipv4 filter žluťoučký                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-chain ipv4 filter žluťoučký                 " "firewall-cmd.at:741"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:741"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:742: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-chain ipv4 filter žluťoučký                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-chain ipv4 filter žluťoučký                 " "firewall-cmd.at:742"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:742"
$at_failed && at_fn_log_failure
$at_traceon; }




























































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:751: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT                 " "firewall-cmd.at:751"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:751"
$at_failed && at_fn_log_failure
$at_traceon; }

































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_18
#AT_START_19
at_fn_group_banner 19 'firewall-cmd.at:756' \
  "direct nat" "                                     " 1
at_xfail=no
(
  $as_echo "19. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:756: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:756"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:756"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:756: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:756"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:756"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi



























    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:763: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81                 " "firewall-cmd.at:763"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:763"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:764: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:764"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:764"
$at_failed && at_fn_log_failure
$at_traceon; }











































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:767: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81                 " "firewall-cmd.at:767"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:767"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:768: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82                 " "firewall-cmd.at:768"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:768"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:769: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:769"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:769"
$at_failed && at_fn_log_failure
$at_traceon; }























































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:773: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82                 " "firewall-cmd.at:773"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:773"
$at_failed && at_fn_log_failure
$at_traceon; }

































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_19
#AT_START_20
at_fn_group_banner 20 'firewall-cmd.at:780' \
  "direct passthrough" "                             " 1
at_xfail=no
(
  $as_echo "20. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:780: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:780"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:780"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:780: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:780"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:780"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:783: if ! modprobe dummy; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:783"
( $at_check_trace; if ! modprobe dummy; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:783"
$at_failed && at_fn_log_failure
$at_traceon; }






































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:809: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-passthrough ipv4                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-passthrough ipv4                 " "firewall-cmd.at:809"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-passthrough ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:809"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:810: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-passthrough ipv5 -nvL                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-passthrough ipv5 -nvL                 " "firewall-cmd.at:810"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-passthrough ipv5 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:810"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:811: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-passthrough ipv4 -nvL                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-passthrough ipv4 -nvL                 " "firewall-cmd.at:811"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:811"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:812: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-passthroughs ipv4 | grep \"\\-nvL\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:812"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-passthroughs ipv4 | grep "\-nvL"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:812"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:813: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-all-passthroughs | grep \"ipv4 \\-nvL\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:813"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-all-passthroughs | grep "ipv4 \-nvL"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:813"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:814: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-passthrough ipv4 -nvL                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-passthrough ipv4 -nvL                 " "firewall-cmd.at:814"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:814"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:815: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-passthrough ipv4 -nvL                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-passthrough ipv4 -nvL                 " "firewall-cmd.at:815"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --remove-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:815"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:816: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-passthrough ipv4 -nvL                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-passthrough ipv4 -nvL                 " "firewall-cmd.at:816"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --query-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:816"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_20
#AT_START_21
at_fn_group_banner 21 'firewall-cmd.at:819' \
  "direct ebtables" "                                " 1
at_xfail=no
(
  $as_echo "21. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:819: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:819"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:819"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:819: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:819"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:819"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi














































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:854: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-chain eb filter mychain                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-chain eb filter mychain                 " "firewall-cmd.at:854"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-chain eb filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:854"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:855: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-chains eb filter | grep mychain                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:855"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --get-chains eb filter | grep mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:855"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:856: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP                 " "firewall-cmd.at:856"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:856"
$at_failed && at_fn_log_failure
$at_traceon; }




































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_21
#AT_START_22
at_fn_group_banner 22 'firewall-cmd.at:864' \
  "lockdown" "                                       " 1
at_xfail=no
(
  $as_echo "22. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:864: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:864"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:864"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:864: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:864"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:864"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi

















































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:872: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-command /usr/bin/command                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-command /usr/bin/command                 " "firewall-cmd.at:872"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:872"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:873: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-command /usr/bin/command                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-command /usr/bin/command                 " "firewall-cmd.at:873"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:873"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:874: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-lockdown-whitelist-commands | grep \"/usr/bin/command\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:874"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-lockdown-whitelist-commands | grep "/usr/bin/command"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:874"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:875: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-command /usr/bin/command                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-command /usr/bin/command                 " "firewall-cmd.at:875"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:875"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:876: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-command /usr/bin/command                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-command /usr/bin/command                 " "firewall-cmd.at:876"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:876"
$at_failed && at_fn_log_failure
$at_traceon; }
















































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:883: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0                 " "firewall-cmd.at:883"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:883"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:884: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0                 " "firewall-cmd.at:884"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:884"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:885: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-lockdown-whitelist-contexts | grep \"system_u:system_r:MadDaemon_t:s0\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:885"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-lockdown-whitelist-contexts | grep "system_u:system_r:MadDaemon_t:s0"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:885"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:886: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0                 " "firewall-cmd.at:886"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:886"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:887: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0                 " "firewall-cmd.at:887"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:887"
$at_failed && at_fn_log_failure
$at_traceon; }




























































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:895: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-uid 6666                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-uid 6666                 " "firewall-cmd.at:895"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:895"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:896: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-uid 6666                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-uid 6666                 " "firewall-cmd.at:896"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:896"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:897: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-lockdown-whitelist-uids | grep \"6666\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:897"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-lockdown-whitelist-uids | grep "6666"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:897"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:898: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-uid 6666                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-uid 6666                 " "firewall-cmd.at:898"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:898"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:899: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-uid 6666                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-uid 6666                 " "firewall-cmd.at:899"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:899"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:900: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-uid 6666x                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-uid 6666x                 " "firewall-cmd.at:900"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-uid 6666x
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:900"
$at_failed && at_fn_log_failure
$at_traceon; }
















































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:907: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-user theboss                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-user theboss                 " "firewall-cmd.at:907"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:907"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:908: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-user theboss                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-user theboss                 " "firewall-cmd.at:908"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:908"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:909: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-lockdown-whitelist-users | grep \"theboss\"                 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:909"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --list-lockdown-whitelist-users | grep "theboss"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:909"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:910: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-user theboss                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-user theboss                 " "firewall-cmd.at:910"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:910"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:911: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-user theboss                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-user theboss                 " "firewall-cmd.at:911"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:911"
$at_failed && at_fn_log_failure
$at_traceon; }






    $as_echo "firewall-cmd.at:913" >"$at_check_line_file"
(test `whoami` != 'root') \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:913"






























































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_22
#AT_START_23
at_fn_group_banner 23 'firewall-cmd.at:931' \
  "rich rules good" "                                " 1
at_xfail=no
(
  $as_echo "23. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:931: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:931"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:931"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:931: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:931"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:931"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:934: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"ah\" reject'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"ah\" reject'                 " "firewall-cmd.at:934"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:934"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:934: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"ah\" reject'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"ah\" reject'                 " "firewall-cmd.at:934"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:934"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:934: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule protocol value=\"ah\" reject'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule protocol value=\"ah\" reject'                 " "firewall-cmd.at:934"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:934"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:934: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"ah\" reject'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"ah\" reject'                 " "firewall-cmd.at:934"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:934"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:935: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"esp\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"esp\" accept'                 " "firewall-cmd.at:935"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:935"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:935: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"esp\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"esp\" accept'                 " "firewall-cmd.at:935"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:935"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:935: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule protocol value=\"esp\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule protocol value=\"esp\" accept'                 " "firewall-cmd.at:935"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:935"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:935: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"esp\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"esp\" accept'                 " "firewall-cmd.at:935"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:935"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:936: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"sctp\" log'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"sctp\" log'                 " "firewall-cmd.at:936"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:936"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:936: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"sctp\" log'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"sctp\" log'                 " "firewall-cmd.at:936"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:936"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:936: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule protocol value=\"sctp\" log'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule protocol value=\"sctp\" log'                 " "firewall-cmd.at:936"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:936"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:936: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"sctp\" log'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value=\"sctp\" log'                 " "firewall-cmd.at:936"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:936"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:937: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept'                 " "firewall-cmd.at:937"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:937"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:937: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept'                 " "firewall-cmd.at:937"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:937"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:937: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept'                 " "firewall-cmd.at:937"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:937"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:937: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept'                 " "firewall-cmd.at:937"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:937"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:938: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop'                 " "firewall-cmd.at:938"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:938"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:938: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop'                 " "firewall-cmd.at:938"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:938"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:938: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop'                 " "firewall-cmd.at:938"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:938"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:938: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop'                 " "firewall-cmd.at:938"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:938"
$at_failed && at_fn_log_failure
$at_traceon; }







































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"'                 " "firewall-cmd.at:939"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"'                 " "firewall-cmd.at:939"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"'                 " "firewall-cmd.at:939"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"'                 " "firewall-cmd.at:939"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop'                 " "firewall-cmd.at:939"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop'                 " "firewall-cmd.at:939"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop'                 " "firewall-cmd.at:939"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop'                 " "firewall-cmd.at:939"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"'                 " "firewall-cmd.at:939"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"'                 " "firewall-cmd.at:939"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"'                 " "firewall-cmd.at:939"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"'                 " "firewall-cmd.at:939"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"'                 " "firewall-cmd.at:939"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"'                 " "firewall-cmd.at:939"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"'                 " "firewall-cmd.at:939"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"'                 " "firewall-cmd.at:939"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept'                 " "firewall-cmd.at:939"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept'                 " "firewall-cmd.at:939"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept'                 " "firewall-cmd.at:939"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept'                 " "firewall-cmd.at:939"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" masquerade'                 " "firewall-cmd.at:939"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" masquerade'                 " "firewall-cmd.at:939"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv6\" masquerade'                 " "firewall-cmd.at:939"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv6\" masquerade'                 " "firewall-cmd.at:939"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:947: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"'                 " "firewall-cmd.at:947"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:947"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:947: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"'                 " "firewall-cmd.at:947"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:947"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:947: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"'                 " "firewall-cmd.at:947"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:947"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:947: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"'                 " "firewall-cmd.at:947"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:947"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:948: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"'                 " "firewall-cmd.at:948"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:948"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:948: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"'                 " "firewall-cmd.at:948"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:948"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:948: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"'                 " "firewall-cmd.at:948"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:948"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:948: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"'                 " "firewall-cmd.at:948"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:948"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:949: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade'                 " "firewall-cmd.at:949"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:949"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:949: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade'                 " "firewall-cmd.at:949"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:949"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:949: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade'                 " "firewall-cmd.at:949"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:949"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:949: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade'                 " "firewall-cmd.at:949"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:949"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:950: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept'                 " "firewall-cmd.at:950"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:950"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:950: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept'                 " "firewall-cmd.at:950"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:950"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:950: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept'                 " "firewall-cmd.at:950"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:950"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:950: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept'                 " "firewall-cmd.at:950"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:950"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:951: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade'                 " "firewall-cmd.at:951"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:951"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:951: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade'                 " "firewall-cmd.at:951"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:951"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:951: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade'                 " "firewall-cmd.at:951"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:951"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:951: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade'                 " "firewall-cmd.at:951"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:951"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:952: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 " "firewall-cmd.at:952"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:952"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:952: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 " "firewall-cmd.at:952"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:952"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:952: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 " "firewall-cmd.at:952"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:952"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:952: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 " "firewall-cmd.at:952"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:952"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:953: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 " "firewall-cmd.at:953"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:953"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:953: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 " "firewall-cmd.at:953"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:953"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:953: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 " "firewall-cmd.at:953"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:953"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:953: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"'                 " "firewall-cmd.at:953"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:953"
$at_failed && at_fn_log_failure
$at_traceon; }







































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:954: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 " "firewall-cmd.at:954"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:954"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:954: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 " "firewall-cmd.at:954"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:954"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:954: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 " "firewall-cmd.at:954"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:954"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:954: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 " "firewall-cmd.at:954"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:954"
$at_failed && at_fn_log_failure
$at_traceon; }





































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:954: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 " "firewall-cmd.at:954"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:954"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:954: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 " "firewall-cmd.at:954"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:954"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:954: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 " "firewall-cmd.at:954"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:954"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:954: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"'                 " "firewall-cmd.at:954"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:954"
$at_failed && at_fn_log_failure
$at_traceon; }







































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:958: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"'                 " "firewall-cmd.at:958"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:958"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:958: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"'                 " "firewall-cmd.at:958"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:958"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:958: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"'                 " "firewall-cmd.at:958"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:958"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:958: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"'                 " "firewall-cmd.at:958"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:958"
$at_failed && at_fn_log_failure
$at_traceon; }








      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_23
#AT_START_24
at_fn_group_banner 24 'firewall-cmd.at:960' \
  "rich rules audit" "                               " 1
at_xfail=no
(
  $as_echo "24. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:960: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:960"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:960"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:960: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:960"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:960"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi









































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:964: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept'                 " "firewall-cmd.at:964"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:964"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:964: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept'                 " "firewall-cmd.at:964"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:964"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:964: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept'                 " "firewall-cmd.at:964"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:964"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:964: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept'                 " "firewall-cmd.at:964"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:964"
$at_failed && at_fn_log_failure
$at_traceon; }








      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_24
#AT_START_25
at_fn_group_banner 25 'firewall-cmd.at:968' \
  "rich rules priority" "                            " 1
at_xfail=no
(
  $as_echo "25. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:968: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:968"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:968"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:968: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:968"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:968"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi



































































































































































































































































































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1122: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule priority=127 drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule priority=127 drop'                 " "firewall-cmd.at:1122"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1122"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1123: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule priority=127 drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule priority=127 drop'                 " "firewall-cmd.at:1123"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1123"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1124: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule priority=127 drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule priority=127 drop'                 " "firewall-cmd.at:1124"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --remove-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1124"
$at_failed && at_fn_log_failure
$at_traceon; }



















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1125: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule priority=127 drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule priority=127 drop'                 " "firewall-cmd.at:1125"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --query-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1125"
$at_failed && at_fn_log_failure
$at_traceon; }



























































































































































































































































































































































































































































































































































































































































































































































































































































































      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_25
#AT_START_26
at_fn_group_banner 26 'firewall-cmd.at:1582' \
  "rich rules bad" "                                 " 1
at_xfail=no
(
  $as_echo "26. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1582: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1582"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1582"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1582: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1582"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1582"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi



































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1589: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule=''                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule=''                 " "firewall-cmd.at:1589"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule=''
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1589"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1590: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='name=\"dns\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='name=\"dns\" accept'                 " "firewall-cmd.at:1590"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='name="dns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1590"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1591: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='protocol value=\"ah\" reject'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='protocol value=\"ah\" reject'                 " "firewall-cmd.at:1591"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1591"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1592: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"ah\" reject type=\"icmp-host-prohibited\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"ah\" reject type=\"icmp-host-prohibited\"'                 " "firewall-cmd.at:1592"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value="ah" reject type="icmp-host-prohibited"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1592"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1593: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" protocol value=\"ah\" reject type=\"dummy\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" protocol value=\"ah\" reject type=\"dummy\"'                 " "firewall-cmd.at:1593"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" protocol value="ah" reject type="dummy"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1593"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1594: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule'                 " "firewall-cmd.at:1594"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1594"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1595: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule bad_element'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule bad_element'                 " "firewall-cmd.at:1595"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule bad_element'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1595"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1596: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv5\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv5\"'                 " "firewall-cmd.at:1596"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv5"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1596"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1597: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule name=\"dns\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule name=\"dns\" accept'                 " "firewall-cmd.at:1597"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule name="dns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1597"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1598: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol=\"ah\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol=\"ah\" accept'                 " "firewall-cmd.at:1598"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol="ah" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1598"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1599: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"ah\" accept drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"ah\" accept drop'                 " "firewall-cmd.at:1599"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value="ah" accept drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1599"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1600: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule service name=\"radius\" port port=\"4011\" reject'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule service name=\"radius\" port port=\"4011\" reject'                 " "firewall-cmd.at:1600"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule service name="radius" port port="4011" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1600"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1601: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule service bad_attribute=\"dns\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule service bad_attribute=\"dns\"'                 " "firewall-cmd.at:1601"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule service bad_attribute="dns"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1601"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1602: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"igmp\" log level=\"eror\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"igmp\" log level=\"eror\"'                 " "firewall-cmd.at:1602"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value="igmp" log level="eror"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 125 $at_status "$at_srcdir/firewall-cmd.at:1602"
$at_failed && at_fn_log_failure
$at_traceon; }


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1603: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='family=\"ipv6\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='family=\"ipv6\" accept'                 " "firewall-cmd.at:1603"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='family="ipv6" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1603"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1603: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log level=\"info\" limit value=\"1/2m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log level=\"info\" limit value=\"1/2m\"'                 " "firewall-cmd.at:1603"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule source address="1:2:3:4:6::" icmp-block name="redirect" log level="info" limit value="1/2m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 207 $at_status "$at_srcdir/firewall-cmd.at:1603"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1603: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log level=\"info\" limit value=\"1/2m\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log level=\"info\" limit value=\"1/2m\"'                 " "firewall-cmd.at:1603"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log level="info" limit value="1/2m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 123 $at_status "$at_srcdir/firewall-cmd.at:1603"
$at_failed && at_fn_log_failure
$at_traceon; }


































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1608: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"esp\"'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value=\"esp\"'                 " "firewall-cmd.at:1608"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule protocol value="esp"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1608"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1609: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" masquerade drop'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" masquerade drop'                 " "firewall-cmd.at:1609"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" masquerade drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1609"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1610: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" icmp-block name=\"redirect\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family=\"ipv4\" icmp-block name=\"redirect\" accept'                 " "firewall-cmd.at:1610"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule family="ipv4" icmp-block name="redirect" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1610"
$at_failed && at_fn_log_failure
$at_traceon; }
































    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1611: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" protocol=\"tcp\" family=\"ipv4\" accept'                 "
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" protocol=\"tcp\" family=\"ipv4\" accept'                 " "firewall-cmd.at:1611"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                                                            --add-rich-rule='rule forward-port port="2222" to-port="22" protocol="tcp" family="ipv4" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1611"
$at_failed && at_fn_log_failure
$at_traceon; }








      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_26
#AT_START_27
at_fn_group_banner 27 'firewall-cmd.at:1618' \
  "config validation" "                              " 1
at_xfail=no
(
  $as_echo "27. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1618: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1618"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1618"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1618: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1618"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1618"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1622: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1622"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1622"
$at_failed && at_fn_log_failure
$at_traceon; }







        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1627: cp ./firewalld.conf ./firewalld.conf.orig"
at_fn_check_prepare_trace "firewall-cmd.at:1627"
( $at_check_trace; cp ./firewalld.conf ./firewalld.conf.orig
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1627"
$at_failed && at_fn_log_failure
$at_traceon; }

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1628: echo \"SomeBogusField=yes\" >> ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1628"
( $at_check_trace; echo "SomeBogusField=yes" >> ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1628"
$at_failed && at_fn_log_failure
$at_traceon; }
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1629: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1629"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "ERROR: Invalid option: 'SomeBogusField=yes'
ERROR: Invalid option: 'SomeBogusField=yes'
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1629"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1634: cp ./firewalld.conf.orig ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1634"
( $at_check_trace; cp ./firewalld.conf.orig ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1634"
$at_failed && at_fn_log_failure
$at_traceon; }


        cat >./direct.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<direct>
<chain table="filter" ipv="ipv7" chain="foobar"/>
</direct>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1643: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1643"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1643"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./direct.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<direct>
<rule />
</direct>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1651: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1651"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1651"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1652: rm ./direct.xml"
at_fn_check_prepare_trace "firewall-cmd.at:1652"
( $at_check_trace; rm ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1652"
$at_failed && at_fn_log_failure
$at_traceon; }


        cat >./lockdown-whitelist.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<whitelist>
    <user uid="666"/>
</whitelist>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1661: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1661"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1661"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./lockdown-whitelist.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<whitelist>
    <uid id="666"/>
</whitelist>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1669: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1669"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1669"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./lockdown-whitelist.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<whitelist>
    <group name="foobar" />
</whitelist>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1677: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1677"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1677"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1678: rm ./lockdown-whitelist.xml"
at_fn_check_prepare_trace "firewall-cmd.at:1678"
( $at_check_trace; rm ./lockdown-whitelist.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1678"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1681: mkdir -p ./ipsets"
at_fn_check_prepare_trace "firewall-cmd.at:1681"
( $at_check_trace; mkdir -p ./ipsets
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1681"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./ipsets/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<ipset type="hash:mac">
  <entry>12:34:56:78:90</entry>
</ipset>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1688: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1688"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "WARNING: INVALID_ENTRY: invalid mac address '12:34:56:78:90' in '12:34:56:78:90', ignoring.
WARNING: INVALID_ENTRY: invalid mac address '12:34:56:78:90' in '12:34:56:78:90', ignoring.
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1688"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./ipsets/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<ipset type="hash:mac">
  <entry bogus_attr="bogus">12:34:56:78:90:ab</entry>
</ipset>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1700: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1700"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1700"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./ipsets/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<ipset type="hash:ip,bogus">
</ipset>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1707: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1707"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 119 $at_status "$at_srcdir/firewall-cmd.at:1707"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1708: rm ./ipsets/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:1708"
( $at_check_trace; rm ./ipsets/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1708"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1711: mkdir -p ./helpers"
at_fn_check_prepare_trace "firewall-cmd.at:1711"
( $at_check_trace; mkdir -p ./helpers
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1711"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./helpers/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<helper>
</helper>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1717: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1717"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1717"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./helpers/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<helper family="ipv7" module="nf_conntrack_ftp">
</helper>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1724: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1724"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1724"
$at_failed && at_fn_log_failure
$at_traceon; }








    cat >./helpers/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<helper family="ipv6" module="nf_conntrack_ftp">
<port protocol="aoeui" port="666" />
</helper>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1726: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1726"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:1726"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1735: rm ./helpers/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:1735"
( $at_check_trace; rm ./helpers/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1735"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1738: mkdir -p ./icmptypes"
at_fn_check_prepare_trace "firewall-cmd.at:1738"
( $at_check_trace; mkdir -p ./icmptypes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1738"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./icmptypes/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<bad_element />
<icmptype>
</icmptype>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1745: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1745"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1745"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./icmptypes/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<icmptype>
<destination unexpected_attr="foobar" />
</icmptype>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1753: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1753"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1753"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1754: rm ./icmptypes/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:1754"
( $at_check_trace; rm ./icmptypes/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1754"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1757: mkdir -p ./services"
at_fn_check_prepare_trace "firewall-cmd.at:1757"
( $at_check_trace; mkdir -p ./services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1757"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<protocol value="aoeui" />
</service>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1764: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1764"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:1764"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<protocol bad_attr="foo" />
</service>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1772: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1772"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1772"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<bad_element />
</service>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1780: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1780"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1780"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<module module="bad_attr" />
</service>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1788: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1788"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1788"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<port protocol="aoeu" port="666" />
</service>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1796: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1796"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:1796"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<port protocol="tcp" port="ssssssh" />
</service>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1804: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1804"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:1804"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<port protocol="tcp" port="22" />
<source-port protocol="tcp" port="sssssh" />
</service>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1813: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1813"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:1813"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<destination ipv4="224.0.0.1" ipv7="1234" />
</service>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1821: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1821"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1821"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1822: rm ./services/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:1822"
( $at_check_trace; rm ./services/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1822"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1825: mkdir -p ./zones"
at_fn_check_prepare_trace "firewall-cmd.at:1825"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1825"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1829: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1829"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/firewall-cmd.at:1829"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<service name="bogus_service_name" />
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1837: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1837"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/firewall-cmd.at:1837"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<port protocol="ipv4" />
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1845: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1845"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1845"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<protocol value="thisdoesnotexist" />
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1853: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1853"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:1853"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<icmp-block invalid_attr=""/>
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1861: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1861"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1861"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<icmp-type />
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1869: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1869"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1869"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<masquerade value="true" />
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1877: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1877"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1877"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<forward-port port="666" />
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1885: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1885"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1885"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<forward-port protocol="sctppp" />
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1893: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1893"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1893"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<source-port port="-1" />
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1901: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1901"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1901"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<interface />
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1909: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1909"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1909"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<source />
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1917: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1917"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "WARNING: Invalid source: No address no ipset.
WARNING: Invalid source: No address no ipset.
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1917"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule>
<source address="10.0.0.1/24" />
<limit />
</rule>
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1932: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1932"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1932"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule family="ipv4">
<source address="10.0.0.1/24" />
<accept>
<limit value="none" />
</accept>
</rule>
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1945: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1945"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "WARNING: INVALID_LIMIT: none: rule family=\"ipv4\" source address=\"10.0.0.1/24\" accept limit value=\"none\"
WARNING: INVALID_LIMIT: none: rule family=\"ipv4\" source address=\"10.0.0.1/24\" accept limit value=\"none\"
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1945"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule>
<source address="10.0.0.1/24" />
<log level="super_critical" />
</rule>
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1960: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1960"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "WARNING: Invalid rule: Invalid log level
WARNING: Invalid rule: Invalid log level
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1960"
$at_failed && at_fn_log_failure
$at_traceon; }






    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule family="ipv4">
<source address="10.0.0.1/24" />
<audit prefix="foobar" />
</rule>
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1975: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1975"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1975"
$at_failed && at_fn_log_failure
$at_traceon; }








    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule family="ipv6">
<source address="10.0.0.1/24" />
<accept />
</rule>
</zone>
_ATEOF
















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1977: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config" "firewall-cmd.at:1977"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "WARNING: INVALID_ADDR: 10.0.0.1/24: rule family=\"ipv6\" source address=\"10.0.0.1/24\" accept
WARNING: INVALID_ADDR: 10.0.0.1/24: rule family=\"ipv6\" source address=\"10.0.0.1/24\" accept
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1977"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1993: rm ./zones/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:1993"
( $at_check_trace; rm ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1993"
$at_failed && at_fn_log_failure
$at_traceon; }




      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_27
#AT_START_28
at_fn_group_banner 28 'firewall-offline-cmd.at:17' \
  "lokkit migration" "                               " 1
at_xfail=no
(
  $as_echo "28. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:17: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-offline-cmd.at:17"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:17: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-offline-cmd.at:17"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi

















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:21: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --addmodule=abc --addmodule=efg --removemodule=xyz         --trust=eth+ --trust=em0         --masq=tun+ --masq=tap+ --port=7:tcp --port=666:udp         --custom-rules=ipv4:mangle:/etc/sysconfig/ebtables-config         --service=dns --service=ftp --remove-service=dhcpv6-client         --block-icmp=router-advertisement --block-icmp=router-solicitation         --forward-port=if=ippp+:port=13:proto=tcp:toport=15:toaddr=1.2.3.4         --forward-port=if=ippp+:port=333:proto=udp:toport=444"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --addmodule=abc --addmodule=efg --removemodule=xyz         --trust=eth+ --trust=em0         --masq=tun+ --masq=tap+ --port=7:tcp --port=666:udp         --custom-rules=ipv4:mangle:/etc/sysconfig/ebtables-config         --service=dns --service=ftp --remove-service=dhcpv6-client         --block-icmp=router-advertisement --block-icmp=router-solicitation         --forward-port=if=ippp+:port=13:proto=tcp:toport=15:toaddr=1.2.3.4         --forward-port=if=ippp+:port=333:proto=udp:toport=444" "firewall-offline-cmd.at:21"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --addmodule=abc --addmodule=efg --removemodule=xyz         --trust=eth+ --trust=em0         --masq=tun+ --masq=tap+ --port=7:tcp --port=666:udp         --custom-rules=ipv4:mangle:/etc/sysconfig/ebtables-config         --service=dns --service=ftp --remove-service=dhcpv6-client         --block-icmp=router-advertisement --block-icmp=router-solicitation         --forward-port=if=ippp+:port=13:proto=tcp:toport=15:toaddr=1.2.3.4         --forward-port=if=ippp+:port=333:proto=udp:toport=444
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:29: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=eth+"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=eth+" "firewall-offline-cmd.at:29"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=eth+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:30: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=em0"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=em0" "firewall-offline-cmd.at:30"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=em0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:31: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dns"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dns" "firewall-offline-cmd.at:31"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:32: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service ftp"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service ftp" "firewall-offline-cmd.at:32"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:33: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dhcpv6-client"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dhcpv6-client" "firewall-offline-cmd.at:33"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dhcpv6-client
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-offline-cmd.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:34: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-advertisement"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-advertisement" "firewall-offline-cmd.at:34"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-advertisement
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:35: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-solicitation"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-solicitation" "firewall-offline-cmd.at:35"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:36: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=13:proto=tcp:toport=15:toaddr=1.2.3.4"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=13:proto=tcp:toport=15:toaddr=1.2.3.4" "firewall-offline-cmd.at:36"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=13:proto=tcp:toport=15:toaddr=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:37: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=333:proto=udp:toport=444"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=333:proto=udp:toport=444" "firewall-offline-cmd.at:37"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=333:proto=udp:toport=444
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:37"
$at_failed && at_fn_log_failure
$at_traceon; }






        { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:40: cat << EOF > ./system-config-firewall
        --addmodule=abc
        --addmodule=efg
        --removemodule=xyz
        --trust=eth+
        --trust=em0
        --masq=tun+
        --masq=tap+
        --port=7:tcp
        --port=666:udp
        --custom-rules=ipv4:mangle:/etc/sysconfig/ebtables-config
        --service=dns
        --service=ftp
        --remove-service=dhcpv6-client
        --block-icmp=router-advertisement
        --block-icmp=router-solicitation
        --forward-port=if=ippp+:port=13:proto=tcp:toport=15:toaddr=1.2.3.4
        --forward-port=if=ippp+:port=333:proto=udp:toport=444
EOF
    "
at_fn_check_prepare_notrace 'an embedded newline' "firewall-offline-cmd.at:40"
( $at_check_trace; cat << EOF > ./system-config-firewall
        --addmodule=abc
        --addmodule=efg
        --removemodule=xyz
        --trust=eth+
        --trust=em0
        --masq=tun+
        --masq=tap+
        --port=7:tcp
        --port=666:udp
        --custom-rules=ipv4:mangle:/etc/sysconfig/ebtables-config
        --service=dns
        --service=ftp
        --remove-service=dhcpv6-client
        --block-icmp=router-advertisement
        --block-icmp=router-solicitation
        --forward-port=if=ippp+:port=13:proto=tcp:toport=15:toaddr=1.2.3.4
        --forward-port=if=ippp+:port=333:proto=udp:toport=444
EOF

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }











    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:60: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --migrate-system-config-firewall=./system-config-firewall"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --migrate-system-config-firewall=./system-config-firewall" "firewall-offline-cmd.at:60"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --migrate-system-config-firewall=./system-config-firewall
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:60"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:61: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=eth+"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=eth+" "firewall-offline-cmd.at:61"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=eth+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:61"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:62: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=em0"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=em0" "firewall-offline-cmd.at:62"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --zone=trusted --query-interface=em0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:63: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dns"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dns" "firewall-offline-cmd.at:63"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:64: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service ftp"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service ftp" "firewall-offline-cmd.at:64"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:65: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dhcpv6-client"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dhcpv6-client" "firewall-offline-cmd.at:65"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-service dhcpv6-client
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-offline-cmd.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:66: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-advertisement"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-advertisement" "firewall-offline-cmd.at:66"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-advertisement
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:66"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:67: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-solicitation"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-solicitation" "firewall-offline-cmd.at:67"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-icmp-block router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:67"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:68: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=13:proto=tcp:toport=15:toaddr=1.2.3.4"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=13:proto=tcp:toport=15:toaddr=1.2.3.4" "firewall-offline-cmd.at:68"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=13:proto=tcp:toport=15:toaddr=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:68"
$at_failed && at_fn_log_failure
$at_traceon; }















    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/firewall-offline-cmd.at:69: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=333:proto=udp:toport=444"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=333:proto=udp:toport=444" "firewall-offline-cmd.at:69"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS                                                 --query-forward-port port=333:proto=udp:toport=444
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-offline-cmd.at:69"
$at_failed && at_fn_log_failure
$at_traceon; }







      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_28
#AT_START_29
at_fn_group_banner 29 'firewalld.conf.at:1' \
  "firewalld.conf" "                                 " 2
at_xfail=no
(
  $as_echo "29. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewalld.conf.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewalld.conf.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewalld.conf.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewalld.conf.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewalld.conf.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewalld.conf.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewalld.conf.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewalld.conf.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-10716" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewalld.conf.at:1: ip netns add fwd-test-10716"
at_fn_check_prepare_trace "firewalld.conf.at:1"
( $at_check_trace; ip netns add fwd-test-10716
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13623" ip netns exec fwd-test-10716 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-13623" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewalld.conf.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewalld.conf.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13623" ip netns exec fwd-test-10716 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewalld.conf.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewalld.conf.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13623" ip netns exec fwd-test-10716 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewalld.conf.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewalld.conf.at:1"







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13623\" ip netns exec fwd-test-10716 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.GetAll string:\"org.fedoraproject.FirewallD1.config\"               | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     awk 'BEGIN{line_mark=-99; line=0} {line++; if (line == line_mark + 1) {buffer = $0}; if (line == line_mark + 2) {print buffer \" : \" $0} } /^dict entry/{line_mark=line}' | sort "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13623" ip netns exec fwd-test-10716 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.GetAll string:"org.fedoraproject.FirewallD1.config"               | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     awk 'BEGIN{line_mark=-99; line=0} {line++; if (line == line_mark + 1) {buffer = $0}; if (line == line_mark + 2) {print buffer " : " $0} } /^dict entry/{line_mark=line}' | sort
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "string \"AutomaticHelpers\" : variant string \"system\"
string \"CleanupOnExit\" : variant string \"no\"
string \"DefaultZone\" : variant string \"public\"
string \"FirewallBackend\" : variant string \"nftables\"
string \"FlushAllOnReload\" : variant string \"yes\"
string \"IPv6_rpfilter\" : variant string \"no\"
string \"IndividualCalls\" : variant string \"no\"
string \"Lockdown\" : variant string \"no\"
string \"LogDenied\" : variant string \"off\"
string \"MinimalMark\" : variant int32 100
string \"RFC3964_IPv4\" : variant string \"yes\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13623\" ip netns exec fwd-test-10716 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"MinimalMark\" int32:1234 "
at_fn_check_prepare_trace "firewalld.conf.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13623" ip netns exec fwd-test-10716 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"MinimalMark" int32:1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13623\" ip netns exec fwd-test-10716 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"MinimalMark\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13623" ip netns exec fwd-test-10716 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"MinimalMark"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant int32 1234
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13623\" ip netns exec fwd-test-10716 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"AutomaticHelpers\" string:\"no\" "
at_fn_check_prepare_trace "firewalld.conf.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13623" ip netns exec fwd-test-10716 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"AutomaticHelpers" string:"no"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13623\" ip netns exec fwd-test-10716 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"AutomaticHelpers\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13623" ip netns exec fwd-test-10716 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"AutomaticHelpers"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant string \"no\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:31:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13623\" ip netns exec fwd-test-10716 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"Lockdown\" string:\"yes\" "
at_fn_check_prepare_trace "firewalld.conf.at:31"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13623" ip netns exec fwd-test-10716 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"Lockdown" string:"yes"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:31:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13623\" ip netns exec fwd-test-10716 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"Lockdown\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:31"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13623" ip netns exec fwd-test-10716 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"Lockdown"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant string \"yes\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13623\" ip netns exec fwd-test-10716 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"LogDenied\" string:\"all\" "
at_fn_check_prepare_trace "firewalld.conf.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13623" ip netns exec fwd-test-10716 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"LogDenied" string:"all"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13623\" ip netns exec fwd-test-10716 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"LogDenied\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13623" ip netns exec fwd-test-10716 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"LogDenied"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant string \"all\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13623\" ip netns exec fwd-test-10716 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"IPv6_rpfilter\" string:\"yes\" "
at_fn_check_prepare_trace "firewalld.conf.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13623" ip netns exec fwd-test-10716 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"IPv6_rpfilter" string:"yes"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13623\" ip netns exec fwd-test-10716 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"IPv6_rpfilter\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13623" ip netns exec fwd-test-10716 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"IPv6_rpfilter"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant string \"yes\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:34:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13623\" ip netns exec fwd-test-10716 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"IndividualCalls\" string:\"yes\" "
at_fn_check_prepare_trace "firewalld.conf.at:34"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13623" ip netns exec fwd-test-10716 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"IndividualCalls" string:"yes"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:34:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13623\" ip netns exec fwd-test-10716 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"IndividualCalls\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:34"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13623" ip netns exec fwd-test-10716 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"IndividualCalls"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant string \"yes\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13623\" ip netns exec fwd-test-10716 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"FirewallBackend\" string:\"iptables\" "
at_fn_check_prepare_trace "firewalld.conf.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13623" ip netns exec fwd-test-10716 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"FirewallBackend" string:"iptables"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13623\" ip netns exec fwd-test-10716 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"FirewallBackend\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13623" ip netns exec fwd-test-10716 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"FirewallBackend"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant string \"iptables\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13623\" ip netns exec fwd-test-10716 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"FlushAllOnReload\" string:\"no\" "
at_fn_check_prepare_trace "firewalld.conf.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13623" ip netns exec fwd-test-10716 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"FlushAllOnReload" string:"no"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13623\" ip netns exec fwd-test-10716 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"FlushAllOnReload\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13623" ip netns exec fwd-test-10716 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"FlushAllOnReload"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant string \"no\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:37:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13623\" ip netns exec fwd-test-10716 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"CleanupOnExit\" string:\"yes\" "
at_fn_check_prepare_trace "firewalld.conf.at:37"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13623" ip netns exec fwd-test-10716 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"CleanupOnExit" string:"yes"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:37"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:37:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13623\" ip netns exec fwd-test-10716 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"CleanupOnExit\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:37"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13623" ip netns exec fwd-test-10716 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"CleanupOnExit"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant string \"yes\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:37"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13623\" ip netns exec fwd-test-10716 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:\"org.fedoraproject.FirewallD1.config\" string:\"RFC3964_IPv4\" string:\"no\" "
at_fn_check_prepare_trace "firewalld.conf.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13623" ip netns exec fwd-test-10716 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Set string:"org.fedoraproject.FirewallD1.config" string:"RFC3964_IPv4" string:"no"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewalld.conf.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13623\" ip netns exec fwd-test-10716 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:\"org.fedoraproject.FirewallD1.config\" string:\"RFC3964_IPv4\"               | tail -n +2 | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewalld.conf.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13623" ip netns exec fwd-test-10716 dbus-send --system --print-reply --dest=org.fedoraproject.FirewallD1               /org/fedoraproject/FirewallD1/config               org.freedesktop.DBus.Properties.Get string:"org.fedoraproject.FirewallD1.config" string:"RFC3964_IPv4"               | tail -n +2 | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "variant string \"no\"
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewalld.conf.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }












        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewalld.conf.at:42" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewalld.conf.at:42"
            $as_echo "firewalld.conf.at:42" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewalld.conf.at:42"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_29
#AT_START_30
at_fn_group_banner 30 'service.at:1' \
  "dbus api - services" "                            " 2
at_xfail=no
(
  $as_echo "30. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/service.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/service.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "service.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/service.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "service.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/service.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "service.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-386" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/service.at:1: ip netns add fwd-test-386"
at_fn_check_prepare_trace "service.at:1"
( $at_check_trace; ip netns add fwd-test-386
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "service.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/service.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "service.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/service.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "service.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/service.at:1"






    $as_echo "service.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:4"
    $as_echo "service.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:4"

    { set +x
$as_echo "$at_srcdir/service.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"addService\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//method[@name="addService"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addService\">
<arg direction=\"in\" name=\"service\" type=\"s\"/>
<arg direction=\"in\" name=\"settings\" type=\"(sssa(ss)asa{ss}asa(ss))\"/>
<arg direction=\"out\" type=\"o\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:11" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:11"

    { set +x
$as_echo "$at_srcdir/service.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.addService \"foobar\"      '(\"1.0\",        \"foobar\",        \"foobar service is for foobar\",        [(\"1234\", \"udp\"), (\"22\", \"tcp\"), (\"1234\", \"udp\")],        [\"ftp\"],        {\"ipv4\": \"1.2.3.4\"},        [\"icmp\", \"igmp\"],        [(\"4321\", \"tcp\"), (\"4321\", \"udp\")]      )'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.addService "foobar"      '("1.0",        "foobar",        "foobar service is for foobar",        [("1234", "udp"), ("22", "tcp"), ("1234", "udp")],        ["ftp"],        {"ipv4": "1.2.3.4"},        ["icmp", "igmp"],        [("4321", "tcp"), ("4321", "udp")]      )'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }



SERVICE_OBJ=$(sed -e "s/.*config\/service\/\([^']\+\)['].*/\1/" ./stdout)
export SERVICE_OBJ


    $as_echo "service.at:26" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:26"
    $as_echo "service.at:26" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:26"

    { set +x
$as_echo "$at_srcdir/service.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getSettings\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getSettings"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getSettings\">
<arg direction=\"out\" type=\"(sssa(ss)asa{ss}asa(ss))\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:31" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:31"

    { set +x
$as_echo "$at_srcdir/service.at:31:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:31"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(('1.0', 'foobar', 'foobar service is for foobar', [('1234', 'udp'), ('22', 'tcp')], ['ftp'], {'ipv4': '1.2.3.4'}, ['icmp', 'igmp'], [('4321', 'tcp'), ('4321', 'udp')]),)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:35" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:35"
    $as_echo "service.at:35" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:35"

    { set +x
$as_echo "$at_srcdir/service.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"update\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="update"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"update\">
<arg direction=\"in\" name=\"settings\" type=\"(sssa(ss)asa{ss}asa(ss))\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:40" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:40"

    { set +x
$as_echo "$at_srcdir/service.at:40:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.update '(\"1.1\",        \"foobar new\",        \"foobar new service is for foobar\",        [(\"12345\", \"udp\"), (\"2222\", \"tcp\")],        [\"ftp\"],        {},        [\"icmp\"],        [(\"4321\", \"tcp\")]      )'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:40"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.update '("1.1",        "foobar new",        "foobar new service is for foobar",        [("12345", "udp"), ("2222", "tcp")],        ["ftp"],        {},        ["icmp"],        [("4321", "tcp")]      )'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:52" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:52"

    { set +x
$as_echo "$at_srcdir/service.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(('1.1', 'foobar new', 'foobar new service is for foobar', [('12345', 'udp'), ('2222', 'tcp')], ['ftp'], @a{ss} {}, ['icmp'], [('4321', 'tcp')]),)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:56" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:56"
    $as_echo "service.at:56" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:56"

    { set +x
$as_echo "$at_srcdir/service.at:56:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"loadDefaults\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:56"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="loadDefaults"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"loadDefaults\">
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:60" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:60"
    $as_echo "service.at:60" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:60"

    { set +x
$as_echo "$at_srcdir/service.at:60:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"remove\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:60"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="remove"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"remove\">
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:60"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:64" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:64"
    $as_echo "service.at:64" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:64"

    { set +x
$as_echo "$at_srcdir/service.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"rename\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="rename"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"rename\">
<arg direction=\"in\" name=\"name\" type=\"s\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:70" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:70"
    $as_echo "service.at:70" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:70"

    { set +x
$as_echo "$at_srcdir/service.at:70:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getVersion\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:70"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getVersion"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getVersion\">
<arg direction=\"out\" type=\"s\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:75" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:75"
    $as_echo "service.at:75" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:75"

    { set +x
$as_echo "$at_srcdir/service.at:75:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"setVersion\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:75"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="setVersion"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setVersion\">
<arg direction=\"in\" name=\"version\" type=\"s\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:75"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:81" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:81"
    $as_echo "service.at:81" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:81"

    { set +x
$as_echo "$at_srcdir/service.at:81:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getShort\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:81"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getShort"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getShort\">
<arg direction=\"out\" type=\"s\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:81"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:86" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:86"
    $as_echo "service.at:86" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:86"

    { set +x
$as_echo "$at_srcdir/service.at:86:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"setShort\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:86"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="setShort"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setShort\">
<arg direction=\"in\" name=\"short\" type=\"s\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:86"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:92" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:92"
    $as_echo "service.at:92" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:92"

    { set +x
$as_echo "$at_srcdir/service.at:92:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getDescription\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:92"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getDescription"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getDescription\">
<arg direction=\"out\" type=\"s\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:92"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:97" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:97"
    $as_echo "service.at:97" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:97"

    { set +x
$as_echo "$at_srcdir/service.at:97:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"setDescription\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:97"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="setDescription"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setDescription\">
<arg direction=\"in\" name=\"description\" type=\"s\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:103" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:103"
    $as_echo "service.at:103" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:103"

    { set +x
$as_echo "$at_srcdir/service.at:103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getPorts\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getPorts"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getPorts\">
<arg direction=\"out\" type=\"a(ss)\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:108" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:108"
    $as_echo "service.at:108" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:108"

    { set +x
$as_echo "$at_srcdir/service.at:108:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"setPorts\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:108"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="setPorts"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setPorts\">
<arg direction=\"in\" name=\"ports\" type=\"a(ss)\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:108"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:113" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:113"
    $as_echo "service.at:113" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:113"

    { set +x
$as_echo "$at_srcdir/service.at:113:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"addPort\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:113"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="addPort"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addPort\">
<arg direction=\"in\" name=\"port\" type=\"s\"/>
<arg direction=\"in\" name=\"protocol\" type=\"s\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:113"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:119" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:119"
    $as_echo "service.at:119" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:119"

    { set +x
$as_echo "$at_srcdir/service.at:119:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"removePort\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:119"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="removePort"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removePort\">
<arg direction=\"in\" name=\"port\" type=\"s\"/>
<arg direction=\"in\" name=\"protocol\" type=\"s\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:119"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:125" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:125"
    $as_echo "service.at:125" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:125"

    { set +x
$as_echo "$at_srcdir/service.at:125:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"queryPort\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:125"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="queryPort"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryPort\">
<arg direction=\"in\" name=\"port\" type=\"s\"/>
<arg direction=\"in\" name=\"protocol\" type=\"s\"/>
<arg direction=\"out\" type=\"b\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:125"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:133" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:133"
    $as_echo "service.at:133" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:133"

    { set +x
$as_echo "$at_srcdir/service.at:133:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getSourcePorts\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:133"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getSourcePorts"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getSourcePorts\">
<arg direction=\"out\" type=\"a(ss)\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:133"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:138" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:138"
    $as_echo "service.at:138" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:138"

    { set +x
$as_echo "$at_srcdir/service.at:138:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"setSourcePorts\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:138"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="setSourcePorts"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setSourcePorts\">
<arg direction=\"in\" name=\"ports\" type=\"a(ss)\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:138"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:143" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:143"
    $as_echo "service.at:143" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:143"

    { set +x
$as_echo "$at_srcdir/service.at:143:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"addSourcePort\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:143"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="addSourcePort"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addSourcePort\">
<arg direction=\"in\" name=\"port\" type=\"s\"/>
<arg direction=\"in\" name=\"protocol\" type=\"s\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:143"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:149" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:149"
    $as_echo "service.at:149" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:149"

    { set +x
$as_echo "$at_srcdir/service.at:149:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"removeSourcePort\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:149"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="removeSourcePort"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeSourcePort\">
<arg direction=\"in\" name=\"port\" type=\"s\"/>
<arg direction=\"in\" name=\"protocol\" type=\"s\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:149"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:155" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:155"
    $as_echo "service.at:155" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:155"

    { set +x
$as_echo "$at_srcdir/service.at:155:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"querySourcePort\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:155"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="querySourcePort"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"querySourcePort\">
<arg direction=\"in\" name=\"port\" type=\"s\"/>
<arg direction=\"in\" name=\"protocol\" type=\"s\"/>
<arg direction=\"out\" type=\"b\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:155"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:163" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:163"
    $as_echo "service.at:163" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:163"

    { set +x
$as_echo "$at_srcdir/service.at:163:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getProtocols\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:163"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getProtocols"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getProtocols\">
<arg direction=\"out\" type=\"as\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:163"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:168" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:168"
    $as_echo "service.at:168" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:168"

    { set +x
$as_echo "$at_srcdir/service.at:168:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"setProtocols\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:168"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="setProtocols"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setProtocols\">
<arg direction=\"in\" name=\"protocols\" type=\"as\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:168"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:173" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:173"
    $as_echo "service.at:173" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:173"

    { set +x
$as_echo "$at_srcdir/service.at:173:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"addProtocol\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:173"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="addProtocol"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addProtocol\">
<arg direction=\"in\" name=\"protocol\" type=\"s\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:173"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:178" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:178"
    $as_echo "service.at:178" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:178"

    { set +x
$as_echo "$at_srcdir/service.at:178:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"removeProtocol\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:178"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="removeProtocol"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeProtocol\">
<arg direction=\"in\" name=\"protocol\" type=\"s\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:178"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:183" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:183"
    $as_echo "service.at:183" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:183"

    { set +x
$as_echo "$at_srcdir/service.at:183:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"queryProtocol\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:183"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="queryProtocol"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryProtocol\">
<arg direction=\"in\" name=\"protocol\" type=\"s\"/>
<arg direction=\"out\" type=\"b\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:183"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:190" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:190"
    $as_echo "service.at:190" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:190"

    { set +x
$as_echo "$at_srcdir/service.at:190:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getModules\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:190"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getModules"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getModules\">
<arg direction=\"out\" type=\"as\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:190"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:195" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:195"
    $as_echo "service.at:195" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:195"

    { set +x
$as_echo "$at_srcdir/service.at:195:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"setModules\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:195"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="setModules"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setModules\">
<arg direction=\"in\" name=\"modules\" type=\"as\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:195"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:200" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:200"
    $as_echo "service.at:200" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:200"

    { set +x
$as_echo "$at_srcdir/service.at:200:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"addModule\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:200"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="addModule"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addModule\">
<arg direction=\"in\" name=\"module\" type=\"s\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:200"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:205" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:205"
    $as_echo "service.at:205" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:205"

    { set +x
$as_echo "$at_srcdir/service.at:205:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"removeModule\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:205"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="removeModule"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeModule\">
<arg direction=\"in\" name=\"module\" type=\"s\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:205"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:210" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:210"
    $as_echo "service.at:210" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:210"

    { set +x
$as_echo "$at_srcdir/service.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"queryModule\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="queryModule"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryModule\">
<arg direction=\"in\" name=\"module\" type=\"s\"/>
<arg direction=\"out\" type=\"b\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:217" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:217"
    $as_echo "service.at:217" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:217"

    { set +x
$as_echo "$at_srcdir/service.at:217:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getDestinations\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:217"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getDestinations"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getDestinations\">
<arg direction=\"out\" type=\"a{ss}\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:217"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:222" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:222"
    $as_echo "service.at:222" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:222"

    { set +x
$as_echo "$at_srcdir/service.at:222:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"setDestinations\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:222"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="setDestinations"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setDestinations\">
<arg direction=\"in\" name=\"destinations\" type=\"a{ss}\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:222"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:227" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:227"
    $as_echo "service.at:227" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:227"

    { set +x
$as_echo "$at_srcdir/service.at:227:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"setDestination\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:227"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="setDestination"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setDestination\">
<arg direction=\"in\" name=\"family\" type=\"s\"/>
<arg direction=\"in\" name=\"address\" type=\"s\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:227"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:233" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:233"
    $as_echo "service.at:233" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:233"

    { set +x
$as_echo "$at_srcdir/service.at:233:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getDestination\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:233"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getDestination"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getDestination\">
<arg direction=\"in\" name=\"family\" type=\"s\"/>
<arg direction=\"out\" type=\"s\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:233"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:239" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:239"
    $as_echo "service.at:239" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:239"

    { set +x
$as_echo "$at_srcdir/service.at:239:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"removeDestination\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:239"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="removeDestination"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeDestination\">
<arg direction=\"in\" name=\"family\" type=\"s\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:239"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:244" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:244"
    $as_echo "service.at:244" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:244"

    { set +x
$as_echo "$at_srcdir/service.at:244:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"queryDestination\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:244"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="queryDestination"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryDestination\">
<arg direction=\"in\" name=\"family\" type=\"s\"/>
<arg direction=\"in\" name=\"address\" type=\"s\"/>
<arg direction=\"out\" type=\"b\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:244"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:252" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:252"
    $as_echo "service.at:252" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:252"

    { set +x
$as_echo "$at_srcdir/service.at:252:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getIncludes\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:252"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getIncludes"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getIncludes\">
<arg direction=\"out\" type=\"as\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:252"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:257" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:257"
    $as_echo "service.at:257" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:257"

    { set +x
$as_echo "$at_srcdir/service.at:257:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"setIncludes\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:257"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="setIncludes"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"setIncludes\">
<arg direction=\"in\" name=\"includes\" type=\"as\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:257"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:262" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:262"
    $as_echo "service.at:262" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:262"

    { set +x
$as_echo "$at_srcdir/service.at:262:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"addInclude\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:262"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="addInclude"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addInclude\">
<arg direction=\"in\" name=\"include\" type=\"s\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:262"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:267" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:267"
    $as_echo "service.at:267" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:267"

    { set +x
$as_echo "$at_srcdir/service.at:267:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"removeInclude\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:267"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="removeInclude"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"removeInclude\">
<arg direction=\"in\" name=\"include\" type=\"s\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:267"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:272" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:272"
    $as_echo "service.at:272" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:272"

    { set +x
$as_echo "$at_srcdir/service.at:272:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"queryInclude\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:272"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="queryInclude"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"queryInclude\">
<arg direction=\"in\" name=\"include\" type=\"s\"/>
<arg direction=\"out\" type=\"b\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:272"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/service.at:279:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386 firewall-cmd -q --reload "
at_fn_check_prepare_trace "service.at:279"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:279"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service.at:279:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386 firewall-cmd -q --state "
at_fn_check_prepare_trace "service.at:279"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:279"
$at_failed && at_fn_log_failure
$at_traceon; }






    $as_echo "service.at:280" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:280"
    $as_echo "service.at:280" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:280"

    { set +x
$as_echo "$at_srcdir/service.at:280:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getServiceSettings\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:280"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="getServiceSettings"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getServiceSettings\">
<arg direction=\"in\" name=\"service\" type=\"s\"/>
<arg direction=\"out\" type=\"(sssa(ss)asa{ss}asa(ss))\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:280"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:286" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:286"

    { set +x
$as_echo "$at_srcdir/service.at:286:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getServiceSettings \"foobar\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:286"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getServiceSettings "foobar"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(('1.1', 'foobar new', 'foobar new service is for foobar', [('12345', 'udp'), ('2222', 'tcp')], ['ftp'], @a{ss} {}, ['icmp'], [('4321', 'tcp')]),)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:286"
$at_failed && at_fn_log_failure
$at_traceon; }







    $as_echo "service.at:297" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:297"

    { set +x
$as_echo "$at_srcdir/service.at:297:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.addService \"foobar-old\"      '(\"1.0\",        \"foobar-old\",        \"foobar-old service is for foobar-old\",        [(\"1234\", \"udp\"), (\"22\", \"tcp\"), (\"1234\", \"udp\")],        [\"ftp\"],        {},        [],        [(\"4321\", \"tcp\"), (\"4321\", \"udp\")]      )'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:297"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.addService "foobar-old"      '("1.0",        "foobar-old",        "foobar-old service is for foobar-old",        [("1234", "udp"), ("22", "tcp"), ("1234", "udp")],        ["ftp"],        {},        [],        [("4321", "tcp"), ("4321", "udp")]      )'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:297"
$at_failed && at_fn_log_failure
$at_traceon; }



SERVICE_OBJ=$(sed -e "s/.*config\/service\/\([^']\+\)['].*/\1/" ./stdout)
export SERVICE_OBJ

    $as_echo "service.at:311" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:311"

    { set +x
$as_echo "$at_srcdir/service.at:311:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.update2 '{\"version\": <\"1.1\">,
       \"includes\": <[\"https\"]>,
       \"protocols\": <[\"icmp\"]>
     }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:311"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.update2 '{"version": <"1.1">,
       "includes": <["https"]>,
       "protocols": <["icmp"]>
     }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:311"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:318" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:318"

    { set +x
$as_echo "$at_srcdir/service.at:318:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:318"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(('1.1', 'foobar-old', 'foobar-old service is for foobar-old', [('1234', 'udp'), ('22', 'tcp')], ['ftp'], @a{ss} {}, ['icmp'], [('4321', 'tcp'), ('4321', 'udp')]),)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:318"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:321" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:321"

    { set +x
$as_echo "$at_srcdir/service.at:321:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings2 ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:321"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings2 ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'foobar-old service is for foobar-old'>
'includes': <['https']>
'modules': <['ftp']>
'ports': <[('1234', 'udp'), ('22', 'tcp')]>
'protocols': <['icmp']>
'short': <'foobar-old'>
'source_ports': <[('4321', 'tcp'), ('4321', 'udp')]>
'version': <'1.1'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:321"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/service.at:332:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386 firewall-cmd -q --reload "
at_fn_check_prepare_trace "service.at:332"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:332"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service.at:332:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386 firewall-cmd -q --state "
at_fn_check_prepare_trace "service.at:332"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:332"
$at_failed && at_fn_log_failure
$at_traceon; }






    $as_echo "service.at:333" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:333"

    { set +x
$as_echo "$at_srcdir/service.at:333:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getServiceSettings \"foobar-old\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:333"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getServiceSettings "foobar-old"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "(('1.1', 'foobar-old', 'foobar-old service is for foobar-old', [('1234', 'udp'), ('22', 'tcp')], ['ftp'], @a{ss} {}, ['icmp'], [('4321', 'tcp'), ('4321', 'udp')]),)
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:333"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:336" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:336"

    { set +x
$as_echo "$at_srcdir/service.at:336:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getServiceSettings2 \"foobar-old\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:336"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getServiceSettings2 "foobar-old"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'foobar-old service is for foobar-old'>
'includes': <['https']>
'modules': <['ftp']>
'ports': <[('1234', 'udp'), ('22', 'tcp')]>
'protocols': <['icmp']>
'short': <'foobar-old'>
'source_ports': <[('4321', 'tcp'), ('4321', 'udp')]>
'version': <'1.1'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:336"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:348" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:348"
    $as_echo "service.at:348" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:348"

    { set +x
$as_echo "$at_srcdir/service.at:348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"addService2\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config; echo $? >&3; } |                           xmllint --xpath '//method[@name="addService2"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"addService2\">
<arg direction=\"in\" name=\"service\" type=\"s\"/>
<arg direction=\"in\" name=\"settings\" type=\"a{sv}\"/>
<arg direction=\"out\" type=\"o\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:348"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:355" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:355"

    { set +x
$as_echo "$at_srcdir/service.at:355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.addService2 \"foobar-dict\"      '{\"version\": <\"1.0\">,
       \"short\": <\"foobar-dict\">,
       \"description\": <\"foobar-dict service is for foobar-dict\">,
       \"ports\": <[(\"1234\", \"udp\"), (\"22\", \"tcp\"), (\"1234\", \"udp\")]>,
       \"modules\": <[\"ftp\"]>,
       \"destination\": <{\"ipv6\": \"1234::4321\"}>,
       \"protocols\": <[\"icmp\", \"igmp\"]>,
       \"source_ports\": <[(\"4321\", \"tcp\"), (\"4321\", \"udp\")]>,
       \"includes\": <[\"https\", \"samba\"]>
     }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config                            --method org.fedoraproject.FirewallD1.config.addService2 "foobar-dict"      '{"version": <"1.0">,
       "short": <"foobar-dict">,
       "description": <"foobar-dict service is for foobar-dict">,
       "ports": <[("1234", "udp"), ("22", "tcp"), ("1234", "udp")]>,
       "modules": <["ftp"]>,
       "destination": <{"ipv6": "1234::4321"}>,
       "protocols": <["icmp", "igmp"]>,
       "source_ports": <[("4321", "tcp"), ("4321", "udp")]>,
       "includes": <["https", "samba"]>
     }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; tee stdout <"$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:355"
$at_failed && at_fn_log_failure
$at_traceon; }



SERVICE_OBJ=$(sed -e "s/.*config\/service\/\([^']\+\)['].*/\1/" ./stdout)
export SERVICE_OBJ


    $as_echo "service.at:371" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:371"
    $as_echo "service.at:371" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:371"

    { set +x
$as_echo "$at_srcdir/service.at:371:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getSettings2\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:371"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="getSettings2"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getSettings2\">
<arg direction=\"out\" type=\"a{sv}\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:371"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:376" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:376"

    { set +x
$as_echo "$at_srcdir/service.at:376:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings2 ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:376"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings2 ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'foobar-dict service is for foobar-dict'>
'destination': <{'ipv6': '1234::4321'}>
'includes': <['https', 'samba']>
'modules': <['ftp']>
'ports': <[('1234', 'udp'), ('22', 'tcp')]>
'protocols': <['icmp', 'igmp']>
'short': <'foobar-dict'>
'source_ports': <[('4321', 'tcp'), ('4321', 'udp')]>
'version': <'1.0'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:376"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:389" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:389"
    $as_echo "service.at:389" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:389"

    { set +x
$as_echo "$at_srcdir/service.at:389:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"update2\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:389"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}; echo $? >&3; } |                           xmllint --xpath '//method[@name="update2"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"update2\">
<arg direction=\"in\" name=\"settings\" type=\"a{sv}\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:389"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:394" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:394"

    { set +x
$as_echo "$at_srcdir/service.at:394:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.update2 '{\"version\": <\"1.1\">,
       \"includes\": <[\"https\", \"samba\", \"http\"]>
     }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:394"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.update2 '{"version": <"1.1">,
       "includes": <["https", "samba", "http"]>
     }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:394"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:399" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:399"

    { set +x
$as_echo "$at_srcdir/service.at:399:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings2 ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:399"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings2 ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'foobar-dict service is for foobar-dict'>
'destination': <{'ipv6': '1234::4321'}>
'includes': <['https', 'samba', 'http']>
'modules': <['ftp']>
'ports': <[('1234', 'udp'), ('22', 'tcp')]>
'protocols': <['icmp', 'igmp']>
'short': <'foobar-dict'>
'source_ports': <[('4321', 'tcp'), ('4321', 'udp')]>
'version': <'1.1'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:399"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:412" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:412"

    { set +x
$as_echo "$at_srcdir/service.at:412:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.update2 '{\"version\": <\"1.2\">,
       \"includes\": <@as []>
     }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:412"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.update2 '{"version": <"1.2">,
       "includes": <@as []>
     }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service.at:412"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:417" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:417"

    { set +x
$as_echo "$at_srcdir/service.at:417:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings2 ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:417"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.getSettings2 ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'foobar-dict service is for foobar-dict'>
'destination': <{'ipv6': '1234::4321'}>
'modules': <['ftp']>
'ports': <[('1234', 'udp'), ('22', 'tcp')]>
'protocols': <['icmp', 'igmp']>
'short': <'foobar-dict'>
'source_ports': <[('4321', 'tcp'), ('4321', 'udp')]>
'version': <'1.2'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:417"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/service.at:428:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386 firewall-cmd -q --reload "
at_fn_check_prepare_trace "service.at:428"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:428"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service.at:428:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386 firewall-cmd -q --state "
at_fn_check_prepare_trace "service.at:428"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:428"
$at_failed && at_fn_log_failure
$at_traceon; }






    $as_echo "service.at:429" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:429"
    $as_echo "service.at:429" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which xmllint >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:429"

    { set +x
$as_echo "$at_srcdir/service.at:429:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo \$? >&3; } |                           xmllint --xpath '//method[@name=\"getServiceSettings2\"]' - | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:429"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus introspect --xml --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1; echo $? >&3; } |                           xmllint --xpath '//method[@name="getServiceSettings2"]' - | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "<method name=\"getServiceSettings2\">
<arg direction=\"in\" name=\"service\" type=\"s\"/>
<arg direction=\"out\" type=\"a{sv}\"/>
</method>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:429"
$at_failed && at_fn_log_failure
$at_traceon; }




    $as_echo "service.at:435" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:435"

    { set +x
$as_echo "$at_srcdir/service.at:435:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getServiceSettings2 \"foobar-dict\"; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:435"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1                            --method org.fedoraproject.FirewallD1.getServiceSettings2 "foobar-dict"; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "'description': <'foobar-dict service is for foobar-dict'>
'destination': <{'ipv6': '1234::4321'}>
'modules': <['ftp']>
'ports': <[('1234', 'udp'), ('22', 'tcp')]>
'protocols': <['icmp', 'igmp']>
'short': <'foobar-dict'>
'source_ports': <[('4321', 'tcp'), ('4321', 'udp')]>
'version': <'1.2'>
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service.at:435"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "service.at:447" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386 which gdbus >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/service.at:447"

    { set +x
$as_echo "$at_srcdir/service.at:447:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18824\" ip netns exec fwd-test-386     sh <<-\"HERE\"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/\${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.update2 '{\"version\": <\"1.3\">,
       \"thisdoesnotexist\": <\"\">
     }'    ; echo \$? >&3; } |     sed -e 's/^({//' -e 's/},)\$//' -e 's/>,/>\\n/g' |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service.at:447"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18824" ip netns exec fwd-test-386     sh <<-"HERE"
    { { { { gdbus call --system --dest=org.fedoraproject.FirewallD1                            --object-path /org/fedoraproject/FirewallD1/config/service/${SERVICE_OBJ}                            --method org.fedoraproject.FirewallD1.config.service.update2 '{"version": <"1.3">,
       "thisdoesnotexist": <"">
     }'    ; echo $? >&3; } |     sed -e 's/^({//' -e 's/},)$//' -e 's/>,/>\n/g' |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     sort  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service.at:447"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"-e '/ERROR: INVALID_OPTION: service option/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_OPTION: service option/d'"; then
                sed -i -e '/ERROR: INVALID_OPTION: service option/d' ./firewalld.log
            fi
            $as_echo "service.at:453" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/service.at:453"
            $as_echo "service.at:453" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/service.at:453"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_30
#AT_START_31
at_fn_group_banner 31 'firewall-cmd.at:5' \
  "basic options" "                                  " 3
at_xfail=no
(
  $as_echo "31. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:5"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:5"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:5"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:5"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-5715" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: ip netns add fwd-test-5715"
at_fn_check_prepare_trace "firewall-cmd.at:5"
( $at_check_trace; ip netns add fwd-test-5715
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18430" ip netns exec fwd-test-5715 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-18430" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:5" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:5"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18430" ip netns exec fwd-test-5715 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:5" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:5"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18430" ip netns exec fwd-test-5715 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:5" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:5"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18430\" ip netns exec fwd-test-5715 firewall-cmd -h "
at_fn_check_prepare_trace "firewall-cmd.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18430" ip netns exec fwd-test-5715 firewall-cmd -h
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18430\" ip netns exec fwd-test-5715 firewall-cmd --help "
at_fn_check_prepare_trace "firewall-cmd.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18430" ip netns exec fwd-test-5715 firewall-cmd --help
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18430\" ip netns exec fwd-test-5715 firewall-cmd -V "
at_fn_check_prepare_trace "firewall-cmd.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18430" ip netns exec fwd-test-5715 firewall-cmd -V
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18430\" ip netns exec fwd-test-5715 firewall-cmd --reload "
at_fn_check_prepare_trace "firewall-cmd.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18430" ip netns exec fwd-test-5715 firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18430\" ip netns exec fwd-test-5715 firewall-cmd --permanent --complete-reload "
at_fn_check_prepare_trace "firewall-cmd.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18430" ip netns exec fwd-test-5715 firewall-cmd --permanent --complete-reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18430\" ip netns exec fwd-test-5715 firewall-cmd --panic-on "
at_fn_check_prepare_trace "firewall-cmd.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18430" ip netns exec fwd-test-5715 firewall-cmd --panic-on
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18430\" ip netns exec fwd-test-5715 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18430" ip netns exec fwd-test-5715 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18430\" ip netns exec fwd-test-5715 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18430" ip netns exec fwd-test-5715 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18430\" ip netns exec fwd-test-5715 firewall-cmd --query-panic "
at_fn_check_prepare_trace "firewall-cmd.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18430" ip netns exec fwd-test-5715 firewall-cmd --query-panic
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "yes
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18430\" ip netns exec fwd-test-5715 firewall-cmd --panic-off "
at_fn_check_prepare_trace "firewall-cmd.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18430" ip netns exec fwd-test-5715 firewall-cmd --panic-off
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18430\" ip netns exec fwd-test-5715 firewall-cmd --query-panic "
at_fn_check_prepare_trace "firewall-cmd.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18430" ip netns exec fwd-test-5715 firewall-cmd --query-panic
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "no
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:26" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:26"
            $as_echo "firewall-cmd.at:26" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:26"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_31
#AT_START_32
at_fn_group_banner 32 'firewall-cmd.at:28' \
  "get/list options" "                               " 3
at_xfail=no
(
  $as_echo "32. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:28: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:28"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:28: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:28"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:28: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:28"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:28: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:28"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-11965" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:28: ip netns add fwd-test-11965"
at_fn_check_prepare_trace "firewall-cmd.at:28"
( $at_check_trace; ip netns add fwd-test-11965
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11110" ip netns exec fwd-test-11965 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-11110" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:28" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:28"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11110" ip netns exec fwd-test-11965 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:28" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:28"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11110" ip netns exec fwd-test-11965 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:28" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:28"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:31:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11110\" ip netns exec fwd-test-11965 firewall-cmd --get-zones "
at_fn_check_prepare_trace "firewall-cmd.at:31"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11110" ip netns exec fwd-test-11965 firewall-cmd --get-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11110\" ip netns exec fwd-test-11965 firewall-cmd --get-services "
at_fn_check_prepare_trace "firewall-cmd.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11110" ip netns exec fwd-test-11965 firewall-cmd --get-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11110\" ip netns exec fwd-test-11965 firewall-cmd --get-icmptypes "
at_fn_check_prepare_trace "firewall-cmd.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11110" ip netns exec fwd-test-11965 firewall-cmd --get-icmptypes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:34:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11110\" ip netns exec fwd-test-11965 firewall-cmd --permanent --get-zones "
at_fn_check_prepare_trace "firewall-cmd.at:34"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11110" ip netns exec fwd-test-11965 firewall-cmd --permanent --get-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11110\" ip netns exec fwd-test-11965 firewall-cmd --permanent --get-services "
at_fn_check_prepare_trace "firewall-cmd.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11110" ip netns exec fwd-test-11965 firewall-cmd --permanent --get-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11110\" ip netns exec fwd-test-11965 firewall-cmd --permanent --get-icmptypes "
at_fn_check_prepare_trace "firewall-cmd.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11110" ip netns exec fwd-test-11965 firewall-cmd --permanent --get-icmptypes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11110\" ip netns exec fwd-test-11965 firewall-cmd --list-all-zones "
at_fn_check_prepare_trace "firewall-cmd.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11110" ip netns exec fwd-test-11965 firewall-cmd --list-all-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11110\" ip netns exec fwd-test-11965 firewall-cmd --list-all "
at_fn_check_prepare_trace "firewall-cmd.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11110" ip netns exec fwd-test-11965 firewall-cmd --list-all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:40:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11110\" ip netns exec fwd-test-11965 firewall-cmd --permanent --list-all-zones "
at_fn_check_prepare_trace "firewall-cmd.at:40"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11110" ip netns exec fwd-test-11965 firewall-cmd --permanent --list-all-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:41:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11110\" ip netns exec fwd-test-11965 firewall-cmd --permanent --list-all "
at_fn_check_prepare_trace "firewall-cmd.at:41"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11110" ip netns exec fwd-test-11965 firewall-cmd --permanent --list-all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:42" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:42"
            $as_echo "firewall-cmd.at:42" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:42"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_32
#AT_START_33
at_fn_group_banner 33 'firewall-cmd.at:44' \
  "default zone" "                                   " 3
at_xfail=no
(
  $as_echo "33. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:44: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:44"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:44: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:44"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:44: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:44"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:44: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:44"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-20099" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:44: ip netns add fwd-test-20099"
at_fn_check_prepare_trace "firewall-cmd.at:44"
( $at_check_trace; ip netns add fwd-test-20099
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13963" ip netns exec fwd-test-20099 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-13963" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:44" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:44"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13963" ip netns exec fwd-test-20099 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:44" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:44"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13963" ip netns exec fwd-test-20099 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:44" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:44"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13963\" ip netns exec fwd-test-20099 firewall-cmd --get-default-zone "
at_fn_check_prepare_trace "firewall-cmd.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13963" ip netns exec fwd-test-20099 firewall-cmd --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13963\" ip netns exec fwd-test-20099 firewall-cmd --set-default-zone=\"home\" "
at_fn_check_prepare_trace "firewall-cmd.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13963" ip netns exec fwd-test-20099 firewall-cmd --set-default-zone="home"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:50:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13963\" ip netns exec fwd-test-20099 firewall-cmd --get-default-zone "
at_fn_check_prepare_trace "firewall-cmd.at:50"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13963" ip netns exec fwd-test-20099 firewall-cmd --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "home
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13963\" ip netns exec fwd-test-20099 firewall-cmd --set-default-zone=\"public\" "
at_fn_check_prepare_trace "firewall-cmd.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13963" ip netns exec fwd-test-20099 firewall-cmd --set-default-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:53:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13963\" ip netns exec fwd-test-20099 firewall-cmd --set-default-zone "
at_fn_check_prepare_trace "firewall-cmd.at:53"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13963" ip netns exec fwd-test-20099 firewall-cmd --set-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:53"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:54" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:54"
            $as_echo "firewall-cmd.at:54" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:54"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_33
#AT_START_34
at_fn_group_banner 34 'firewall-cmd.at:56' \
  "user zone" "                                      " 3
at_xfail=no
(
  $as_echo "34. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:56: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:56"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:56: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:56"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:56: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:56"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:56: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:56"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-1457" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:56: ip netns add fwd-test-1457"
at_fn_check_prepare_trace "firewall-cmd.at:56"
( $at_check_trace; ip netns add fwd-test-1457
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-1457 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:56" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:56"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-1457 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:56" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:56"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-1457 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:56" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:56"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:59:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-1457 firewall-cmd --new-zone=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:59"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-1457 firewall-cmd --new-zone=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:59"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:60:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-1457 firewall-cmd --permanent --new-zone=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:60"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-1457 firewall-cmd --permanent --new-zone=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:60"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:61:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-1457 firewall-cmd --permanent --get-zones | grep foobar "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:61"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-1457 firewall-cmd --permanent --get-zones | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:61"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-1457 firewall-cmd --permanent --zone=foobar --get-target | grep default "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-1457 firewall-cmd --permanent --zone=foobar --get-target | grep default
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:63:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-1457 firewall-cmd --permanent --zone=foobar --set-target=BAD "
at_fn_check_prepare_trace "firewall-cmd.at:63"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-1457 firewall-cmd --permanent --zone=foobar --set-target=BAD
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 110 $at_status "$at_srcdir/firewall-cmd.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-1457 firewall-cmd --permanent --zone=foobar --set-target=%%REJECT%% "
at_fn_check_prepare_trace "firewall-cmd.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-1457 firewall-cmd --permanent --zone=foobar --set-target=%%REJECT%%
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:65:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-1457 firewall-cmd --permanent --zone=foobar --set-target=DROP "
at_fn_check_prepare_trace "firewall-cmd.at:65"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-1457 firewall-cmd --permanent --zone=foobar --set-target=DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:66:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-1457 firewall-cmd --permanent --zone=foobar --set-target=ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:66"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-1457 firewall-cmd --permanent --zone=foobar --set-target=ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:66"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:67:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-1457 firewall-cmd --permanent --zone=foobar --get-target | grep ACCEPT "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:67"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-1457 firewall-cmd --permanent --zone=foobar --get-target | grep ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:67"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:68:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5289\" ip netns exec fwd-test-1457 firewall-cmd --permanent --zone=foobar --add-service=ssh "
at_fn_check_prepare_trace "firewall-cmd.at:68"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5289" ip netns exec fwd-test-1457 firewall-cmd --permanent --zone=foobar --add-service=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:68"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"-e '/ERROR: INVALID_TARGET: BAD/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_TARGET: BAD/d'"; then
                sed -i -e '/ERROR: INVALID_TARGET: BAD/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:69" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:69"
            $as_echo "firewall-cmd.at:69" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:69"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_34
#AT_START_35
at_fn_group_banner 35 'firewall-cmd.at:71' \
  "zone interfaces" "                                " 3
at_xfail=no
(
  $as_echo "35. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:71: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:71"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:71: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:71"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:71: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:71"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:71: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:71"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-26734" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:71: ip netns add fwd-test-26734"
at_fn_check_prepare_trace "firewall-cmd.at:71"
( $at_check_trace; ip netns add fwd-test-26734
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:71" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:71"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:71" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:71"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:71" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:71"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:74:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --zone=work --add-interface=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:74"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --zone=work --add-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:74"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:75:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --get-zone-of-interface=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:75"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --get-zone-of-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:75"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:77:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --get-active-zones "
at_fn_check_prepare_trace "firewall-cmd.at:77"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --get-active-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:77"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:78:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --zone work --query-interface=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:78"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --zone work --query-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:78"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:80:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --zone=public --change-interface=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:80"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --zone=public --change-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:80"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:81:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --get-zone-of-interface=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:81"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --get-zone-of-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:81"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:83:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --zone=block --add-interface=dummy1 "
at_fn_check_prepare_trace "firewall-cmd.at:83"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --zone=block --add-interface=dummy1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:83"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:84:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --zone=block --remove-interface=dummy1 "
at_fn_check_prepare_trace "firewall-cmd.at:84"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --zone=block --remove-interface=dummy1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:84"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:86:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --zone=dmz --change-zone=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:86"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --zone=dmz --change-zone=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:86"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:87:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --get-zone-of-interface=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:87"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --get-zone-of-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dmz
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:87"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:89:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --zone=dmz --list-interfaces "
at_fn_check_prepare_trace "firewall-cmd.at:89"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --zone=dmz --list-interfaces
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dummy
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:89"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:91:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --zone=dmz --remove-interface=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:91"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --zone=dmz --remove-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:91"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:92:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --zone=dmz --query-interface dummy "
at_fn_check_prepare_trace "firewall-cmd.at:92"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --zone=dmz --query-interface dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:92"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:94:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --zone=dmz --change-interface=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:94"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --zone=dmz --change-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:95:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --zone=dmz --query-interface dummy "
at_fn_check_prepare_trace "firewall-cmd.at:95"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --zone=dmz --query-interface dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:96:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --zone=dmz --remove-interface=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:96"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --zone=dmz --remove-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:98:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --zone=dmz --query-interface dummy "
at_fn_check_prepare_trace "firewall-cmd.at:98"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --zone=dmz --query-interface dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:98"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:99:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --get-zone-of-interface=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:99"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --get-zone-of-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:99"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:100:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --get-zone-of-interface "
at_fn_check_prepare_trace "firewall-cmd.at:100"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --get-zone-of-interface
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:100"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:101:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --zone=dmz --get-zones "
at_fn_check_prepare_trace "firewall-cmd.at:101"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --zone=dmz --get-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:101"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:102:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --zone=dmz --get-services "
at_fn_check_prepare_trace "firewall-cmd.at:102"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --zone=dmz --get-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:102"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --zone=dmz --get-default-zone "
at_fn_check_prepare_trace "firewall-cmd.at:103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --zone=dmz --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:104:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --zone=dmz --set-default-zone "
at_fn_check_prepare_trace "firewall-cmd.at:104"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --zone=dmz --set-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:104"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:105:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --zone=dmz --get-zone-of-interface "
at_fn_check_prepare_trace "firewall-cmd.at:105"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --zone=dmz --get-zone-of-interface
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:105"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:107:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --permanent --zone=work --add-interface=perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:107"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --permanent --zone=work --add-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:107"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:108:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --permanent --zone=trusted --add-interface=perm_dummy2 "
at_fn_check_prepare_trace "firewall-cmd.at:108"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --permanent --zone=trusted --add-interface=perm_dummy2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:108"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:109:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:109"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:109"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:109:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:109"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:109"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:110:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --permanent --get-zone-of-interface=perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:110"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --permanent --get-zone-of-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:110"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:112:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --permanent --zone work --query-interface=perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:112"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --permanent --zone work --query-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:113:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --permanent --zone=work --list-interfaces "
at_fn_check_prepare_trace "firewall-cmd.at:113"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --permanent --zone=work --list-interfaces
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "perm_dummy
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:113"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:116:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --permanent --zone=public --add-interface=perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:116"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --permanent --zone=public --add-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 18 $at_status "$at_srcdir/firewall-cmd.at:116"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:119:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --permanent --zone=public --change-interface=perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:119"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --permanent --zone=public --change-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:119"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:120:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --permanent --get-zone-of-interface=perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:120"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --permanent --get-zone-of-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:120"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:122:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --permanent --zone=public --remove-interface=perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:122"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --permanent --zone=public --remove-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:122"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:123:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --permanent --zone=public --query-interface perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:123"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --permanent --zone=public --query-interface perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:123"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:124:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --permanent --zone=public --change-interface=perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:124"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --permanent --zone=public --change-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:124"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:125:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --permanent --get-zone-of-interface=perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:125"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --permanent --get-zone-of-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:125"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:127:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --permanent --zone=public --remove-interface=perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:127"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --permanent --zone=public --remove-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:127"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:128:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --permanent --zone=public --query-interface perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:128"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --permanent --zone=public --query-interface perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:128"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:129:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --permanent --zone=trusted --remove-interface=perm_dummy2 "
at_fn_check_prepare_trace "firewall-cmd.at:129"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --permanent --zone=trusted --remove-interface=perm_dummy2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:129"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:130:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:130"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:130"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:130:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:130"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:130"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:132:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --add-interface=foo "
at_fn_check_prepare_trace "firewall-cmd.at:132"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --add-interface=foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:132"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:133:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --add-interface=bar --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:133"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --add-interface=bar --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:133"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:134:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --set-default-zone=trusted "
at_fn_check_prepare_trace "firewall-cmd.at:134"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --set-default-zone=trusted
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:134"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:135:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --get-default-zone "
at_fn_check_prepare_trace "firewall-cmd.at:135"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "trusted
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:135"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:138:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --query-interface foo --zone=trusted "
at_fn_check_prepare_trace "firewall-cmd.at:138"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --query-interface foo --zone=trusted
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:138"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:140:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --query-interface bar --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:140"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --query-interface bar --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:140"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:141:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --set-default-zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:141"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --set-default-zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:141"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:142:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --remove-interface=foo "
at_fn_check_prepare_trace "firewall-cmd.at:142"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --remove-interface=foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:142"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:143:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --remove-interface=bar "
at_fn_check_prepare_trace "firewall-cmd.at:143"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --remove-interface=bar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:143"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:148:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --zone=trusted --add-interface=+ "
at_fn_check_prepare_trace "firewall-cmd.at:148"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --zone=trusted --add-interface=+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:148"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:149:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --add-interface=foobar+++ "
at_fn_check_prepare_trace "firewall-cmd.at:149"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --add-interface=foobar+++
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:149"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:150:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --add-interface=foobar+ "
at_fn_check_prepare_trace "firewall-cmd.at:150"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --add-interface=foobar+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:150"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:151:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_INPUT_ZONES_IFACES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:151"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_INPUT_ZONES_IFACES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_ZONES_IFACES {
iifname \"foobar*\" goto filter_IN_public
iifname \"foobar++*\" goto filter_IN_public
goto filter_IN_trusted
goto filter_IN_public
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:151"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:161:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --zone=trusted --remove-interface=+ "
at_fn_check_prepare_trace "firewall-cmd.at:161"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --zone=trusted --remove-interface=+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:161"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:162:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --remove-interface=foobar+++ "
at_fn_check_prepare_trace "firewall-cmd.at:162"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --remove-interface=foobar+++
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:162"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:163:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --remove-interface=foobar+ "
at_fn_check_prepare_trace "firewall-cmd.at:163"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --remove-interface=foobar+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:163"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:164:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --permanent --add-interface=foobar+ "
at_fn_check_prepare_trace "firewall-cmd.at:164"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --permanent --add-interface=foobar+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:164"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:165:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd --permanent --remove-interface=foobar+ "
at_fn_check_prepare_trace "firewall-cmd.at:165"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd --permanent --remove-interface=foobar+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:165"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:166:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:166"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:166"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:166:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17369\" ip netns exec fwd-test-26734 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:166"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17369" ip netns exec fwd-test-26734 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:166"
$at_failed && at_fn_log_failure
$at_traceon; }











        if test x"-e '/ERROR: ZONE_CONFLICT: perm_dummy/d'" != x"ignore"; then
            if test -n "-e '/ERROR: ZONE_CONFLICT: perm_dummy/d'"; then
                sed -i -e '/ERROR: ZONE_CONFLICT: perm_dummy/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:167" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:167"
            $as_echo "firewall-cmd.at:167" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:167"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_35
#AT_START_36
at_fn_group_banner 36 'firewall-cmd.at:169' \
  "zone sources" "                                   " 3
at_xfail=no
(
  $as_echo "36. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:169: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:169"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:169"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:169: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:169"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:169"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:169: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:169"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:169"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:169: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:169"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:169"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-21565" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:169: ip netns add fwd-test-21565"
at_fn_check_prepare_trace "firewall-cmd.at:169"
( $at_check_trace; ip netns add fwd-test-21565
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:169"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:169" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:169"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:169" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:169"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:169" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:169"











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --zone=public --add-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --zone=public --add-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --get-zone-of-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --zone=public --list-sources "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --get-active-zones | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep \"^\\(public\\|sources\\)\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --get-active-zones | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep "^\(public\|sources\)"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
sources: 1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --zone public --query-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --zone public --query-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --zone=work --change-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --zone=work --change-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --get-zone-of-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --zone=work --remove-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --zone=work --remove-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --zone work --query-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --zone work --query-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --get-zone-of-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --get-zone-of-source "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --get-zone-of-source
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=public --add-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=public --add-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --permanent --get-zone-of-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --permanent --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=public --list-sources "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone public --query-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone public --query-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=work --add-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=work --add-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 18 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=work --change-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=work --change-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --permanent --get-zone-of-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --permanent --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=work --remove-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=work --remove-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone work --query-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone work --query-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --zone=public --add-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --zone=public --add-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --get-zone-of-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --zone=public --list-sources "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --get-active-zones | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep \"^\\(public\\|sources\\)\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --get-active-zones | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep "^\(public\|sources\)"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
sources: 192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --zone public --query-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --zone public --query-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --zone=work --change-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --zone=work --change-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --get-zone-of-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --zone=work --remove-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --zone=work --remove-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --zone work --query-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --zone work --query-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --get-zone-of-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --get-zone-of-source "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --get-zone-of-source
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=public --add-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=public --add-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --permanent --get-zone-of-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --permanent --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=public --list-sources "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone public --query-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone public --query-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=work --add-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=work --add-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 18 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=work --change-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=work --change-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --permanent --get-zone-of-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --permanent --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=work --remove-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=work --remove-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone work --query-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone work --query-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --zone=public --add-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --zone=public --add-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --get-zone-of-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --get-zone-of-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --zone=public --list-sources "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "3ffe:501:ffff::/64
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 3ffe:501:ffff::/64
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --get-active-zones | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep \"^\\(public\\|sources\\)\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --get-active-zones | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep "^\(public\|sources\)"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
sources: 3ffe:501:ffff::/64
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --zone public --query-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --zone public --query-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --zone=work --change-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --zone=work --change-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --get-zone-of-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --get-zone-of-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --zone=work --remove-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --zone=work --remove-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --zone work --query-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --zone work --query-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --get-zone-of-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --get-zone-of-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --get-zone-of-source "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --get-zone-of-source
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=public --add-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=public --add-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --permanent --get-zone-of-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --permanent --get-zone-of-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=public --list-sources "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "3ffe:501:ffff::/64
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 3ffe:501:ffff::/64
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone public --query-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone public --query-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=work --add-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=work --add-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 18 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=work --change-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=work --change-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --permanent --get-zone-of-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --permanent --get-zone-of-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=work --remove-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=work --remove-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone work --query-source=3ffe:501:ffff::/64 "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone work --query-source=3ffe:501:ffff::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --zone=public --add-source=dead:beef::babe "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --zone=public --add-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --get-zone-of-source=dead:beef::babe "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --get-zone-of-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --zone=public --list-sources "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dead:beef::babe
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: dead:beef::babe
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --get-active-zones | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep \"^\\(public\\|sources\\)\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --get-active-zones | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep "^\(public\|sources\)"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
sources: dead:beef::babe
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --zone public --query-source=dead:beef::babe "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --zone public --query-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --zone=work --change-source=dead:beef::babe "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --zone=work --change-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --get-zone-of-source=dead:beef::babe "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --get-zone-of-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --zone=work --remove-source=dead:beef::babe "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --zone=work --remove-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --zone work --query-source=dead:beef::babe "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --zone work --query-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --get-zone-of-source=dead:beef::babe "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --get-zone-of-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --get-zone-of-source "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --get-zone-of-source
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=public --add-source=dead:beef::babe "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=public --add-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --permanent --get-zone-of-source=dead:beef::babe "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --permanent --get-zone-of-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=public --list-sources "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dead:beef::babe
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: dead:beef::babe
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone public --query-source=dead:beef::babe "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone public --query-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=work --add-source=dead:beef::babe "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=work --add-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 18 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=work --change-source=dead:beef::babe "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=work --change-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --permanent --get-zone-of-source=dead:beef::babe "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --permanent --get-zone-of-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=work --remove-source=dead:beef::babe "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone=work --remove-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:212:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6123\" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone work --query-source=dead:beef::babe "
at_fn_check_prepare_trace "firewall-cmd.at:212"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6123" ip netns exec fwd-test-21565 firewall-cmd --permanent --zone work --query-source=dead:beef::babe
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:212"
$at_failed && at_fn_log_failure
$at_traceon; }
















        if test x" -e '/ERROR: ZONE_CONFLICT/d'" != x"ignore"; then
            if test -n " -e '/ERROR: ZONE_CONFLICT/d'"; then
                sed -i  -e '/ERROR: ZONE_CONFLICT/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:219" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:219"
            $as_echo "firewall-cmd.at:219" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:219"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_36
#AT_START_37
at_fn_group_banner 37 'firewall-cmd.at:221' \
  "services" "                                       " 3
at_xfail=no
(
  $as_echo "37. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:221: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:221"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:221"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:221: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:221"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:221"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:221: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:221"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:221"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:221: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:221"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:221"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-17487" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:221: ip netns add fwd-test-17487"
at_fn_check_prepare_trace "firewall-cmd.at:221"
( $at_check_trace; ip netns add fwd-test-17487
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:221"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2665" ip netns exec fwd-test-17487 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-2665" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:221" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:221"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2665" ip netns exec fwd-test-17487 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:221" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:221"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2665" ip netns exec fwd-test-17487 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:221" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:221"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:224:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2665\" ip netns exec fwd-test-17487 firewall-cmd --add-service=dns --timeout 60 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:224"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2665" ip netns exec fwd-test-17487 firewall-cmd --add-service=dns --timeout 60 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:224"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:225:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2665\" ip netns exec fwd-test-17487 firewall-cmd --query-service dns "
at_fn_check_prepare_trace "firewall-cmd.at:225"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2665" ip netns exec fwd-test-17487 firewall-cmd --query-service dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:225"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:226:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2665\" ip netns exec fwd-test-17487 firewall-cmd --remove-service=dns "
at_fn_check_prepare_trace "firewall-cmd.at:226"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2665" ip netns exec fwd-test-17487 firewall-cmd --remove-service=dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:226"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:227:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2665\" ip netns exec fwd-test-17487 firewall-cmd --query-service=dns "
at_fn_check_prepare_trace "firewall-cmd.at:227"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2665" ip netns exec fwd-test-17487 firewall-cmd --query-service=dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:227"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:228:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2665\" ip netns exec fwd-test-17487 firewall-cmd --add-service=smtpssssssss "
at_fn_check_prepare_trace "firewall-cmd.at:228"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2665" ip netns exec fwd-test-17487 firewall-cmd --add-service=smtpssssssss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/firewall-cmd.at:228"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:229:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2665\" ip netns exec fwd-test-17487 firewall-cmd --add-service=dns --timeout "
at_fn_check_prepare_trace "firewall-cmd.at:229"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2665" ip netns exec fwd-test-17487 firewall-cmd --add-service=dns --timeout
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:229"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:230:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2665\" ip netns exec fwd-test-17487 firewall-cmd --add-service=dns --add-interface=dummy0 "
at_fn_check_prepare_trace "firewall-cmd.at:230"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2665" ip netns exec fwd-test-17487 firewall-cmd --add-service=dns --add-interface=dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:230"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:232:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2665\" ip netns exec fwd-test-17487 firewall-cmd --permanent --zone=external --add-service=dns --timeout 60 "
at_fn_check_prepare_trace "firewall-cmd.at:232"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2665" ip netns exec fwd-test-17487 firewall-cmd --permanent --zone=external --add-service=dns --timeout 60
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:232"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:233:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2665\" ip netns exec fwd-test-17487 firewall-cmd --permanent --zone=external --add-service dns "
at_fn_check_prepare_trace "firewall-cmd.at:233"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2665" ip netns exec fwd-test-17487 firewall-cmd --permanent --zone=external --add-service dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:233"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:234:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2665\" ip netns exec fwd-test-17487 firewall-cmd --permanent --zone=external --list-services "
at_fn_check_prepare_trace "firewall-cmd.at:234"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2665" ip netns exec fwd-test-17487 firewall-cmd --permanent --zone=external --list-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dns ssh
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:234"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:236:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2665\" ip netns exec fwd-test-17487 firewall-cmd --permanent --zone=external --query-service dns "
at_fn_check_prepare_trace "firewall-cmd.at:236"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2665" ip netns exec fwd-test-17487 firewall-cmd --permanent --zone=external --query-service dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:236"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:237:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2665\" ip netns exec fwd-test-17487 firewall-cmd --permanent --zone=external --remove-service=dns "
at_fn_check_prepare_trace "firewall-cmd.at:237"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2665" ip netns exec fwd-test-17487 firewall-cmd --permanent --zone=external --remove-service=dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:237"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:242:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2665\" ip netns exec fwd-test-17487 firewall-cmd --permanent --zone=external --query-service=dns "
at_fn_check_prepare_trace "firewall-cmd.at:242"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2665" ip netns exec fwd-test-17487 firewall-cmd --permanent --zone=external --query-service=dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:242"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:243:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2665\" ip netns exec fwd-test-17487 firewall-cmd --permanent --zone=external --add-service=smtpssssssss "
at_fn_check_prepare_trace "firewall-cmd.at:243"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2665" ip netns exec fwd-test-17487 firewall-cmd --permanent --zone=external --add-service=smtpssssssss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/firewall-cmd.at:243"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:244:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2665\" ip netns exec fwd-test-17487 firewall-cmd --permanent --zone=external --add-service=dns --add-interface=dummy0 "
at_fn_check_prepare_trace "firewall-cmd.at:244"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2665" ip netns exec fwd-test-17487 firewall-cmd --permanent --zone=external --add-service=dns --add-interface=dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:244"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:246:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2665\" ip netns exec fwd-test-17487 firewall-cmd --add-service=http --add-service=nfs --timeout=1h "
at_fn_check_prepare_trace "firewall-cmd.at:246"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2665" ip netns exec fwd-test-17487 firewall-cmd --add-service=http --add-service=nfs --timeout=1h
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:246"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:247:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2665\" ip netns exec fwd-test-17487 firewall-cmd --query-service http "
at_fn_check_prepare_trace "firewall-cmd.at:247"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2665" ip netns exec fwd-test-17487 firewall-cmd --query-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:247"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:248:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2665\" ip netns exec fwd-test-17487 firewall-cmd --query-service=nfs --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:248"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2665" ip netns exec fwd-test-17487 firewall-cmd --query-service=nfs --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:248"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:249:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2665\" ip netns exec fwd-test-17487 firewall-cmd --remove-service=nfs --remove-service=http "
at_fn_check_prepare_trace "firewall-cmd.at:249"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2665" ip netns exec fwd-test-17487 firewall-cmd --remove-service=nfs --remove-service=http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:249"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:250:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2665\" ip netns exec fwd-test-17487 firewall-cmd --query-service http "
at_fn_check_prepare_trace "firewall-cmd.at:250"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2665" ip netns exec fwd-test-17487 firewall-cmd --query-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:250"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:251:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2665\" ip netns exec fwd-test-17487 firewall-cmd --query-service nfs "
at_fn_check_prepare_trace "firewall-cmd.at:251"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2665" ip netns exec fwd-test-17487 firewall-cmd --query-service nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:251"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:253:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2665\" ip netns exec fwd-test-17487 firewall-cmd --permanent --add-service=http --add-service=nfs "
at_fn_check_prepare_trace "firewall-cmd.at:253"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2665" ip netns exec fwd-test-17487 firewall-cmd --permanent --add-service=http --add-service=nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:253"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:254:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2665\" ip netns exec fwd-test-17487 firewall-cmd --permanent --query-service http "
at_fn_check_prepare_trace "firewall-cmd.at:254"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2665" ip netns exec fwd-test-17487 firewall-cmd --permanent --query-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:254"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:255:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2665\" ip netns exec fwd-test-17487 firewall-cmd --permanent --query-service=nfs --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:255"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2665" ip netns exec fwd-test-17487 firewall-cmd --permanent --query-service=nfs --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:255"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:256:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2665\" ip netns exec fwd-test-17487 firewall-cmd --permanent --remove-service=nfs --remove-service=http "
at_fn_check_prepare_trace "firewall-cmd.at:256"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2665" ip netns exec fwd-test-17487 firewall-cmd --permanent --remove-service=nfs --remove-service=http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:256"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:261:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2665\" ip netns exec fwd-test-17487 firewall-cmd --permanent  --query-service http "
at_fn_check_prepare_trace "firewall-cmd.at:261"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2665" ip netns exec fwd-test-17487 firewall-cmd --permanent  --query-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:261"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:262:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2665\" ip netns exec fwd-test-17487 firewall-cmd --permanent  --query-service nfs "
at_fn_check_prepare_trace "firewall-cmd.at:262"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2665" ip netns exec fwd-test-17487 firewall-cmd --permanent  --query-service nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:262"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"-e '/ERROR: INVALID_SERVICE:/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_SERVICE:/d'"; then
                sed -i -e '/ERROR: INVALID_SERVICE:/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:263" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:263"
            $as_echo "firewall-cmd.at:263" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:263"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_37
#AT_START_38
at_fn_group_banner 38 'firewall-cmd.at:265' \
  "user services" "                                  " 3
at_xfail=no
(
  $as_echo "38. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:265: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:265"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:265"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:265: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:265"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:265"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:265: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:265"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:265"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:265: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:265"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:265"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-16129" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:265: ip netns add fwd-test-16129"
at_fn_check_prepare_trace "firewall-cmd.at:265"
( $at_check_trace; ip netns add fwd-test-16129
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:265"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:265" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:265"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:265" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:265"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:265" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:265"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:268:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --new-service=ssh "
at_fn_check_prepare_trace "firewall-cmd.at:268"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --new-service=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 26 $at_status "$at_srcdir/firewall-cmd.at:268"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:270:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --new-service=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:270"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --new-service=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:270"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:271:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --get-services | grep foobar "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:271"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --get-services | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:271"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:273:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --add-port=666 "
at_fn_check_prepare_trace "firewall-cmd.at:273"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --add-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:273"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:274:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --add-port=666/dummy "
at_fn_check_prepare_trace "firewall-cmd.at:274"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --add-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:274"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:275:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --add-port=666/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:275"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --add-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:275"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:276:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --remove-port=666/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:276"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --remove-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:276"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:277:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --add-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:277"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --add-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:277"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:278:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --query-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:278"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:278"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:279:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --remove-port 111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:279"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --remove-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:279"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:280:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --query-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:280"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:280"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:281:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --add-port=666/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:281"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --add-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:281"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:282:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --remove-port=666/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:282"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --remove-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:282"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:283:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --remove-port 666/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:283"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --remove-port 666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:283"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:284:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --query-port=666/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:284"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --query-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:284"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:285:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --add-port=999/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:285"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --add-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:285"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:286:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --remove-port=999/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:286"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --remove-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:286"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:287:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --remove-port 999/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:287"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --remove-port 999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:287"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:288:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --query-port=999/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:288"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --query-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:288"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:289:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --add-port=666/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:289"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --add-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:289"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:290:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --add-port=999/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:290"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --add-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:290"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:292:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --add-protocol=ddp --add-protocol gre "
at_fn_check_prepare_trace "firewall-cmd.at:292"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --add-protocol=ddp --add-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:292"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:293:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --query-protocol=ddp "
at_fn_check_prepare_trace "firewall-cmd.at:293"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:293"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:294:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --query-protocol=gre "
at_fn_check_prepare_trace "firewall-cmd.at:294"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:294"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:295:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --remove-protocol ddp "
at_fn_check_prepare_trace "firewall-cmd.at:295"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --remove-protocol ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:295"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:296:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --remove-protocol gre "
at_fn_check_prepare_trace "firewall-cmd.at:296"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --remove-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:296"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:297:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --query-protocol=ddp "
at_fn_check_prepare_trace "firewall-cmd.at:297"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:297"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:298:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --query-protocol=gre "
at_fn_check_prepare_trace "firewall-cmd.at:298"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:298"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:300:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --add-module=sip "
at_fn_check_prepare_trace "firewall-cmd.at:300"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --add-module=sip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:300"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:301:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --remove-module=sip "
at_fn_check_prepare_trace "firewall-cmd.at:301"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --remove-module=sip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:301"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:302:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --add-module=ftp "
at_fn_check_prepare_trace "firewall-cmd.at:302"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --add-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:302"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:303:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --query-module=ftp "
at_fn_check_prepare_trace "firewall-cmd.at:303"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --query-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:303"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:304:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --remove-module=ftp "
at_fn_check_prepare_trace "firewall-cmd.at:304"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --remove-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:304"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:305:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --query-module=ftp "
at_fn_check_prepare_trace "firewall-cmd.at:305"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --query-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:305"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:307:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --set-destination=ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:307"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --set-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 121 $at_status "$at_srcdir/firewall-cmd.at:307"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:308:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --set-destination=ipv4:foo "
at_fn_check_prepare_trace "firewall-cmd.at:308"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --set-destination=ipv4:foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/firewall-cmd.at:308"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:309:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --set-destination=ipv4:1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:309"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --set-destination=ipv4:1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:309"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:310:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --remove-destination=ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:310"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --remove-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:310"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:311:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --set-destination=ipv6:fd00:dead:beef:ff0::/64 "
at_fn_check_prepare_trace "firewall-cmd.at:311"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --set-destination=ipv6:fd00:dead:beef:ff0::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:311"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:311:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64 "
at_fn_check_prepare_trace "firewall-cmd.at:311"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:311"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:311:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --remove-destination=ipv6 "
at_fn_check_prepare_trace "firewall-cmd.at:311"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --remove-destination=ipv6
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:311"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:311:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64 "
at_fn_check_prepare_trace "firewall-cmd.at:311"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --service=foobar --query-destination=ipv6:fd00:dead:beef:ff0::/64
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:311"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:318:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --zone=public --add-service=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:318"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --zone=public --add-service=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:318"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:319:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --zone=public --list-services | grep foobar "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:319"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --zone=public --list-services | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:319"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:320:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --delete-service=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:320"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --delete-service=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:320"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:321:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --zone=public --list-services | grep foobar "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:321"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --zone=public --list-services | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:321"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./foobar-to-be-renamed <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<protocol value="icmp" />
<port protocol="tcp" port="1234" />
</service>




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:323:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --new-service-from-file=\"./foobar-to-be-renamed\" --name=\"foobar-from-file\" "
at_fn_check_prepare_trace "firewall-cmd.at:323"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --new-service-from-file="./foobar-to-be-renamed" --name="foobar-from-file"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:323"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:323:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29937\" ip netns exec fwd-test-16129 firewall-cmd --permanent --get-services | grep foobar-from-file "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:323"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29937" ip netns exec fwd-test-16129 firewall-cmd --permanent --get-services | grep foobar-from-file
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:323"
$at_failed && at_fn_log_failure
$at_traceon; }




_ATEOF








        if test x"-e '/ERROR: NAME_CONFLICT: new_service():/d'               -e '/ERROR: INVALID_ADDR:/d'" != x"ignore"; then
            if test -n "-e '/ERROR: NAME_CONFLICT: new_service():/d'               -e '/ERROR: INVALID_ADDR:/d'"; then
                sed -i -e '/ERROR: NAME_CONFLICT: new_service():/d'               -e '/ERROR: INVALID_ADDR:/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:334" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:334"
            $as_echo "firewall-cmd.at:334" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:334"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_38
#AT_START_39
at_fn_group_banner 39 'firewall-cmd.at:337' \
  "ports" "                                          " 3
at_xfail=no
(
  $as_echo "39. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:337: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:337"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:337"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:337: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:337"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:337"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:337: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:337"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:337"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:337: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:337"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:337"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-22017" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:337: ip netns add fwd-test-22017"
at_fn_check_prepare_trace "firewall-cmd.at:337"
( $at_check_trace; ip netns add fwd-test-22017
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:337"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:337" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:337"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:337" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:337"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:337" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:337"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --zone home --list-ports "
at_fn_check_prepare_trace "firewall-cmd.at:340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --zone home --list-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:341:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --add-port=666 "
at_fn_check_prepare_trace "firewall-cmd.at:341"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --add-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:341"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:342:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --add-port=666/dummy "
at_fn_check_prepare_trace "firewall-cmd.at:342"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --add-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:342"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:343:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --add-port 122/udpa --add-port 122/udpp --add-port 8745897/foo "
at_fn_check_prepare_trace "firewall-cmd.at:343"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --add-port 122/udpa --add-port 122/udpp --add-port 8745897/foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 254 $at_status "$at_srcdir/firewall-cmd.at:343"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:344:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --add-port 122/udpa --add-port 122/udpp --add-port 8745897/foo --add-port bar "
at_fn_check_prepare_trace "firewall-cmd.at:344"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --add-port 122/udpa --add-port 122/udpp --add-port 8745897/foo --add-port bar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 254 $at_status "$at_srcdir/firewall-cmd.at:344"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:345:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --add-port=666/tcp --zone=public --timeout=30m "
at_fn_check_prepare_trace "firewall-cmd.at:345"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --add-port=666/tcp --zone=public --timeout=30m
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:345"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:346:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --remove-port=666/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:346"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --remove-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:346"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:347:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --add-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:347"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --add-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:347"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --query-port=111-222/udp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --query-port=111-222/udp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:348"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:349:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --remove-port 111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:349"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --remove-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:349"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:350:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --query-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:350"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:350"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:352:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --add-port=5000/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:352"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --add-port=5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:352"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:353:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --query-port=5000/sctp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:353"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --query-port=5000/sctp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:353"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --remove-port 5000/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --remove-port 5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --query-port=5000/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --query-port=5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:355"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:356:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --add-port=222/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:356"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --add-port=222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:356"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:357:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --query-port=222/dccp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:357"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --query-port=222/dccp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:357"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:358:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --remove-port 222/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:358"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --remove-port 222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:358"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:359:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --query-port=222/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:359"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --query-port=222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:359"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:361:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --permanent --add-port=666 "
at_fn_check_prepare_trace "firewall-cmd.at:361"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --permanent --add-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:361"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:362:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --permanent --add-port=666/dummy "
at_fn_check_prepare_trace "firewall-cmd.at:362"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --permanent --add-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:362"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:363:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --permanent --add-port=666/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:363"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --permanent --add-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:363"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:364:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --permanent --remove-port=666/tcp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:364"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --permanent --remove-port=666/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:364"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --permanent --add-port=111-222/udp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --permanent --add-port=111-222/udp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:365"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:366:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --permanent --query-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:366"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --permanent --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:366"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:367:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --permanent --remove-port 111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:367"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --permanent --remove-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:367"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:368:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --permanent --query-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:368"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --permanent --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:368"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:370:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --permanent --add-port=5000/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:370"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --permanent --add-port=5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:370"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:371:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --permanent --query-port=5000/sctp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:371"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --permanent --query-port=5000/sctp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:371"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:372:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --permanent --remove-port 5000/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:372"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --permanent --remove-port 5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:372"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:373:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --permanent --query-port=5000/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:373"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --permanent --query-port=5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:373"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:374:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --permanent --add-port=222/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:374"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --permanent --add-port=222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:374"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:375:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --permanent --query-port=222/dccp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:375"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --permanent --query-port=222/dccp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:375"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:376:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --permanent --remove-port 222/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:376"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --permanent --remove-port 222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:376"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:377:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --permanent --query-port=222/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:377"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --permanent --query-port=222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:377"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:379:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --add-port=80/tcp --add-port 443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:379"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --add-port=80/tcp --add-port 443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:379"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:380:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --query-port=80/tcp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:380"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --query-port=80/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:380"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:381:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --query-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:381"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --query-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:381"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:382:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --remove-port 80/tcp --remove-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:382"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --remove-port 80/tcp --remove-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:382"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:383:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --query-port=80/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:383"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --query-port=80/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:383"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:384:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --query-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:384"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --query-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:384"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:386:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --permanent --add-port=80/tcp --add-port 443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:386"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --permanent --add-port=80/tcp --add-port 443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:386"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:387:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --permanent --query-port=80/tcp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:387"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --permanent --query-port=80/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:387"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:388:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --permanent --query-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:388"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --permanent --query-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:388"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:389:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --permanent --remove-port 80/tcp --remove-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:389"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --permanent --remove-port 80/tcp --remove-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:389"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:390:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --permanent --query-port=80/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:390"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --permanent --query-port=80/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:390"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:391:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26611\" ip netns exec fwd-test-22017 firewall-cmd --permanent --query-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:391"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26611" ip netns exec fwd-test-22017 firewall-cmd --permanent --query-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:391"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:392" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:392"
            $as_echo "firewall-cmd.at:392" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:392"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_39
#AT_START_40
at_fn_group_banner 40 'firewall-cmd.at:394' \
  "source ports" "                                   " 3
at_xfail=no
(
  $as_echo "40. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:394: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:394"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:394"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:394: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:394"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:394"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:394: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:394"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:394"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:394: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:394"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:394"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-29935" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:394: ip netns add fwd-test-29935"
at_fn_check_prepare_trace "firewall-cmd.at:394"
( $at_check_trace; ip netns add fwd-test-29935
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:394"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30806" ip netns exec fwd-test-29935 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-30806" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:394" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:394"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30806" ip netns exec fwd-test-29935 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:394" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:394"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30806" ip netns exec fwd-test-29935 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:394" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:394"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:397:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30806\" ip netns exec fwd-test-29935 firewall-cmd --zone home --list-source-ports "
at_fn_check_prepare_trace "firewall-cmd.at:397"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30806" ip netns exec fwd-test-29935 firewall-cmd --zone home --list-source-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:397"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:398:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30806\" ip netns exec fwd-test-29935 firewall-cmd --add-source-port=666 "
at_fn_check_prepare_trace "firewall-cmd.at:398"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30806" ip netns exec fwd-test-29935 firewall-cmd --add-source-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:398"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:399:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30806\" ip netns exec fwd-test-29935 firewall-cmd --add-source-port=666/dummy "
at_fn_check_prepare_trace "firewall-cmd.at:399"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30806" ip netns exec fwd-test-29935 firewall-cmd --add-source-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:399"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:400:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30806\" ip netns exec fwd-test-29935 firewall-cmd --add-source-port=666/tcp --zone=public --timeout=30m "
at_fn_check_prepare_trace "firewall-cmd.at:400"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30806" ip netns exec fwd-test-29935 firewall-cmd --add-source-port=666/tcp --zone=public --timeout=30m
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:400"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:401:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30806\" ip netns exec fwd-test-29935 firewall-cmd --remove-source-port=666/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:401"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30806" ip netns exec fwd-test-29935 firewall-cmd --remove-source-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:401"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:402:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30806\" ip netns exec fwd-test-29935 firewall-cmd --add-source-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:402"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30806" ip netns exec fwd-test-29935 firewall-cmd --add-source-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:402"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:403:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30806\" ip netns exec fwd-test-29935 firewall-cmd --query-source-port=111-222/udp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:403"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30806" ip netns exec fwd-test-29935 firewall-cmd --query-source-port=111-222/udp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:403"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:404:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30806\" ip netns exec fwd-test-29935 firewall-cmd --remove-source-port 111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:404"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30806" ip netns exec fwd-test-29935 firewall-cmd --remove-source-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:404"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:405:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30806\" ip netns exec fwd-test-29935 firewall-cmd --query-source-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:405"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30806" ip netns exec fwd-test-29935 firewall-cmd --query-source-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:405"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:407:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30806\" ip netns exec fwd-test-29935 firewall-cmd --permanent --add-source-port=666 "
at_fn_check_prepare_trace "firewall-cmd.at:407"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30806" ip netns exec fwd-test-29935 firewall-cmd --permanent --add-source-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:407"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:408:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30806\" ip netns exec fwd-test-29935 firewall-cmd --permanent --add-source-port=666/dummy "
at_fn_check_prepare_trace "firewall-cmd.at:408"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30806" ip netns exec fwd-test-29935 firewall-cmd --permanent --add-source-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:408"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:409:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30806\" ip netns exec fwd-test-29935 firewall-cmd --permanent --add-source-port=666/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:409"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30806" ip netns exec fwd-test-29935 firewall-cmd --permanent --add-source-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:409"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:410:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30806\" ip netns exec fwd-test-29935 firewall-cmd --permanent --remove-source-port=666/tcp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:410"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30806" ip netns exec fwd-test-29935 firewall-cmd --permanent --remove-source-port=666/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:410"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:411:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30806\" ip netns exec fwd-test-29935 firewall-cmd --permanent --add-source-port=111-222/udp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:411"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30806" ip netns exec fwd-test-29935 firewall-cmd --permanent --add-source-port=111-222/udp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:411"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:412:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30806\" ip netns exec fwd-test-29935 firewall-cmd --permanent --query-source-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:412"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30806" ip netns exec fwd-test-29935 firewall-cmd --permanent --query-source-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:412"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:413:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30806\" ip netns exec fwd-test-29935 firewall-cmd --permanent --remove-source-port 111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:413"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30806" ip netns exec fwd-test-29935 firewall-cmd --permanent --remove-source-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:413"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:414:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30806\" ip netns exec fwd-test-29935 firewall-cmd --permanent --query-source-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:414"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30806" ip netns exec fwd-test-29935 firewall-cmd --permanent --query-source-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:414"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:416:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30806\" ip netns exec fwd-test-29935 firewall-cmd --add-source-port=80/tcp --add-source-port 443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:416"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30806" ip netns exec fwd-test-29935 firewall-cmd --add-source-port=80/tcp --add-source-port 443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:416"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:417:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30806\" ip netns exec fwd-test-29935 firewall-cmd --query-source-port=80/tcp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:417"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30806" ip netns exec fwd-test-29935 firewall-cmd --query-source-port=80/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:417"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:418:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30806\" ip netns exec fwd-test-29935 firewall-cmd --query-source-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:418"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30806" ip netns exec fwd-test-29935 firewall-cmd --query-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:418"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:419:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30806\" ip netns exec fwd-test-29935 firewall-cmd --remove-source-port 80/tcp --remove-source-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:419"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30806" ip netns exec fwd-test-29935 firewall-cmd --remove-source-port 80/tcp --remove-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:419"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:420:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30806\" ip netns exec fwd-test-29935 firewall-cmd --query-source-port=80/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:420"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30806" ip netns exec fwd-test-29935 firewall-cmd --query-source-port=80/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:420"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:421:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30806\" ip netns exec fwd-test-29935 firewall-cmd --query-source-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:421"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30806" ip netns exec fwd-test-29935 firewall-cmd --query-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:421"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:423:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30806\" ip netns exec fwd-test-29935 firewall-cmd --permanent --add-source-port=80/tcp --add-source-port 443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:423"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30806" ip netns exec fwd-test-29935 firewall-cmd --permanent --add-source-port=80/tcp --add-source-port 443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:423"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:424:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30806\" ip netns exec fwd-test-29935 firewall-cmd --permanent --query-source-port=80/tcp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:424"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30806" ip netns exec fwd-test-29935 firewall-cmd --permanent --query-source-port=80/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:424"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:425:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30806\" ip netns exec fwd-test-29935 firewall-cmd --permanent --query-source-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:425"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30806" ip netns exec fwd-test-29935 firewall-cmd --permanent --query-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:425"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:426:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30806\" ip netns exec fwd-test-29935 firewall-cmd --permanent --remove-source-port 80/tcp --remove-source-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:426"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30806" ip netns exec fwd-test-29935 firewall-cmd --permanent --remove-source-port 80/tcp --remove-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:426"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:427:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30806\" ip netns exec fwd-test-29935 firewall-cmd --permanent --query-source-port=80/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:427"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30806" ip netns exec fwd-test-29935 firewall-cmd --permanent --query-source-port=80/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:427"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:428:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30806\" ip netns exec fwd-test-29935 firewall-cmd --permanent --query-source-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:428"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30806" ip netns exec fwd-test-29935 firewall-cmd --permanent --query-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:428"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:429" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:429"
            $as_echo "firewall-cmd.at:429" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:429"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_40
#AT_START_41
at_fn_group_banner 41 'firewall-cmd.at:431' \
  "protocols" "                                      " 3
at_xfail=no
(
  $as_echo "41. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:431: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:431"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:431"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:431: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:431"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:431"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:431: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:431"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:431"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:431: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:431"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:431"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-30339" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:431: ip netns add fwd-test-30339"
at_fn_check_prepare_trace "firewall-cmd.at:431"
( $at_check_trace; ip netns add fwd-test-30339
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:431"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25162" ip netns exec fwd-test-30339 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-25162" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:431" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:431"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25162" ip netns exec fwd-test-30339 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:431" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:431"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25162" ip netns exec fwd-test-30339 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:431" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:431"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:434:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25162\" ip netns exec fwd-test-30339 firewall-cmd --add-protocol=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:434"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25162" ip netns exec fwd-test-30339 firewall-cmd --add-protocol=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:434"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:435:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25162\" ip netns exec fwd-test-30339 firewall-cmd --add-protocol=dccp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:435"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25162" ip netns exec fwd-test-30339 firewall-cmd --add-protocol=dccp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:435"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:436:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25162\" ip netns exec fwd-test-30339 firewall-cmd --query-protocol=dccp "
at_fn_check_prepare_trace "firewall-cmd.at:436"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25162" ip netns exec fwd-test-30339 firewall-cmd --query-protocol=dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:436"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:437:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25162\" ip netns exec fwd-test-30339 firewall-cmd --remove-protocol dccp "
at_fn_check_prepare_trace "firewall-cmd.at:437"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25162" ip netns exec fwd-test-30339 firewall-cmd --remove-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:437"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:438:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25162\" ip netns exec fwd-test-30339 firewall-cmd --query-protocol=dccp "
at_fn_check_prepare_trace "firewall-cmd.at:438"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25162" ip netns exec fwd-test-30339 firewall-cmd --query-protocol=dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:438"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:439:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25162\" ip netns exec fwd-test-30339 firewall-cmd --permanent --add-protocol=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:439"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25162" ip netns exec fwd-test-30339 firewall-cmd --permanent --add-protocol=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:439"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:440:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25162\" ip netns exec fwd-test-30339 firewall-cmd --permanent --add-protocol=dccp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:440"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25162" ip netns exec fwd-test-30339 firewall-cmd --permanent --add-protocol=dccp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:440"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:441:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25162\" ip netns exec fwd-test-30339 firewall-cmd --permanent --query-protocol=dccp "
at_fn_check_prepare_trace "firewall-cmd.at:441"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25162" ip netns exec fwd-test-30339 firewall-cmd --permanent --query-protocol=dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:441"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:442:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25162\" ip netns exec fwd-test-30339 firewall-cmd --permanent --remove-protocol dccp "
at_fn_check_prepare_trace "firewall-cmd.at:442"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25162" ip netns exec fwd-test-30339 firewall-cmd --permanent --remove-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:442"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:443:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25162\" ip netns exec fwd-test-30339 firewall-cmd --permanent --query-protocol=dccp "
at_fn_check_prepare_trace "firewall-cmd.at:443"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25162" ip netns exec fwd-test-30339 firewall-cmd --permanent --query-protocol=dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:443"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:445:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25162\" ip netns exec fwd-test-30339 firewall-cmd --add-protocol=ddp --add-protocol gre "
at_fn_check_prepare_trace "firewall-cmd.at:445"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25162" ip netns exec fwd-test-30339 firewall-cmd --add-protocol=ddp --add-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:445"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:446:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25162\" ip netns exec fwd-test-30339 firewall-cmd --query-protocol=ddp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:446"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25162" ip netns exec fwd-test-30339 firewall-cmd --query-protocol=ddp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:446"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:447:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25162\" ip netns exec fwd-test-30339 firewall-cmd --query-protocol=gre "
at_fn_check_prepare_trace "firewall-cmd.at:447"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25162" ip netns exec fwd-test-30339 firewall-cmd --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:447"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:448:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25162\" ip netns exec fwd-test-30339 firewall-cmd --remove-protocol ddp --remove-protocol=gre "
at_fn_check_prepare_trace "firewall-cmd.at:448"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25162" ip netns exec fwd-test-30339 firewall-cmd --remove-protocol ddp --remove-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:448"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:449:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25162\" ip netns exec fwd-test-30339 firewall-cmd --query-protocol=ddp "
at_fn_check_prepare_trace "firewall-cmd.at:449"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25162" ip netns exec fwd-test-30339 firewall-cmd --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:449"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:450:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25162\" ip netns exec fwd-test-30339 firewall-cmd --query-protocol=gre "
at_fn_check_prepare_trace "firewall-cmd.at:450"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25162" ip netns exec fwd-test-30339 firewall-cmd --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:450"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:451:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25162\" ip netns exec fwd-test-30339 firewall-cmd --permanent --add-protocol=ddp --add-protocol gre "
at_fn_check_prepare_trace "firewall-cmd.at:451"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25162" ip netns exec fwd-test-30339 firewall-cmd --permanent --add-protocol=ddp --add-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:451"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:452:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25162\" ip netns exec fwd-test-30339 firewall-cmd --permanent --query-protocol=ddp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:452"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25162" ip netns exec fwd-test-30339 firewall-cmd --permanent --query-protocol=ddp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:452"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:453:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25162\" ip netns exec fwd-test-30339 firewall-cmd --permanent --query-protocol=gre "
at_fn_check_prepare_trace "firewall-cmd.at:453"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25162" ip netns exec fwd-test-30339 firewall-cmd --permanent --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:453"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:454:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25162\" ip netns exec fwd-test-30339 firewall-cmd --permanent --remove-protocol ddp --remove-protocol=gre "
at_fn_check_prepare_trace "firewall-cmd.at:454"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25162" ip netns exec fwd-test-30339 firewall-cmd --permanent --remove-protocol ddp --remove-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:454"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:455:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25162\" ip netns exec fwd-test-30339 firewall-cmd --permanent --query-protocol=ddp "
at_fn_check_prepare_trace "firewall-cmd.at:455"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25162" ip netns exec fwd-test-30339 firewall-cmd --permanent --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:455"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:456:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25162\" ip netns exec fwd-test-30339 firewall-cmd --permanent --query-protocol=gre "
at_fn_check_prepare_trace "firewall-cmd.at:456"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25162" ip netns exec fwd-test-30339 firewall-cmd --permanent --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:456"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"-e '/ERROR: INVALID_PROTOCOL: dummy/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_PROTOCOL: dummy/d'"; then
                sed -i -e '/ERROR: INVALID_PROTOCOL: dummy/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:457" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:457"
            $as_echo "firewall-cmd.at:457" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:457"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_41
#AT_START_42
at_fn_group_banner 42 'firewall-cmd.at:459' \
  "masquerade" "                                     " 3
at_xfail=no
(
  $as_echo "42. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:459: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:459"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:459"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:459: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:459"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:459"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:459: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:459"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:459"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:459: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:459"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:459"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-11179" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:459: ip netns add fwd-test-11179"
at_fn_check_prepare_trace "firewall-cmd.at:459"
( $at_check_trace; ip netns add fwd-test-11179
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:459"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6157" ip netns exec fwd-test-11179 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-6157" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:459" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:459"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6157" ip netns exec fwd-test-11179 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:459" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:459"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6157" ip netns exec fwd-test-11179 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:459" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:459"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:462:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6157\" ip netns exec fwd-test-11179 firewall-cmd --add-masquerade --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:462"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6157" ip netns exec fwd-test-11179 firewall-cmd --add-masquerade --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:462"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:463:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6157\" ip netns exec fwd-test-11179 firewall-cmd --query-masquerade "
at_fn_check_prepare_trace "firewall-cmd.at:463"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6157" ip netns exec fwd-test-11179 firewall-cmd --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:463"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:464:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6157\" ip netns exec fwd-test-11179 firewall-cmd --remove-masquerade "
at_fn_check_prepare_trace "firewall-cmd.at:464"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6157" ip netns exec fwd-test-11179 firewall-cmd --remove-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:464"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:465:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6157\" ip netns exec fwd-test-11179 firewall-cmd --query-masquerade "
at_fn_check_prepare_trace "firewall-cmd.at:465"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6157" ip netns exec fwd-test-11179 firewall-cmd --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:465"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:467:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6157\" ip netns exec fwd-test-11179 firewall-cmd --permanent --add-masquerade --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:467"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6157" ip netns exec fwd-test-11179 firewall-cmd --permanent --add-masquerade --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:467"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:468:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6157\" ip netns exec fwd-test-11179 firewall-cmd --permanent --query-masquerade "
at_fn_check_prepare_trace "firewall-cmd.at:468"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6157" ip netns exec fwd-test-11179 firewall-cmd --permanent --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:468"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:469:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6157\" ip netns exec fwd-test-11179 firewall-cmd --permanent --remove-masquerade "
at_fn_check_prepare_trace "firewall-cmd.at:469"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6157" ip netns exec fwd-test-11179 firewall-cmd --permanent --remove-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:469"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:470:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6157\" ip netns exec fwd-test-11179 firewall-cmd --permanent --query-masquerade "
at_fn_check_prepare_trace "firewall-cmd.at:470"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6157" ip netns exec fwd-test-11179 firewall-cmd --permanent --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:470"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:471" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:471"
            $as_echo "firewall-cmd.at:471" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:471"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_42
#AT_START_43
at_fn_group_banner 43 'firewall-cmd.at:473' \
  "forward ports" "                                  " 3
at_xfail=no
(
  $as_echo "43. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:473: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:473"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:473"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:473: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:473"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:473"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:473: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:473"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:473"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:473: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:473"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:473"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-3919" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:473: ip netns add fwd-test-3919"
at_fn_check_prepare_trace "firewall-cmd.at:473"
( $at_check_trace; ip netns add fwd-test-3919
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:473"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:473" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:473"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:473" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:473"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:473" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:473"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:476:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --add-forward-port=666 "
at_fn_check_prepare_trace "firewall-cmd.at:476"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --add-forward-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/firewall-cmd.at:476"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:477:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --add-forward-port=port=11:proto=tcp:toport=22 "
at_fn_check_prepare_trace "firewall-cmd.at:477"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --add-forward-port=port=11:proto=tcp:toport=22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:477"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:478:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:478"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:478"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:479:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --add-forward-port=port=33:proto=tcp:toaddr=4444 "
at_fn_check_prepare_trace "firewall-cmd.at:479"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --add-forward-port=port=33:proto=tcp:toaddr=4444
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/firewall-cmd.at:479"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:480:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:480"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:480"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:481:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 "
at_fn_check_prepare_trace "firewall-cmd.at:481"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:481"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:482:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:482"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:482"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:483:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:483"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:483"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:484:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:484"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:484"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:485:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:485"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:485"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:486:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:486"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:486"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:487:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:487"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:487"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:488:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:488"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:488"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:489:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:489"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:489"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:490:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --add-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: "
at_fn_check_prepare_trace "firewall-cmd.at:490"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --add-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:490"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:490:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --query-forward-port port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:490"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --query-forward-port port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:490"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:490:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: "
at_fn_check_prepare_trace "firewall-cmd.at:490"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:490"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:490:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --query-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: "
at_fn_check_prepare_trace "firewall-cmd.at:490"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --query-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:490"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:496:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200 "
at_fn_check_prepare_trace "firewall-cmd.at:496"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:496"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:497:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --query-forward-port=port=100:proto=tcp:toport=200 "
at_fn_check_prepare_trace "firewall-cmd.at:497"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --query-forward-port=port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:497"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:498:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --query-forward-port=port=88:proto=udp:toport=99 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:498"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --query-forward-port=port=88:proto=udp:toport=99 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:498"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:499:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99 "
at_fn_check_prepare_trace "firewall-cmd.at:499"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:499"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:500:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --query-forward-port port=100:proto=tcp:toport=200 "
at_fn_check_prepare_trace "firewall-cmd.at:500"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --query-forward-port port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:500"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:501:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --query-forward-port=port=88:proto=udp:toport=99 "
at_fn_check_prepare_trace "firewall-cmd.at:501"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --query-forward-port=port=88:proto=udp:toport=99
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:501"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:502:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --list-forward-ports "
at_fn_check_prepare_trace "firewall-cmd.at:502"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --list-forward-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:502"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:504:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --permanent --add-forward-port=666 "
at_fn_check_prepare_trace "firewall-cmd.at:504"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --permanent --add-forward-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/firewall-cmd.at:504"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:505:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --permanent --add-forward-port=port=11:proto=tcp:toport=22 "
at_fn_check_prepare_trace "firewall-cmd.at:505"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --permanent --add-forward-port=port=11:proto=tcp:toport=22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:505"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:506:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --permanent --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:506"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --permanent --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:506"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:507:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --permanent --add-forward-port=port=33:proto=tcp:toaddr=4444 "
at_fn_check_prepare_trace "firewall-cmd.at:507"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --permanent --add-forward-port=port=33:proto=tcp:toaddr=4444
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/firewall-cmd.at:507"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:508:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --permanent --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:508"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --permanent --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:508"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:509:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --permanent --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 "
at_fn_check_prepare_trace "firewall-cmd.at:509"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --permanent --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:509"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:510:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --permanent --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:510"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --permanent --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:510"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:511:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --permanent --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:511"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --permanent --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:511"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:512:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --permanent --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:512"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --permanent --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:512"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:513:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --permanent --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:513"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --permanent --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:513"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:514:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --permanent --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:514"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --permanent --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:514"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:515:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --permanent --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:515"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --permanent --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:515"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:516:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --permanent --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:516"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --permanent --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:516"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:517:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --permanent --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:517"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --permanent --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:517"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:518:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --permanent --add-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: "
at_fn_check_prepare_trace "firewall-cmd.at:518"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --permanent --add-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:518"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:518:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --permanent --query-forward-port port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:518"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --permanent --query-forward-port port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:518"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:518:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --permanent --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: "
at_fn_check_prepare_trace "firewall-cmd.at:518"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --permanent --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:518"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:518:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --permanent --query-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0:: "
at_fn_check_prepare_trace "firewall-cmd.at:518"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --permanent --query-forward-port=port=66:proto=sctp:toport=66:toaddr=fd00:dead:beef:ff0::
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:518"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:524:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --permanent --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200 "
at_fn_check_prepare_trace "firewall-cmd.at:524"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --permanent --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:524"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:525:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --permanent --query-forward-port=port=100:proto=tcp:toport=200 "
at_fn_check_prepare_trace "firewall-cmd.at:525"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --permanent --query-forward-port=port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:525"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:526:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --permanent --query-forward-port=port=88:proto=udp:toport=99 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:526"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --permanent --query-forward-port=port=88:proto=udp:toport=99 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:526"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:527:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --permanent --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99 "
at_fn_check_prepare_trace "firewall-cmd.at:527"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --permanent --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:527"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:528:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --permanent --query-forward-port port=100:proto=tcp:toport=200 "
at_fn_check_prepare_trace "firewall-cmd.at:528"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --permanent --query-forward-port port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:528"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:529:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --permanent --query-forward-port=port=88:proto=udp:toport=99 "
at_fn_check_prepare_trace "firewall-cmd.at:529"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --permanent --query-forward-port=port=88:proto=udp:toport=99
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:529"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:530:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16621\" ip netns exec fwd-test-3919 firewall-cmd --permanent --list-forward-ports "
at_fn_check_prepare_trace "firewall-cmd.at:530"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16621" ip netns exec fwd-test-3919 firewall-cmd --permanent --list-forward-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:530"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:531" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:531"
            $as_echo "firewall-cmd.at:531" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:531"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_43
#AT_START_44
at_fn_group_banner 44 'firewall-cmd.at:533' \
  "ICMP block" "                                     " 3
at_xfail=no
(
  $as_echo "44. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:533: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:533"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:533"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:533: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:533"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:533"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:533: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:533"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:533"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:533: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:533"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:533"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-17423" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:533: ip netns add fwd-test-17423"
at_fn_check_prepare_trace "firewall-cmd.at:533"
( $at_check_trace; ip netns add fwd-test-17423
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:533"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21213" ip netns exec fwd-test-17423 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-21213" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:533" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:533"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21213" ip netns exec fwd-test-17423 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:533" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:533"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21213" ip netns exec fwd-test-17423 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:533" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:533"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:536:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21213\" ip netns exec fwd-test-17423 firewall-cmd --list-icmp-blocks "
at_fn_check_prepare_trace "firewall-cmd.at:536"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21213" ip netns exec fwd-test-17423 firewall-cmd --list-icmp-blocks
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:536"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:538:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21213\" ip netns exec fwd-test-17423 firewall-cmd --zone=external --add-icmp-block=dummyblock "
at_fn_check_prepare_trace "firewall-cmd.at:538"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21213" ip netns exec fwd-test-17423 firewall-cmd --zone=external --add-icmp-block=dummyblock
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/firewall-cmd.at:538"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:539:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21213\" ip netns exec fwd-test-17423 firewall-cmd --zone=external --add-icmp-block=redirect "
at_fn_check_prepare_trace "firewall-cmd.at:539"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21213" ip netns exec fwd-test-17423 firewall-cmd --zone=external --add-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:539"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:540:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21213\" ip netns exec fwd-test-17423 firewall-cmd --zone=external --query-icmp-block=redirect "
at_fn_check_prepare_trace "firewall-cmd.at:540"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21213" ip netns exec fwd-test-17423 firewall-cmd --zone=external --query-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:540"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:541:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21213\" ip netns exec fwd-test-17423 firewall-cmd --zone=external --remove-icmp-block redirect "
at_fn_check_prepare_trace "firewall-cmd.at:541"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21213" ip netns exec fwd-test-17423 firewall-cmd --zone=external --remove-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:541"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:542:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21213\" ip netns exec fwd-test-17423 firewall-cmd --zone=external --query-icmp-block=redirect "
at_fn_check_prepare_trace "firewall-cmd.at:542"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21213" ip netns exec fwd-test-17423 firewall-cmd --zone=external --query-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:542"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:543:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21213\" ip netns exec fwd-test-17423 firewall-cmd --permanent --zone=external --add-icmp-block=dummyblock "
at_fn_check_prepare_trace "firewall-cmd.at:543"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21213" ip netns exec fwd-test-17423 firewall-cmd --permanent --zone=external --add-icmp-block=dummyblock
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/firewall-cmd.at:543"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:544:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21213\" ip netns exec fwd-test-17423 firewall-cmd --permanent --zone=external --add-icmp-block=redirect "
at_fn_check_prepare_trace "firewall-cmd.at:544"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21213" ip netns exec fwd-test-17423 firewall-cmd --permanent --zone=external --add-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:544"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:545:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21213\" ip netns exec fwd-test-17423 firewall-cmd --permanent --zone=external --query-icmp-block=redirect "
at_fn_check_prepare_trace "firewall-cmd.at:545"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21213" ip netns exec fwd-test-17423 firewall-cmd --permanent --zone=external --query-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:545"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:546:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21213\" ip netns exec fwd-test-17423 firewall-cmd --permanent --zone=external --remove-icmp-block redirect "
at_fn_check_prepare_trace "firewall-cmd.at:546"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21213" ip netns exec fwd-test-17423 firewall-cmd --permanent --zone=external --remove-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:546"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:547:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21213\" ip netns exec fwd-test-17423 firewall-cmd --permanent --zone=external --query-icmp-block=redirect "
at_fn_check_prepare_trace "firewall-cmd.at:547"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21213" ip netns exec fwd-test-17423 firewall-cmd --permanent --zone=external --query-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:547"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:549:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21213\" ip netns exec fwd-test-17423 firewall-cmd --add-icmp-block-inversion --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:549"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21213" ip netns exec fwd-test-17423 firewall-cmd --add-icmp-block-inversion --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:549"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:550:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21213\" ip netns exec fwd-test-17423 firewall-cmd --query-icmp-block-inversion "
at_fn_check_prepare_trace "firewall-cmd.at:550"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21213" ip netns exec fwd-test-17423 firewall-cmd --query-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:550"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:551:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21213\" ip netns exec fwd-test-17423 firewall-cmd --remove-icmp-block-inversion "
at_fn_check_prepare_trace "firewall-cmd.at:551"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21213" ip netns exec fwd-test-17423 firewall-cmd --remove-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:551"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:552:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21213\" ip netns exec fwd-test-17423 firewall-cmd --query-icmp-block-inversion "
at_fn_check_prepare_trace "firewall-cmd.at:552"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21213" ip netns exec fwd-test-17423 firewall-cmd --query-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:552"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:553:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21213\" ip netns exec fwd-test-17423 firewall-cmd --permanent --add-icmp-block-inversion --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:553"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21213" ip netns exec fwd-test-17423 firewall-cmd --permanent --add-icmp-block-inversion --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:553"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:554:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21213\" ip netns exec fwd-test-17423 firewall-cmd --permanent --query-icmp-block-inversion "
at_fn_check_prepare_trace "firewall-cmd.at:554"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21213" ip netns exec fwd-test-17423 firewall-cmd --permanent --query-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:554"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:555:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21213\" ip netns exec fwd-test-17423 firewall-cmd --permanent --remove-icmp-block-inversion "
at_fn_check_prepare_trace "firewall-cmd.at:555"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21213" ip netns exec fwd-test-17423 firewall-cmd --permanent --remove-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:555"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:556:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21213\" ip netns exec fwd-test-17423 firewall-cmd --permanent --query-icmp-block-inversion "
at_fn_check_prepare_trace "firewall-cmd.at:556"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21213" ip netns exec fwd-test-17423 firewall-cmd --permanent --query-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:556"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:558:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21213\" ip netns exec fwd-test-17423 firewall-cmd --add-icmp-block-inversion --zone=block "
at_fn_check_prepare_trace "firewall-cmd.at:558"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21213" ip netns exec fwd-test-17423 firewall-cmd --add-icmp-block-inversion --zone=block
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:558"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:559:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21213\" ip netns exec fwd-test-17423 firewall-cmd --remove-icmp-block-inversion --zone=block "
at_fn_check_prepare_trace "firewall-cmd.at:559"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21213" ip netns exec fwd-test-17423 firewall-cmd --remove-icmp-block-inversion --zone=block
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:559"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:560:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21213\" ip netns exec fwd-test-17423 firewall-cmd --add-icmp-block-inversion --zone=drop "
at_fn_check_prepare_trace "firewall-cmd.at:560"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21213" ip netns exec fwd-test-17423 firewall-cmd --add-icmp-block-inversion --zone=drop
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:560"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:561:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21213\" ip netns exec fwd-test-17423 firewall-cmd --remove-icmp-block-inversion --zone=drop "
at_fn_check_prepare_trace "firewall-cmd.at:561"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21213" ip netns exec fwd-test-17423 firewall-cmd --remove-icmp-block-inversion --zone=drop
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:561"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:562:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21213\" ip netns exec fwd-test-17423 firewall-cmd --add-icmp-block-inversion --zone=trusted "
at_fn_check_prepare_trace "firewall-cmd.at:562"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21213" ip netns exec fwd-test-17423 firewall-cmd --add-icmp-block-inversion --zone=trusted
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:562"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:563:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21213\" ip netns exec fwd-test-17423 firewall-cmd --remove-icmp-block-inversion --zone=trusted "
at_fn_check_prepare_trace "firewall-cmd.at:563"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21213" ip netns exec fwd-test-17423 firewall-cmd --remove-icmp-block-inversion --zone=trusted
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:563"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:565:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21213\" ip netns exec fwd-test-17423 firewall-cmd --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation "
at_fn_check_prepare_trace "firewall-cmd.at:565"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21213" ip netns exec fwd-test-17423 firewall-cmd --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:565"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:566:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21213\" ip netns exec fwd-test-17423 firewall-cmd --zone=external --query-icmp-block=echo-reply "
at_fn_check_prepare_trace "firewall-cmd.at:566"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21213" ip netns exec fwd-test-17423 firewall-cmd --zone=external --query-icmp-block=echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:566"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:567:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21213\" ip netns exec fwd-test-17423 firewall-cmd --zone=external --query-icmp-block=router-solicitation "
at_fn_check_prepare_trace "firewall-cmd.at:567"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21213" ip netns exec fwd-test-17423 firewall-cmd --zone=external --query-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:567"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:568:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21213\" ip netns exec fwd-test-17423 firewall-cmd --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation "
at_fn_check_prepare_trace "firewall-cmd.at:568"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21213" ip netns exec fwd-test-17423 firewall-cmd --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:568"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:569:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21213\" ip netns exec fwd-test-17423 firewall-cmd --zone=external --query-icmp-block=echo-reply "
at_fn_check_prepare_trace "firewall-cmd.at:569"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21213" ip netns exec fwd-test-17423 firewall-cmd --zone=external --query-icmp-block=echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:569"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:570:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21213\" ip netns exec fwd-test-17423 firewall-cmd --zone=external --query-icmp-block=router-solicitation "
at_fn_check_prepare_trace "firewall-cmd.at:570"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21213" ip netns exec fwd-test-17423 firewall-cmd --zone=external --query-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:570"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:571:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21213\" ip netns exec fwd-test-17423 firewall-cmd --permanent --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation "
at_fn_check_prepare_trace "firewall-cmd.at:571"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21213" ip netns exec fwd-test-17423 firewall-cmd --permanent --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:571"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:572:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21213\" ip netns exec fwd-test-17423 firewall-cmd --permanent --zone=external --query-icmp-block=echo-reply "
at_fn_check_prepare_trace "firewall-cmd.at:572"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21213" ip netns exec fwd-test-17423 firewall-cmd --permanent --zone=external --query-icmp-block=echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:572"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:573:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21213\" ip netns exec fwd-test-17423 firewall-cmd --permanent --zone=external --query-icmp-block=router-solicitation "
at_fn_check_prepare_trace "firewall-cmd.at:573"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21213" ip netns exec fwd-test-17423 firewall-cmd --permanent --zone=external --query-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:573"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:574:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21213\" ip netns exec fwd-test-17423 firewall-cmd --permanent --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation "
at_fn_check_prepare_trace "firewall-cmd.at:574"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21213" ip netns exec fwd-test-17423 firewall-cmd --permanent --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:574"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:575:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21213\" ip netns exec fwd-test-17423 firewall-cmd --permanent --zone=external --query-icmp-block=echo-reply "
at_fn_check_prepare_trace "firewall-cmd.at:575"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21213" ip netns exec fwd-test-17423 firewall-cmd --permanent --zone=external --query-icmp-block=echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:575"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:576:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21213\" ip netns exec fwd-test-17423 firewall-cmd --permanent --zone=external --query-icmp-block=router-solicitation "
at_fn_check_prepare_trace "firewall-cmd.at:576"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21213" ip netns exec fwd-test-17423 firewall-cmd --permanent --zone=external --query-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:576"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"-e '/ERROR: INVALID_ICMPTYPE:/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_ICMPTYPE:/d'"; then
                sed -i -e '/ERROR: INVALID_ICMPTYPE:/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:577" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:577"
            $as_echo "firewall-cmd.at:577" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:577"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_44
#AT_START_45
at_fn_group_banner 45 'firewall-cmd.at:579' \
  "user ICMP types" "                                " 3
at_xfail=no
(
  $as_echo "45. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:579: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:579"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:579"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:579: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:579"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:579"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:579: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:579"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:579"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:579: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:579"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:579"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-205" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:579: ip netns add fwd-test-205"
at_fn_check_prepare_trace "firewall-cmd.at:579"
( $at_check_trace; ip netns add fwd-test-205
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:579"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14331" ip netns exec fwd-test-205 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-14331" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:579" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:579"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14331" ip netns exec fwd-test-205 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:579" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:579"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14331" ip netns exec fwd-test-205 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:579" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:579"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:582:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14331\" ip netns exec fwd-test-205 firewall-cmd --permanent --new-icmptype=redirect "
at_fn_check_prepare_trace "firewall-cmd.at:582"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14331" ip netns exec fwd-test-205 firewall-cmd --permanent --new-icmptype=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 26 $at_status "$at_srcdir/firewall-cmd.at:582"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:584:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14331\" ip netns exec fwd-test-205 firewall-cmd --permanent --new-icmptype=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:584"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14331" ip netns exec fwd-test-205 firewall-cmd --permanent --new-icmptype=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:584"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:585:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14331\" ip netns exec fwd-test-205 firewall-cmd --permanent --get-icmptypes | grep foobar "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:585"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14331" ip netns exec fwd-test-205 firewall-cmd --permanent --get-icmptypes | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:585"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:587:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14331\" ip netns exec fwd-test-205 firewall-cmd --permanent --icmptype=foobar --add-destination=ipv5 "
at_fn_check_prepare_trace "firewall-cmd.at:587"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14331" ip netns exec fwd-test-205 firewall-cmd --permanent --icmptype=foobar --add-destination=ipv5
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:587"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:588:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14331\" ip netns exec fwd-test-205 firewall-cmd --permanent --icmptype=foobar --add-destination=ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:588"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14331" ip netns exec fwd-test-205 firewall-cmd --permanent --icmptype=foobar --add-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:588"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:589:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14331\" ip netns exec fwd-test-205 firewall-cmd --permanent --icmptype=foobar --remove-destination=ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:589"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14331" ip netns exec fwd-test-205 firewall-cmd --permanent --icmptype=foobar --remove-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:589"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:590:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14331\" ip netns exec fwd-test-205 firewall-cmd --permanent --icmptype=foobar --add-destination=ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:590"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14331" ip netns exec fwd-test-205 firewall-cmd --permanent --icmptype=foobar --add-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:590"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:591:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14331\" ip netns exec fwd-test-205 firewall-cmd --permanent --icmptype=foobar --query-destination=ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:591"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14331" ip netns exec fwd-test-205 firewall-cmd --permanent --icmptype=foobar --query-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:591"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:592:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14331\" ip netns exec fwd-test-205 firewall-cmd --permanent --icmptype=foobar --remove-destination=ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:592"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14331" ip netns exec fwd-test-205 firewall-cmd --permanent --icmptype=foobar --remove-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:592"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:593:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14331\" ip netns exec fwd-test-205 firewall-cmd --permanent --icmptype=foobar --query-destination=ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:593"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14331" ip netns exec fwd-test-205 firewall-cmd --permanent --icmptype=foobar --query-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:593"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:595:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14331\" ip netns exec fwd-test-205 firewall-cmd --permanent --zone=public --add-icmp-block=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:595"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14331" ip netns exec fwd-test-205 firewall-cmd --permanent --zone=public --add-icmp-block=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:595"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:596:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14331\" ip netns exec fwd-test-205 firewall-cmd --permanent --zone=public --list-icmp-blocks | grep foobar "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:596"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14331" ip netns exec fwd-test-205 firewall-cmd --permanent --zone=public --list-icmp-blocks | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:596"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:598:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14331\" ip netns exec fwd-test-205 firewall-cmd --permanent --delete-icmptype=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:598"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14331" ip netns exec fwd-test-205 firewall-cmd --permanent --delete-icmptype=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:598"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:599:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14331\" ip netns exec fwd-test-205 firewall-cmd --permanent --zone=public --list-icmp-blocks | grep foobar "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:599"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14331" ip netns exec fwd-test-205 firewall-cmd --permanent --zone=public --list-icmp-blocks | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:599"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"-e '/NAME_CONFLICT: new_icmptype():/d'" != x"ignore"; then
            if test -n "-e '/NAME_CONFLICT: new_icmptype():/d'"; then
                sed -i -e '/NAME_CONFLICT: new_icmptype():/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:600" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:600"
            $as_echo "firewall-cmd.at:600" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:600"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_45
#AT_START_46
at_fn_group_banner 46 'firewall-cmd.at:602' \
  "ipset" "                                          " 3
at_xfail=no
(
  $as_echo "46. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:602: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:602"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:602"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:602: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:602"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:602"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:602: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:602"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:602"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:602: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:602"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:602"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-13418" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:602: ip netns add fwd-test-13418"
at_fn_check_prepare_trace "firewall-cmd.at:602"
( $at_check_trace; ip netns add fwd-test-13418
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:602"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:602" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:602"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:602" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:602"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:602" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:602"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:605:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 nft add table inet firewalld_check_ipset "
at_fn_check_prepare_trace "firewall-cmd.at:605"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 nft add table inet firewalld_check_ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:605"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:605:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 nft add set inet firewalld_check_ipset foobar { type ipv4_addr \\; } "
at_fn_check_prepare_trace "firewall-cmd.at:605"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 nft add set inet firewalld_check_ipset foobar { type ipv4_addr \; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:605"
$at_failed && at_fn_log_failure
$at_traceon; }


        $as_echo "firewall-cmd.at:605" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 nft flush set inet firewalld_check_ipset foobar >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:605"

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:605:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 nft delete table inet firewalld_check_ipset "
at_fn_check_prepare_trace "firewall-cmd.at:605"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 nft delete table inet firewalld_check_ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:605"
$at_failed && at_fn_log_failure
$at_traceon; }






        $as_echo "firewall-cmd.at:606" >"$at_check_line_file"
(! ipset --help | grep "hash:mac") \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:606"
        $as_echo "firewall-cmd.at:606" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 ipset create foobar hash:mac >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:606"

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:606:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 ipset destroy foobar "
at_fn_check_prepare_trace "firewall-cmd.at:606"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 ipset destroy foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:606"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:608:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 firewall-cmd --permanent --new-ipset=foobar --type=hash:ip "
at_fn_check_prepare_trace "firewall-cmd.at:608"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 firewall-cmd --permanent --new-ipset=foobar --type=hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:608"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:609:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 firewall-cmd --reload "
at_fn_check_prepare_trace "firewall-cmd.at:609"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:609"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:610:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 firewall-cmd --ipset=foobar --get-entries "
at_fn_check_prepare_trace "firewall-cmd.at:610"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 firewall-cmd --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:610"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:612:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 firewall-cmd --ipset=foobar --add-entry=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:612"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 firewall-cmd --ipset=foobar --add-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:612"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:613:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 firewall-cmd --ipset=foobar --get-entries | grep \"1.2.3.4\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:613"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 firewall-cmd --ipset=foobar --get-entries | grep "1.2.3.4"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:613"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:614:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 firewall-cmd --ipset=foobar --add-entry=1.2.3.400 "
at_fn_check_prepare_trace "firewall-cmd.at:614"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 firewall-cmd --ipset=foobar --add-entry=1.2.3.400
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 136 $at_status "$at_srcdir/firewall-cmd.at:614"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:615:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 firewall-cmd --ipset=foobar --remove-entry=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:615"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 firewall-cmd --ipset=foobar --remove-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:615"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:616:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 firewall-cmd --ipset=foobar --get-entries "
at_fn_check_prepare_trace "firewall-cmd.at:616"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 firewall-cmd --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:616"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:619:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 firewall-cmd --zone=public --add-source=ipset:foobar "
at_fn_check_prepare_trace "firewall-cmd.at:619"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 firewall-cmd --zone=public --add-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:619"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:620:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 firewall-cmd --get-zone-of-source=ipset:foobar | grep public "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:620"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 firewall-cmd --get-zone-of-source=ipset:foobar | grep public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:620"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:621:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 firewall-cmd --zone=public --list-sources | grep \"ipset:foobar\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:621"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 firewall-cmd --zone=public --list-sources | grep "ipset:foobar"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:621"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:622:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 firewall-cmd --zone=public --query-source=ipset:foobar "
at_fn_check_prepare_trace "firewall-cmd.at:622"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 firewall-cmd --zone=public --query-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:622"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:623:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 firewall-cmd --zone=public --remove-source=ipset:foobar "
at_fn_check_prepare_trace "firewall-cmd.at:623"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 firewall-cmd --zone=public --remove-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:623"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:624:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 firewall-cmd --zone=public --query-source=ipset:foobar "
at_fn_check_prepare_trace "firewall-cmd.at:624"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 firewall-cmd --zone=public --query-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:624"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:626:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:626"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:626"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:627:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 firewall-cmd --reload "
at_fn_check_prepare_trace "firewall-cmd.at:627"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:627"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:630:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,port "
at_fn_check_prepare_trace "firewall-cmd.at:630"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,port
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:630"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:631:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,1234 "
at_fn_check_prepare_trace "firewall-cmd.at:631"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:631"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:632:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:632"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:632"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:632:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:632"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:632"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:633:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 firewall-cmd --ipset=foobar --add-entry=1.2.3.4,8080 "
at_fn_check_prepare_trace "firewall-cmd.at:633"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 firewall-cmd --ipset=foobar --add-entry=1.2.3.4,8080
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:633"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:634:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:634"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:634"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:635:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:635"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:635"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:635:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:635"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:635"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:638:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,port "
at_fn_check_prepare_trace "firewall-cmd.at:638"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,port
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:638"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:639:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,sctp:1234 "
at_fn_check_prepare_trace "firewall-cmd.at:639"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,sctp:1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:639"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:640:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:640"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:640"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:640:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:640"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:640"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:641:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 firewall-cmd --ipset=foobar --add-entry=1.2.3.4,sctp:8080 "
at_fn_check_prepare_trace "firewall-cmd.at:641"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 firewall-cmd --ipset=foobar --add-entry=1.2.3.4,sctp:8080
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:641"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:642:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:642"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:642"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:643:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:643"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:643"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:643:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:643"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:643"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:645:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 firewall-cmd --permanent --new-ipset=foobar --type=hash:mac "
at_fn_check_prepare_trace "firewall-cmd.at:645"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 firewall-cmd --permanent --new-ipset=foobar --type=hash:mac
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:645"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:645:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 firewall-cmd --permanent --ipset=foobar --add-entry=12:34:56:78:90:ab "
at_fn_check_prepare_trace "firewall-cmd.at:645"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 firewall-cmd --permanent --ipset=foobar --add-entry=12:34:56:78:90:ab
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:645"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:645:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:645"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:645"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:645:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:645"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:645"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:645:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 firewall-cmd --ipset=foobar --add-entry=12:34:56:78:90:ac "
at_fn_check_prepare_trace "firewall-cmd.at:645"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 firewall-cmd --ipset=foobar --add-entry=12:34:56:78:90:ac
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:645"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:645:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:645"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:645"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:645:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:645"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:645"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:645:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10172\" ip netns exec fwd-test-13418 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:645"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10172" ip netns exec fwd-test-13418 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:645"
$at_failed && at_fn_log_failure
$at_traceon; }













        if test x"-e '/ERROR: INVALID_ENTRY: invalid address/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_ENTRY: invalid address/d'"; then
                sed -i -e '/ERROR: INVALID_ENTRY: invalid address/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:653" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:653"
            $as_echo "firewall-cmd.at:653" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:653"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_46
#AT_START_47
at_fn_group_banner 47 'firewall-cmd.at:655' \
  "user helpers" "                                   " 3
at_xfail=no
(
  $as_echo "47. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:655: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:655"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:655"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:655: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:655"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:655"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:655: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:655"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:655"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:655: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:655"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:655"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-4560" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:655: ip netns add fwd-test-4560"
at_fn_check_prepare_trace "firewall-cmd.at:655"
( $at_check_trace; ip netns add fwd-test-4560
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:655"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5305" ip netns exec fwd-test-4560 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-5305" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:655" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:655"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5305" ip netns exec fwd-test-4560 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:655" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:655"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5305" ip netns exec fwd-test-4560 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:655" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:655"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:658:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5305\" ip netns exec fwd-test-4560 firewall-cmd --permanent --new-helper=foobar --module=foo "
at_fn_check_prepare_trace "firewall-cmd.at:658"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5305" ip netns exec fwd-test-4560 firewall-cmd --permanent --new-helper=foobar --module=foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 132 $at_status "$at_srcdir/firewall-cmd.at:658"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:659:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5305\" ip netns exec fwd-test-4560 firewall-cmd --permanent --new-helper=foobar --module=nf_conntrack_foo "
at_fn_check_prepare_trace "firewall-cmd.at:659"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5305" ip netns exec fwd-test-4560 firewall-cmd --permanent --new-helper=foobar --module=nf_conntrack_foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:659"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:660:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5305\" ip netns exec fwd-test-4560 firewall-cmd --permanent --get-helpers | grep foobar "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:660"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5305" ip netns exec fwd-test-4560 firewall-cmd --permanent --get-helpers | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:660"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:661:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5305\" ip netns exec fwd-test-4560 firewall-cmd --permanent --helper=foobar --get-family | grep ipv4 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:661"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5305" ip netns exec fwd-test-4560 firewall-cmd --permanent --helper=foobar --get-family | grep ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:661"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:662:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5305\" ip netns exec fwd-test-4560 firewall-cmd --permanent --helper=foobar --set-family=ipv5 "
at_fn_check_prepare_trace "firewall-cmd.at:662"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5305" ip netns exec fwd-test-4560 firewall-cmd --permanent --helper=foobar --set-family=ipv5
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:662"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:663:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5305\" ip netns exec fwd-test-4560 firewall-cmd --permanent --helper=foobar --set-family=ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:663"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5305" ip netns exec fwd-test-4560 firewall-cmd --permanent --helper=foobar --set-family=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:663"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:664:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5305\" ip netns exec fwd-test-4560 firewall-cmd --permanent --helper=foobar --get-family | grep ipv4 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:664"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5305" ip netns exec fwd-test-4560 firewall-cmd --permanent --helper=foobar --get-family | grep ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:664"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:665:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5305\" ip netns exec fwd-test-4560 firewall-cmd --permanent --helper=foobar --set-family= "
at_fn_check_prepare_trace "firewall-cmd.at:665"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5305" ip netns exec fwd-test-4560 firewall-cmd --permanent --helper=foobar --set-family=
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:665"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:667:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5305\" ip netns exec fwd-test-4560 firewall-cmd --permanent --helper=foobar --get-family "
at_fn_check_prepare_trace "firewall-cmd.at:667"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5305" ip netns exec fwd-test-4560 firewall-cmd --permanent --helper=foobar --get-family
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:667"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:669:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5305\" ip netns exec fwd-test-4560 firewall-cmd --permanent --helper=foobar --get-ports "
at_fn_check_prepare_trace "firewall-cmd.at:669"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5305" ip netns exec fwd-test-4560 firewall-cmd --permanent --helper=foobar --get-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:669"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:672:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5305\" ip netns exec fwd-test-4560 firewall-cmd --permanent --helper=foobar --add-port=44/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:672"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5305" ip netns exec fwd-test-4560 firewall-cmd --permanent --helper=foobar --add-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:672"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:673:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5305\" ip netns exec fwd-test-4560 firewall-cmd --permanent --helper=foobar --get-ports | grep 44 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:673"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5305" ip netns exec fwd-test-4560 firewall-cmd --permanent --helper=foobar --get-ports | grep 44
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:673"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:674:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5305\" ip netns exec fwd-test-4560 firewall-cmd --permanent --helper=foobar --query-port=44/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:674"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5305" ip netns exec fwd-test-4560 firewall-cmd --permanent --helper=foobar --query-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:674"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:675:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5305\" ip netns exec fwd-test-4560 firewall-cmd --permanent --helper=foobar --remove-port=44/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:675"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5305" ip netns exec fwd-test-4560 firewall-cmd --permanent --helper=foobar --remove-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:675"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:676:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5305\" ip netns exec fwd-test-4560 firewall-cmd --permanent --helper=foobar --query-port=44/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:676"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5305" ip netns exec fwd-test-4560 firewall-cmd --permanent --helper=foobar --query-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:676"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:677:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5305\" ip netns exec fwd-test-4560 firewall-cmd --permanent --helper=foobar --get-ports "
at_fn_check_prepare_trace "firewall-cmd.at:677"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5305" ip netns exec fwd-test-4560 firewall-cmd --permanent --helper=foobar --get-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:677"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:679:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5305\" ip netns exec fwd-test-4560 firewall-cmd --permanent --delete-helper=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:679"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5305" ip netns exec fwd-test-4560 firewall-cmd --permanent --delete-helper=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:679"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:680:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5305\" ip netns exec fwd-test-4560 firewall-cmd --permanent --get-helpers | grep foobar "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:680"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5305" ip netns exec fwd-test-4560 firewall-cmd --permanent --get-helpers | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:680"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"-e '/ERROR: INVALID_MODULE:/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_MODULE:/d'"; then
                sed -i -e '/ERROR: INVALID_MODULE:/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:681" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:681"
            $as_echo "firewall-cmd.at:681" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:681"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_47
#AT_START_48
at_fn_group_banner 48 'firewall-cmd.at:683' \
  "direct" "                                         " 3
at_xfail=no
(
  $as_echo "48. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:683: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:683"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:683"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:683: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:683"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:683"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:683: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:683"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:683"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:683: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:683"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:683"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-31055" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:683: ip netns add fwd-test-31055"
at_fn_check_prepare_trace "firewall-cmd.at:683"
( $at_check_trace; ip netns add fwd-test-31055
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:683"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:683" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:683"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:683" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:683"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:683" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:683"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:686:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --add-chain ipv4 filter mychain "
at_fn_check_prepare_trace "firewall-cmd.at:686"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --add-chain ipv4 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:686"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:687:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --get-chains ipv4 filter | grep mychain "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:687"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --get-chains ipv4 filter | grep mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:687"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:688:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --get-all-chains | grep \"ipv4 filter mychain\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:688"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --get-all-chains | grep "ipv4 filter mychain"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:688"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:689:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --query-chain ipv4 filter mychain "
at_fn_check_prepare_trace "firewall-cmd.at:689"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --query-chain ipv4 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:689"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:690:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --add-chain ipv5 filter mychain "
at_fn_check_prepare_trace "firewall-cmd.at:690"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --add-chain ipv5 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:690"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:691:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --add-chain ipv4 badtable mychain "
at_fn_check_prepare_trace "firewall-cmd.at:691"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --add-chain ipv4 badtable mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 108 $at_status "$at_srcdir/firewall-cmd.at:691"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:693:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --add-rule ipv4 filter mychain 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:693"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --add-rule ipv4 filter mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:693"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:694:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --get-rules ipv4 filter mychain | grep \"3 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:694"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --get-rules ipv4 filter mychain | grep "3 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:694"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:695:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --get-all-rules | grep \"ipv4 filter mychain 3 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:695"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --get-all-rules | grep "ipv4 filter mychain 3 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:695"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:696:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --query-rule ipv4 filter mychain 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:696"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --query-rule ipv4 filter mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:696"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:697:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --remove-rule ipv4 filter mychain 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:697"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --remove-rule ipv4 filter mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:697"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:698:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --query-rule ipv4 filter mychain 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:698"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --query-rule ipv4 filter mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:698"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:699:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --add-rule ipv5 filter mychain 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:699"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --add-rule ipv5 filter mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:699"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:700:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --add-rule ipv4 badtable mychain 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:700"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --add-rule ipv4 badtable mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 108 $at_status "$at_srcdir/firewall-cmd.at:700"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:702:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --add-rule ipv4 filter mychain 3 -s 192.168.1.1 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:702"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --add-rule ipv4 filter mychain 3 -s 192.168.1.1 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:702"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:703:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --add-rule ipv4 filter mychain 4 -s 192.168.1.2 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:703"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --add-rule ipv4 filter mychain 4 -s 192.168.1.2 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:703"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:704:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --add-rule ipv4 filter mychain 5 -s 192.168.1.3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:704"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --add-rule ipv4 filter mychain 5 -s 192.168.1.3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:704"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:705:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --add-rule ipv4 filter mychain 6 -s 192.168.1.4 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:705"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --add-rule ipv4 filter mychain 6 -s 192.168.1.4 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:705"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:706:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --get-rules ipv4 filter mychain | grep \"3 -s 192.168.1.1 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:706"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --get-rules ipv4 filter mychain | grep "3 -s 192.168.1.1 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:706"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:707:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --get-rules ipv4 filter mychain | grep \"4 -s 192.168.1.2 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:707"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --get-rules ipv4 filter mychain | grep "4 -s 192.168.1.2 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:707"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:708:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --get-rules ipv4 filter mychain | grep \"5 -s 192.168.1.3 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:708"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --get-rules ipv4 filter mychain | grep "5 -s 192.168.1.3 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:708"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:709:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --get-rules ipv4 filter mychain | grep \"6 -s 192.168.1.4 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:709"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --get-rules ipv4 filter mychain | grep "6 -s 192.168.1.4 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:709"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:710:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --remove-rules ipv4 filter mychain "
at_fn_check_prepare_trace "firewall-cmd.at:710"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --remove-rules ipv4 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:710"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:711:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --query-rule ipv4 filter mychain 3 -s 192.168.1.1 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:711"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --query-rule ipv4 filter mychain 3 -s 192.168.1.1 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:711"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:712:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --query-rule ipv4 filter mychain 4 -s 192.168.1.2 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:712"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --query-rule ipv4 filter mychain 4 -s 192.168.1.2 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:712"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:713:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --query-rule ipv4 filter mychain 5 -s 192.168.1.3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:713"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --query-rule ipv4 filter mychain 5 -s 192.168.1.3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:713"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:714:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --query-rule ipv4 filter mychain 6 -s 192.168.1.4 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:714"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --query-rule ipv4 filter mychain 6 -s 192.168.1.4 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:714"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:716:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --remove-chain ipv5 filter mychain "
at_fn_check_prepare_trace "firewall-cmd.at:716"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --remove-chain ipv5 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:716"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:717:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --remove-chain ipv4 badtable mychain "
at_fn_check_prepare_trace "firewall-cmd.at:717"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --remove-chain ipv4 badtable mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 108 $at_status "$at_srcdir/firewall-cmd.at:717"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:718:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --remove-chain ipv4 filter mychain "
at_fn_check_prepare_trace "firewall-cmd.at:718"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --remove-chain ipv4 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:718"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:719:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --query-chain ipv4 filter mychain "
at_fn_check_prepare_trace "firewall-cmd.at:719"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --query-chain ipv4 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:719"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:720:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --remove-chain ipv4 filter dummy "
at_fn_check_prepare_trace "firewall-cmd.at:720"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --remove-chain ipv4 filter dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:720"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:723:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --reload "
at_fn_check_prepare_trace "firewall-cmd.at:723"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:723"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:724:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --list-all "
at_fn_check_prepare_trace "firewall-cmd.at:724"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --list-all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:724"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:725:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --get-services "
at_fn_check_prepare_trace "firewall-cmd.at:725"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --get-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:725"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:726:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --get-default-zone "
at_fn_check_prepare_trace "firewall-cmd.at:726"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:726"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:727:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --zone=home --list-services "
at_fn_check_prepare_trace "firewall-cmd.at:727"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --zone=home --list-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:727"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:728:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --permanent --list-all "
at_fn_check_prepare_trace "firewall-cmd.at:728"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --permanent --list-all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:728"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:731:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --permanent --direct --add-chain ipv4 filter žluťoučký "
at_fn_check_prepare_trace "firewall-cmd.at:731"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --permanent --direct --add-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:731"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:732:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --permanent --direct --get-chains ipv4 filter |grep \"žluťoučký\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:732"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --permanent --direct --get-chains ipv4 filter |grep "žluťoučký"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:732"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:733:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --permanent --direct --get-all-chains | grep \"ipv4 filter žluťoučký\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:733"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --permanent --direct --get-all-chains | grep "ipv4 filter žluťoučký"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:733"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:734:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --permanent --direct --query-chain ipv4 filter žluťoučký "
at_fn_check_prepare_trace "firewall-cmd.at:734"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --permanent --direct --query-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:734"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:735:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --permanent --direct --add-rule ipv4 filter žluťoučký 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:735"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --permanent --direct --add-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:735"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:736:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --permanent --direct --get-rules ipv4 filter žluťoučký | grep ACCEPT "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:736"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --permanent --direct --get-rules ipv4 filter žluťoučký | grep ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:736"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:737:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --permanent --direct --get-all-rules | grep \"ipv4 filter žluťoučký 3 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:737"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --permanent --direct --get-all-rules | grep "ipv4 filter žluťoučký 3 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:737"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:738:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --permanent --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:738"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --permanent --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:738"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:739:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --permanent --direct --remove-rule ipv4 filter žluťoučký 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:739"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --permanent --direct --remove-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:739"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:740:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --permanent --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:740"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --permanent --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:740"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:741:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --permanent --direct --remove-chain ipv4 filter žluťoučký "
at_fn_check_prepare_trace "firewall-cmd.at:741"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --permanent --direct --remove-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:741"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:742:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --permanent --direct --query-chain ipv4 filter žluťoučký "
at_fn_check_prepare_trace "firewall-cmd.at:742"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --permanent --direct --query-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:742"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:745:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:745"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:745"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:746:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --add-rule ipv4 filter FORWARD_direct 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:746"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --add-rule ipv4 filter FORWARD_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:746"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:747:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --add-rule ipv4 security INPUT_direct 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:747"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --add-rule ipv4 security INPUT_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:747"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:748:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --add-rule ipv4 raw PREROUTING_direct 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:748"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --add-rule ipv4 raw PREROUTING_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:748"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:749:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --add-rule ipv4 mangle PREROUTING_direct 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:749"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --add-rule ipv4 mangle PREROUTING_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:749"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:750:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --direct --add-rule ipv4 nat PREROUTING_direct 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:750"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --direct --add-rule ipv4 nat PREROUTING_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:750"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:751:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd --permanent --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:751"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd --permanent --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:751"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:752:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:752"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:752"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:752:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11848\" ip netns exec fwd-test-31055 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:752"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11848" ip netns exec fwd-test-31055 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:752"
$at_failed && at_fn_log_failure
$at_traceon; }











        if test x"-e '/ERROR: INVALID_TABLE:/d'               -e '/WARNING: NOT_ENABLED: chain/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_TABLE:/d'               -e '/WARNING: NOT_ENABLED: chain/d'"; then
                sed -i -e '/ERROR: INVALID_TABLE:/d'               -e '/WARNING: NOT_ENABLED: chain/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:753" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:753"
            $as_echo "firewall-cmd.at:753" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:753"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_48
#AT_START_49
at_fn_group_banner 49 'firewall-cmd.at:756' \
  "direct nat" "                                     " 3
at_xfail=no
(
  $as_echo "49. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:756: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:756"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:756"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:756: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:756"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:756"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:756: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:756"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:756"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:756: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:756"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:756"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-16122" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:756: ip netns add fwd-test-16122"
at_fn_check_prepare_trace "firewall-cmd.at:756"
( $at_check_trace; ip netns add fwd-test-16122
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:756"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18333" ip netns exec fwd-test-16122 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-18333" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:756" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:756"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18333" ip netns exec fwd-test-16122 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:756" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:756"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18333" ip netns exec fwd-test-16122 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:756" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:756"







        KERNEL_MAJOR=`uname -r | cut -d. -f1`
        KERNEL_MINOR=`uname -r | cut -d. -f2`
        if test ${KERNEL_MAJOR} -eq 4 && test ${KERNEL_MINOR} -ge 16 || test ${KERNEL_MAJOR} -gt 4; then
                                    $as_echo "firewall-cmd.at:759" >"$at_check_line_file"
(! modprobe iptable_nat) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:759"
            $as_echo "firewall-cmd.at:759" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18333" ip netns exec fwd-test-16122 nft add table ip foobar ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:759"
            $as_echo "firewall-cmd.at:759" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18333" ip netns exec fwd-test-16122 nft add chain ip foobar foobar_chain { type nat hook postrouting priority 100 \; } ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:759"

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:759:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18333\" ip netns exec fwd-test-16122 nft delete table ip foobar "
at_fn_check_prepare_trace "firewall-cmd.at:759"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18333" ip netns exec fwd-test-16122 nft delete table ip foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:759"
$at_failed && at_fn_log_failure
$at_traceon; }


        else
            $as_echo "firewall-cmd.at:759" >"$at_check_line_file"
at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:759"
        fi








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:763:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18333\" ip netns exec fwd-test-16122 firewall-cmd --permanent --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81 "
at_fn_check_prepare_trace "firewall-cmd.at:763"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18333" ip netns exec fwd-test-16122 firewall-cmd --permanent --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:763"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:764:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18333\" ip netns exec fwd-test-16122 firewall-cmd --permanent --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:764"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18333" ip netns exec fwd-test-16122 firewall-cmd --permanent --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:764"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:765:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18333\" ip netns exec fwd-test-16122 firewall-cmd --reload "
at_fn_check_prepare_trace "firewall-cmd.at:765"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18333" ip netns exec fwd-test-16122 firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:765"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:766:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18333\" ip netns exec fwd-test-16122 firewall-cmd --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:766"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18333" ip netns exec fwd-test-16122 firewall-cmd --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:766"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:767:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18333\" ip netns exec fwd-test-16122 firewall-cmd --permanent --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81 "
at_fn_check_prepare_trace "firewall-cmd.at:767"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18333" ip netns exec fwd-test-16122 firewall-cmd --permanent --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:767"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:768:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18333\" ip netns exec fwd-test-16122 firewall-cmd --permanent --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82 "
at_fn_check_prepare_trace "firewall-cmd.at:768"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18333" ip netns exec fwd-test-16122 firewall-cmd --permanent --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:768"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:769:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18333\" ip netns exec fwd-test-16122 firewall-cmd --permanent --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:769"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18333" ip netns exec fwd-test-16122 firewall-cmd --permanent --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:769"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:770:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18333\" ip netns exec fwd-test-16122 firewall-cmd --reload "
at_fn_check_prepare_trace "firewall-cmd.at:770"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18333" ip netns exec fwd-test-16122 firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:770"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:771:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18333\" ip netns exec fwd-test-16122 firewall-cmd --direct --get-all-rules |grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:771"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18333" ip netns exec fwd-test-16122 firewall-cmd --direct --get-all-rules |grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:771"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:772:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18333\" ip netns exec fwd-test-16122 firewall-cmd --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:772"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18333" ip netns exec fwd-test-16122 firewall-cmd --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:772"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:773:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18333\" ip netns exec fwd-test-16122 firewall-cmd --permanent --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82 "
at_fn_check_prepare_trace "firewall-cmd.at:773"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18333" ip netns exec fwd-test-16122 firewall-cmd --permanent --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:773"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:774:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18333\" ip netns exec fwd-test-16122 firewall-cmd --reload "
at_fn_check_prepare_trace "firewall-cmd.at:774"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18333" ip netns exec fwd-test-16122 firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:774"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:775:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18333\" ip netns exec fwd-test-16122 firewall-cmd --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:775"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18333" ip netns exec fwd-test-16122 firewall-cmd --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:775"
$at_failed && at_fn_log_failure
$at_traceon; }












        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:778" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:778"
            $as_echo "firewall-cmd.at:778" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:778"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_49
#AT_START_50
at_fn_group_banner 50 'firewall-cmd.at:780' \
  "direct passthrough" "                             " 3
at_xfail=no
(
  $as_echo "50. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:780: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:780"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:780"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:780: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:780"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:780"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:780: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:780"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:780"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:780: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:780"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:780"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-30527" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:780: ip netns add fwd-test-30527"
at_fn_check_prepare_trace "firewall-cmd.at:780"
( $at_check_trace; ip netns add fwd-test-30527
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:780"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25463" ip netns exec fwd-test-30527 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-25463" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:780" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:780"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25463" ip netns exec fwd-test-30527 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:780" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:780"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25463" ip netns exec fwd-test-30527 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:780" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:780"





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:783: if ! modprobe dummy; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:783"
( $at_check_trace; if ! modprobe dummy; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:783"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:785:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25463\" ip netns exec fwd-test-30527 firewall-cmd --direct --passthrough ipv4 --table mangle --append POSTROUTING --out-interface dummy0 --protocol udp --destination-port 68 --jump CHECKSUM --checksum-fill "
at_fn_check_prepare_trace "firewall-cmd.at:785"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25463" ip netns exec fwd-test-30527 firewall-cmd --direct --passthrough ipv4 --table mangle --append POSTROUTING --out-interface dummy0 --protocol udp --destination-port 68 --jump CHECKSUM --checksum-fill
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:785"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:786:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25463\" ip netns exec fwd-test-30527 firewall-cmd --direct --passthrough ipv4 --table mangle --delete POSTROUTING --out-interface dummy0 --protocol udp --destination-port 68 --jump CHECKSUM --checksum-fill "
at_fn_check_prepare_trace "firewall-cmd.at:786"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25463" ip netns exec fwd-test-30527 firewall-cmd --direct --passthrough ipv4 --table mangle --delete POSTROUTING --out-interface dummy0 --protocol udp --destination-port 68 --jump CHECKSUM --checksum-fill
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:786"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:788:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25463\" ip netns exec fwd-test-30527 firewall-cmd --direct --add-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:788"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25463" ip netns exec fwd-test-30527 firewall-cmd --direct --add-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:788"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:789:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25463\" ip netns exec fwd-test-30527 firewall-cmd --direct --add-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:789"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25463" ip netns exec fwd-test-30527 firewall-cmd --direct --add-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:789"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:790:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25463\" ip netns exec fwd-test-30527 firewall-cmd --direct --query-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:790"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25463" ip netns exec fwd-test-30527 firewall-cmd --direct --query-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:790"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:791:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25463\" ip netns exec fwd-test-30527 firewall-cmd --direct --query-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:791"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25463" ip netns exec fwd-test-30527 firewall-cmd --direct --query-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:791"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:792:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25463\" ip netns exec fwd-test-30527 firewall-cmd --direct --remove-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:792"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25463" ip netns exec fwd-test-30527 firewall-cmd --direct --remove-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:792"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:793:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25463\" ip netns exec fwd-test-30527 firewall-cmd --direct --remove-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:793"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25463" ip netns exec fwd-test-30527 firewall-cmd --direct --remove-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:793"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:794:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25463\" ip netns exec fwd-test-30527 firewall-cmd --direct --query-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:794"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25463" ip netns exec fwd-test-30527 firewall-cmd --direct --query-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:794"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:804:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25463\" ip netns exec fwd-test-30527 firewall-cmd --direct --passthrough ipv5 -nvL "
at_fn_check_prepare_trace "firewall-cmd.at:804"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25463" ip netns exec fwd-test-30527 firewall-cmd --direct --passthrough ipv5 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:804"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:805:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25463\" ip netns exec fwd-test-30527 firewall-cmd --direct --passthrough ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:805"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25463" ip netns exec fwd-test-30527 firewall-cmd --direct --passthrough ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:805"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:807:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25463\" ip netns exec fwd-test-30527 firewall-cmd --direct --passthrough --get-chains ipv4 filter "
at_fn_check_prepare_trace "firewall-cmd.at:807"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25463" ip netns exec fwd-test-30527 firewall-cmd --direct --passthrough --get-chains ipv4 filter
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:807"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:809:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25463\" ip netns exec fwd-test-30527 firewall-cmd --permanent --direct --add-passthrough ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:809"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25463" ip netns exec fwd-test-30527 firewall-cmd --permanent --direct --add-passthrough ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:809"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:810:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25463\" ip netns exec fwd-test-30527 firewall-cmd --permanent --direct --add-passthrough ipv5 -nvL "
at_fn_check_prepare_trace "firewall-cmd.at:810"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25463" ip netns exec fwd-test-30527 firewall-cmd --permanent --direct --add-passthrough ipv5 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:810"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:811:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25463\" ip netns exec fwd-test-30527 firewall-cmd --permanent --direct --add-passthrough ipv4 -nvL "
at_fn_check_prepare_trace "firewall-cmd.at:811"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25463" ip netns exec fwd-test-30527 firewall-cmd --permanent --direct --add-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:811"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:812:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25463\" ip netns exec fwd-test-30527 firewall-cmd --permanent --direct --get-passthroughs ipv4 | grep \"\\-nvL\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:812"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25463" ip netns exec fwd-test-30527 firewall-cmd --permanent --direct --get-passthroughs ipv4 | grep "\-nvL"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:812"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:813:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25463\" ip netns exec fwd-test-30527 firewall-cmd --permanent --direct --get-all-passthroughs | grep \"ipv4 \\-nvL\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:813"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25463" ip netns exec fwd-test-30527 firewall-cmd --permanent --direct --get-all-passthroughs | grep "ipv4 \-nvL"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:813"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:814:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25463\" ip netns exec fwd-test-30527 firewall-cmd --permanent --direct --query-passthrough ipv4 -nvL "
at_fn_check_prepare_trace "firewall-cmd.at:814"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25463" ip netns exec fwd-test-30527 firewall-cmd --permanent --direct --query-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:814"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:815:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25463\" ip netns exec fwd-test-30527 firewall-cmd --permanent --direct --remove-passthrough ipv4 -nvL "
at_fn_check_prepare_trace "firewall-cmd.at:815"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25463" ip netns exec fwd-test-30527 firewall-cmd --permanent --direct --remove-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:815"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:816:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-25463\" ip netns exec fwd-test-30527 firewall-cmd --permanent --direct --query-passthrough ipv4 -nvL "
at_fn_check_prepare_trace "firewall-cmd.at:816"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-25463" ip netns exec fwd-test-30527 firewall-cmd --permanent --direct --query-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:816"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"-e '/WARNING: NOT_ENABLED: passthrough/d'" != x"ignore"; then
            if test -n "-e '/WARNING: NOT_ENABLED: passthrough/d'"; then
                sed -i -e '/WARNING: NOT_ENABLED: passthrough/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:817" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:817"
            $as_echo "firewall-cmd.at:817" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:817"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_50
#AT_START_51
at_fn_group_banner 51 'firewall-cmd.at:819' \
  "direct ebtables" "                                " 3
at_xfail=no
(
  $as_echo "51. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:819: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:819"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:819"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:819: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:819"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:819"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:819: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:819"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:819"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:819: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:819"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:819"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-30938" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:819: ip netns add fwd-test-30938"
at_fn_check_prepare_trace "firewall-cmd.at:819"
( $at_check_trace; ip netns add fwd-test-30938
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:819"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10236" ip netns exec fwd-test-30938 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-10236" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:819" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:819"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10236" ip netns exec fwd-test-30938 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:819" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:819"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10236" ip netns exec fwd-test-30938 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:819" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:819"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:822:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10236\" ip netns exec fwd-test-30938 firewall-cmd --direct --add-chain eb filter mychain "
at_fn_check_prepare_trace "firewall-cmd.at:822"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10236" ip netns exec fwd-test-30938 firewall-cmd --direct --add-chain eb filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:822"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:823:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10236\" ip netns exec fwd-test-30938 firewall-cmd --direct --get-chains eb filter | grep mychain "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:823"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10236" ip netns exec fwd-test-30938 firewall-cmd --direct --get-chains eb filter | grep mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:823"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:824:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10236\" ip netns exec fwd-test-30938 firewall-cmd --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP "
at_fn_check_prepare_trace "firewall-cmd.at:824"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10236" ip netns exec fwd-test-30938 firewall-cmd --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:824"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:825:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10236\" ip netns exec fwd-test-30938 firewall-cmd --direct --add-rule eb filter mychain 999 -p IPv6 --ip6-protocol UDP --ip6-source-port ! 12345 -j DROP "
at_fn_check_prepare_trace "firewall-cmd.at:825"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10236" ip netns exec fwd-test-30938 firewall-cmd --direct --add-rule eb filter mychain 999 -p IPv6 --ip6-protocol UDP --ip6-source-port ! 12345 -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:825"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:826:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10236\" ip netns exec fwd-test-30938     sh <<-\"HERE\"
    { { { { ebtables --concurrent -t filter -L mychain; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     grep -v \"^Bridge\" |     sed -e 's/\\([-][-][-a-zA-Z0-9]\\+\\)[ ]\\+[!]/! \\1/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:826"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10236" ip netns exec fwd-test-30938     sh <<-"HERE"
    { { { { ebtables --concurrent -t filter -L mychain; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     grep -v "^Bridge" |     sed -e 's/\([-][-][-a-zA-Z0-9]\+\)[ ]\+[!]/! \1/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-p IPv6 -j DROP
-p IPv6 --ip6-proto udp ! --ip6-sport 12345 -j DROP
-j RETURN
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:826"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:831:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10236\" ip netns exec fwd-test-30938 firewall-cmd --direct --remove-rule eb filter mychain 1 -p 0x86dd -j DROP "
at_fn_check_prepare_trace "firewall-cmd.at:831"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10236" ip netns exec fwd-test-30938 firewall-cmd --direct --remove-rule eb filter mychain 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:831"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:832:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10236\" ip netns exec fwd-test-30938     sh <<-\"HERE\"
    { { { { ebtables --concurrent -t filter -L mychain; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     grep -v \"^Bridge\" |     sed -e 's/\\([-][-][-a-zA-Z0-9]\\+\\)[ ]\\+[!]/! \\1/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:832"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10236" ip netns exec fwd-test-30938     sh <<-"HERE"
    { { { { ebtables --concurrent -t filter -L mychain; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     grep -v "^Bridge" |     sed -e 's/\([-][-][-a-zA-Z0-9]\+\)[ ]\+[!]/! \1/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-p IPv6 --ip6-proto udp ! --ip6-sport 12345 -j DROP
-j RETURN
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:832"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:837:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10236\" ip netns exec fwd-test-30938 firewall-cmd --direct --add-rule eb filter INPUT 1 -p 0x86dd -j DROP "
at_fn_check_prepare_trace "firewall-cmd.at:837"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10236" ip netns exec fwd-test-30938 firewall-cmd --direct --add-rule eb filter INPUT 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:837"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:838:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10236\" ip netns exec fwd-test-30938 firewall-cmd --direct --add-rule eb filter INPUT_direct 1 -p 0x86dd -j DROP "
at_fn_check_prepare_trace "firewall-cmd.at:838"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10236" ip netns exec fwd-test-30938 firewall-cmd --direct --add-rule eb filter INPUT_direct 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:838"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:839:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10236\" ip netns exec fwd-test-30938     sh <<-\"HERE\"
    { { { { ebtables --concurrent -t filter -L INPUT; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     grep -v \"^Bridge\" |     sed -e 's/\\([-][-][-a-zA-Z0-9]\\+\\)[ ]\\+[!]/! \\1/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:839"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10236" ip netns exec fwd-test-30938     sh <<-"HERE"
    { { { { ebtables --concurrent -t filter -L INPUT; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     grep -v "^Bridge" |     sed -e 's/\([-][-][-a-zA-Z0-9]\+\)[ ]\+[!]/! \1/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-p IPv6 -j DROP
-p IPv6 -j DROP
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:839"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:851:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10236\" ip netns exec fwd-test-30938 firewall-cmd --direct --remove-rules eb filter INPUT "
at_fn_check_prepare_trace "firewall-cmd.at:851"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10236" ip netns exec fwd-test-30938 firewall-cmd --direct --remove-rules eb filter INPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:851"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:852:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10236\" ip netns exec fwd-test-30938 firewall-cmd --direct --remove-rules eb filter mychain "
at_fn_check_prepare_trace "firewall-cmd.at:852"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10236" ip netns exec fwd-test-30938 firewall-cmd --direct --remove-rules eb filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:852"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:854:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10236\" ip netns exec fwd-test-30938 firewall-cmd --permanent --direct --add-chain eb filter mychain "
at_fn_check_prepare_trace "firewall-cmd.at:854"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10236" ip netns exec fwd-test-30938 firewall-cmd --permanent --direct --add-chain eb filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:854"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:855:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10236\" ip netns exec fwd-test-30938 firewall-cmd --permanent --direct --get-chains eb filter | grep mychain "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:855"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10236" ip netns exec fwd-test-30938 firewall-cmd --permanent --direct --get-chains eb filter | grep mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:855"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:856:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10236\" ip netns exec fwd-test-30938 firewall-cmd --permanent --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP "
at_fn_check_prepare_trace "firewall-cmd.at:856"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10236" ip netns exec fwd-test-30938 firewall-cmd --permanent --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:856"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:857:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10236\" ip netns exec fwd-test-30938 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:857"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10236" ip netns exec fwd-test-30938 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:857"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:857:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10236\" ip netns exec fwd-test-30938 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:857"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10236" ip netns exec fwd-test-30938 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:857"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:858:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10236\" ip netns exec fwd-test-30938     sh <<-\"HERE\"
    { { { { ebtables --concurrent -t filter -L mychain; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     grep -v \"^Bridge\" |     sed -e 's/\\([-][-][-a-zA-Z0-9]\\+\\)[ ]\\+[!]/! \\1/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:858"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10236" ip netns exec fwd-test-30938     sh <<-"HERE"
    { { { { ebtables --concurrent -t filter -L mychain; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     grep -v "^Bridge" |     sed -e 's/\([-][-][-a-zA-Z0-9]\+\)[ ]\+[!]/! \1/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-p IPv6 -j DROP
-j RETURN
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:858"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:862" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:862"
            $as_echo "firewall-cmd.at:862" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:862"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_51
#AT_START_52
at_fn_group_banner 52 'firewall-cmd.at:864' \
  "lockdown" "                                       " 3
at_xfail=no
(
  $as_echo "52. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:864: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:864"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:864"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:864: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:864"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:864"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:864: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:864"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:864"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:864: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:864"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:864"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-32237" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:864: ip netns add fwd-test-32237"
at_fn_check_prepare_trace "firewall-cmd.at:864"
( $at_check_trace; ip netns add fwd-test-32237
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:864"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:864" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:864"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:864" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:864"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:864" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:864"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:867:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --add-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_trace "firewall-cmd.at:867"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --add-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:867"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:868:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --query-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_trace "firewall-cmd.at:868"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --query-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:868"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:869:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --list-lockdown-whitelist-commands | grep \"/usr/bin/command\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:869"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --list-lockdown-whitelist-commands | grep "/usr/bin/command"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:869"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:870:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --remove-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_trace "firewall-cmd.at:870"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --remove-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:870"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:871:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --query-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_trace "firewall-cmd.at:871"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --query-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:871"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:872:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --permanent --add-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_trace "firewall-cmd.at:872"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --permanent --add-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:872"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:873:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --permanent --query-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_trace "firewall-cmd.at:873"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --permanent --query-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:873"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:874:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --permanent --list-lockdown-whitelist-commands | grep \"/usr/bin/command\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:874"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --permanent --list-lockdown-whitelist-commands | grep "/usr/bin/command"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:874"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:875:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --permanent --remove-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_trace "firewall-cmd.at:875"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --permanent --remove-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:875"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:876:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --permanent --query-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_trace "firewall-cmd.at:876"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --permanent --query-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:876"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:878:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_trace "firewall-cmd.at:878"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:878"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:879:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_trace "firewall-cmd.at:879"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:879"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:880:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --list-lockdown-whitelist-contexts | grep \"system_u:system_r:MadDaemon_t:s0\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:880"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --list-lockdown-whitelist-contexts | grep "system_u:system_r:MadDaemon_t:s0"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:880"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:881:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_trace "firewall-cmd.at:881"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:881"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:882:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_trace "firewall-cmd.at:882"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:882"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:883:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --permanent --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_trace "firewall-cmd.at:883"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --permanent --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:883"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:884:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --permanent --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_trace "firewall-cmd.at:884"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --permanent --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:884"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:885:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --permanent --list-lockdown-whitelist-contexts | grep \"system_u:system_r:MadDaemon_t:s0\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:885"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --permanent --list-lockdown-whitelist-contexts | grep "system_u:system_r:MadDaemon_t:s0"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:885"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:886:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --permanent --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_trace "firewall-cmd.at:886"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --permanent --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:886"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:887:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --permanent --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_trace "firewall-cmd.at:887"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --permanent --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:887"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:889:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --add-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_trace "firewall-cmd.at:889"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --add-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:889"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:890:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --query-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_trace "firewall-cmd.at:890"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --query-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:890"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:891:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --list-lockdown-whitelist-uids | grep \"6666\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:891"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --list-lockdown-whitelist-uids | grep "6666"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:891"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:892:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --remove-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_trace "firewall-cmd.at:892"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --remove-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:892"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:893:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --query-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_trace "firewall-cmd.at:893"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --query-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:893"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:894:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --add-lockdown-whitelist-uid 6666x "
at_fn_check_prepare_trace "firewall-cmd.at:894"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --add-lockdown-whitelist-uid 6666x
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:894"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:895:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --permanent --add-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_trace "firewall-cmd.at:895"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --permanent --add-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:895"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:896:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --permanent --query-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_trace "firewall-cmd.at:896"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --permanent --query-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:896"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:897:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --permanent --list-lockdown-whitelist-uids | grep \"6666\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:897"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --permanent --list-lockdown-whitelist-uids | grep "6666"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:897"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:898:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --permanent --remove-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_trace "firewall-cmd.at:898"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --permanent --remove-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:898"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:899:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --permanent --query-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_trace "firewall-cmd.at:899"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --permanent --query-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:899"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:900:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --permanent --add-lockdown-whitelist-uid 6666x "
at_fn_check_prepare_trace "firewall-cmd.at:900"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --permanent --add-lockdown-whitelist-uid 6666x
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:900"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:902:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --add-lockdown-whitelist-user theboss "
at_fn_check_prepare_trace "firewall-cmd.at:902"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --add-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:902"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:903:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --query-lockdown-whitelist-user theboss "
at_fn_check_prepare_trace "firewall-cmd.at:903"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --query-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:903"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:904:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --list-lockdown-whitelist-users | grep \"theboss\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:904"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --list-lockdown-whitelist-users | grep "theboss"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:904"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:905:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --remove-lockdown-whitelist-user theboss "
at_fn_check_prepare_trace "firewall-cmd.at:905"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --remove-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:905"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:906:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --query-lockdown-whitelist-user theboss "
at_fn_check_prepare_trace "firewall-cmd.at:906"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --query-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:906"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:907:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --permanent --add-lockdown-whitelist-user theboss "
at_fn_check_prepare_trace "firewall-cmd.at:907"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --permanent --add-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:907"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:908:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --permanent --query-lockdown-whitelist-user theboss "
at_fn_check_prepare_trace "firewall-cmd.at:908"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --permanent --query-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:908"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:909:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --permanent --list-lockdown-whitelist-users | grep \"theboss\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:909"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --permanent --list-lockdown-whitelist-users | grep "theboss"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:909"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:910:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --permanent --remove-lockdown-whitelist-user theboss "
at_fn_check_prepare_trace "firewall-cmd.at:910"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --permanent --remove-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:910"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:911:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --permanent --query-lockdown-whitelist-user theboss "
at_fn_check_prepare_trace "firewall-cmd.at:911"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --permanent --query-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:911"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "firewall-cmd.at:913" >"$at_check_line_file"
(test `whoami` != 'root') \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:913"



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:914:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --add-lockdown-whitelist-user root "
at_fn_check_prepare_trace "firewall-cmd.at:914"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --add-lockdown-whitelist-user root
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:914"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:915:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --lockdown-on "
at_fn_check_prepare_trace "firewall-cmd.at:915"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --lockdown-on
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:915"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:916:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --query-lockdown "
at_fn_check_prepare_trace "firewall-cmd.at:916"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --query-lockdown
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:916"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:917:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --lockdown-off "
at_fn_check_prepare_trace "firewall-cmd.at:917"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --lockdown-off
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:917"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:918:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21645\" ip netns exec fwd-test-32237 firewall-cmd --query-lockdown "
at_fn_check_prepare_trace "firewall-cmd.at:918"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21645" ip netns exec fwd-test-32237 firewall-cmd --query-lockdown
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:918"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:919" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:919"
            $as_echo "firewall-cmd.at:919" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:919"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_52
#AT_START_53
at_fn_group_banner 53 'firewall-cmd.at:931' \
  "rich rules good" "                                " 3
at_xfail=no
(
  $as_echo "53. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:931: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:931"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:931"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:931: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:931"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:931"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:931: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:931"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:931"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:931: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:931"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:931"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-2787" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:931: ip netns add fwd-test-2787"
at_fn_check_prepare_trace "firewall-cmd.at:931"
( $at_check_trace; ip netns add fwd-test-2787
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:931"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:931" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:931"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:931" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:931"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:931" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:931"









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:934:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --add-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:934"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --add-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:934"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:934:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:934"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:934"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:934:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --remove-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:934"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --remove-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:934"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:934:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:934"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:934"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:934:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --add-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:934"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --add-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:934"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:934:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:934"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:934"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:934:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --remove-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:934"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --remove-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:934"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:934:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:934"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:934"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:935:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --add-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:935"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --add-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:935"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:935:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:935"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:935"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:935:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --remove-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:935"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --remove-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:935"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:935:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:935"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:935"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:935:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --add-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:935"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --add-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:935"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:935:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:935"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:935"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:935:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --remove-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:935"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --remove-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:935"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:935:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:935"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:935"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:936:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --add-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:936"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --add-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:936"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:936:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:936"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:936"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:936:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --remove-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:936"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --remove-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:936"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:936:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:936"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:936"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:936:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --add-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:936"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --add-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:936"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:936:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:936"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:936"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:936:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --remove-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:936"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --remove-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:936"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:936:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:936"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:936"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:937:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:937"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:937"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:937:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:937"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:937"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:937:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:937"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:937"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:937:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:937"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:937"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:937:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:937"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:937"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:937:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:937"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:937"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:937:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:937"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:937"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:937:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:937"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:937"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:938:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --add-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:938"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --add-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:938"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:938:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:938"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:938"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:938:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:938"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --remove-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:938"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:938:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:938"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:938"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:938:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:938"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:938"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:938:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:938"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:938"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:938:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:938"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:938"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:938:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:938"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:938"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" service name=\"radius\" log prefix=\"dns -- \" level=\"info\" limit value=\"3/m\" reject type=\"icmp6-addr-unreachable\" limit value=\"20/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" service name="radius" log prefix="dns -- " level="info" limit value="3/m" reject type="icmp6-addr-unreachable" limit value="20/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" port port=\"4011\" protocol=\"tcp\" log prefix=\"port 4011: \" level=\"info\" limit value=\"4/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" port port="4011" protocol="tcp" log prefix="port 4011: " level="info" limit value="4/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"1::2:3:4:7\"' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="1::2:3:4:7"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --remove-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log prefix=\"redirected: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log prefix="redirected: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --add-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --remove-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --add-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --remove-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4::/64\" destination address=\"1:2:3:5::/64\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family="ipv6" source address="1:2:3:4::/64" destination address="1:2:3:5::/64" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --add-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --add-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --remove-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --remove-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --add-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --remove-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:939:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv6\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:939"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family="ipv6" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:939"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:947:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --add-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_trace "firewall-cmd.at:947"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --add-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:947"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:947:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_trace "firewall-cmd.at:947"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:947"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:947:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --remove-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_trace "firewall-cmd.at:947"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --remove-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:947"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:947:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_trace "firewall-cmd.at:947"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:947"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:947:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_trace "firewall-cmd.at:947"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:947"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:947:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_trace "firewall-cmd.at:947"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:947"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:947:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_trace "firewall-cmd.at:947"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:947"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:947:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_trace "firewall-cmd.at:947"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:947"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:948:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:948"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:948"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:948:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:948"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:948"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:948:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:948"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:948"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:948:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:948"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:948"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:948:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:948"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:948"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:948:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:948"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:948"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:948:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:948"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:948"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:948:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:948"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:948"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:949:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:949"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --add-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:949"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:949:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:949"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:949"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:949:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:949"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --remove-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:949"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:949:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:949"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:949"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:949:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:949"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:949"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:949:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:949"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:949"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:949:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:949"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:949"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:949:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:949"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:949"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:950:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --add-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:950"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --add-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:950"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:950:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:950"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:950"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:950:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:950"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --remove-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:950"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:950:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:950"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:950"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:950:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:950"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:950"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:950:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:950"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:950"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:950:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:950"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:950"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:950:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:950"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:950"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:951:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --add-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:951"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --add-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:951"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:951:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:951"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:951"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:951:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --remove-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:951"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --remove-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:951"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:951:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:951"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:951"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:951:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:951"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:951"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:951:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:951"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:951"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:951:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:951"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:951"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:951:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:951"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:951"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:952:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:952"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --add-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:952"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:952:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:952"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:952"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:952:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --remove-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:952"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --remove-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:952"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:952:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:952"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:952"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:952:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:952"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --add-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:952"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:952:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:952"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:952"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:952:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --remove-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:952"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --remove-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:952"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:952:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:952"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:952"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:953:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --add-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:953"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --add-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:953"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:953:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:953"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:953"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:953:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --remove-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:953"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --remove-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:953"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:953:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:953"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:953"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:953:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --add-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:953"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --add-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:953"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:953:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:953"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:953"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:953:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --remove-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:953"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --remove-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:953"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:953:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:953"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:953"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:954:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --add-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_trace "firewall-cmd.at:954"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --add-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:954"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:954:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_trace "firewall-cmd.at:954"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:954"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:954:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --remove-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_trace "firewall-cmd.at:954"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --remove-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:954"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:954:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_trace "firewall-cmd.at:954"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:954"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:954:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --add-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_trace "firewall-cmd.at:954"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --add-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:954"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:954:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_trace "firewall-cmd.at:954"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:954"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:954:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --remove-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_trace "firewall-cmd.at:954"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --remove-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:954"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:954:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"99\" to-port=\"999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_trace "firewall-cmd.at:954"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule forward-port port="99" to-port="999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:954"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:954:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --add-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_trace "firewall-cmd.at:954"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --add-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:954"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:954:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_trace "firewall-cmd.at:954"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:954"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:954:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --remove-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_trace "firewall-cmd.at:954"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --remove-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:954"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:954:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_trace "firewall-cmd.at:954"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:954"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:954:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --add-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_trace "firewall-cmd.at:954"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --add-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:954"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:954:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_trace "firewall-cmd.at:954"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:954"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:954:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --remove-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_trace "firewall-cmd.at:954"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --remove-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:954"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:954:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"99\" to-port=\"10999\" to-addr=\"1::2:3:4:7\" protocol=\"dccp\" family=\"ipv6\" source address=\"1:2:3:4:6::\"' "
at_fn_check_prepare_trace "firewall-cmd.at:954"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule forward-port port="99" to-port="10999" to-addr="1::2:3:4:7" protocol="dccp" family="ipv6" source address="1:2:3:4:6::"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:954"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:958:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --add-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_trace "firewall-cmd.at:958"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --add-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:958"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:958:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_trace "firewall-cmd.at:958"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:958"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:958:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --remove-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_trace "firewall-cmd.at:958"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --remove-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:958"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:958:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_trace "firewall-cmd.at:958"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --query-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:958"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:958:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_trace "firewall-cmd.at:958"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:958"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:958:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_trace "firewall-cmd.at:958"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:958"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:958:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_trace "firewall-cmd.at:958"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:958"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:958:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1824\" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_trace "firewall-cmd.at:958"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1824" ip netns exec fwd-test-2787 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:958"
$at_failed && at_fn_log_failure
$at_traceon; }











        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:959" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:959"
            $as_echo "firewall-cmd.at:959" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:959"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_53
#AT_START_54
at_fn_group_banner 54 'firewall-cmd.at:960' \
  "rich rules audit" "                               " 3
at_xfail=no
(
  $as_echo "54. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:960: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:960"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:960"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:960: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:960"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:960"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:960: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:960"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:960"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:960: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:960"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:960"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-10231" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:960: ip netns add fwd-test-10231"
at_fn_check_prepare_trace "firewall-cmd.at:960"
( $at_check_trace; ip netns add fwd-test-10231
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:960"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15319" ip netns exec fwd-test-10231 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-15319" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:960" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:960"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15319" ip netns exec fwd-test-10231 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:960" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:960"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15319" ip netns exec fwd-test-10231 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:960" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:960"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:963:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-15319\" ip netns exec fwd-test-10231 nft add table inet firewalld_check_log_audit "
at_fn_check_prepare_trace "firewall-cmd.at:963"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15319" ip netns exec fwd-test-10231 nft add table inet firewalld_check_log_audit
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:963"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:963:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-15319\" ip netns exec fwd-test-10231 nft add chain inet firewalld_check_log_audit foobar { type filter hook input priority 0 \\; }  "
at_fn_check_prepare_trace "firewall-cmd.at:963"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15319" ip netns exec fwd-test-10231 nft add chain inet firewalld_check_log_audit foobar { type filter hook input priority 0 \; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:963"
$at_failed && at_fn_log_failure
$at_traceon; }


        $as_echo "firewall-cmd.at:963" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15319" ip netns exec fwd-test-10231 nft add rule inet firewalld_check_log_audit foobar log level audit >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:963"

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:963:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-15319\" ip netns exec fwd-test-10231 nft delete table inet firewalld_check_log_audit "
at_fn_check_prepare_trace "firewall-cmd.at:963"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15319" ip netns exec fwd-test-10231 nft delete table inet firewalld_check_log_audit
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:963"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:964:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-15319\" ip netns exec fwd-test-10231 firewall-cmd --add-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:964"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15319" ip netns exec fwd-test-10231 firewall-cmd --add-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:964"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:964:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-15319\" ip netns exec fwd-test-10231 firewall-cmd --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:964"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15319" ip netns exec fwd-test-10231 firewall-cmd --query-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:964"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:964:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-15319\" ip netns exec fwd-test-10231 firewall-cmd --remove-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:964"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15319" ip netns exec fwd-test-10231 firewall-cmd --remove-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:964"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:964:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-15319\" ip netns exec fwd-test-10231 firewall-cmd --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:964"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15319" ip netns exec fwd-test-10231 firewall-cmd --query-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:964"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:964:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-15319\" ip netns exec fwd-test-10231 firewall-cmd --permanent --add-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:964"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15319" ip netns exec fwd-test-10231 firewall-cmd --permanent --add-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:964"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:964:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-15319\" ip netns exec fwd-test-10231 firewall-cmd --permanent --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:964"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15319" ip netns exec fwd-test-10231 firewall-cmd --permanent --query-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:964"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:964:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-15319\" ip netns exec fwd-test-10231 firewall-cmd --permanent --remove-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:964"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15319" ip netns exec fwd-test-10231 firewall-cmd --permanent --remove-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:964"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:964:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-15319\" ip netns exec fwd-test-10231 firewall-cmd --permanent --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:964"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15319" ip netns exec fwd-test-10231 firewall-cmd --permanent --query-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:964"
$at_failed && at_fn_log_failure
$at_traceon; }











        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:965" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:965"
            $as_echo "firewall-cmd.at:965" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:965"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_54
#AT_START_55
at_fn_group_banner 55 'firewall-cmd.at:968' \
  "rich rules priority" "                            " 3
at_xfail=no
(
  $as_echo "55. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:968: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:968"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:968"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:968: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:968"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:968"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:968: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:968"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:968"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:968: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:968"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:968"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-24455" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:968: ip netns add fwd-test-24455"
at_fn_check_prepare_trace "firewall-cmd.at:968"
( $at_check_trace; ip netns add fwd-test-24455
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:968"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:968" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:968"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:968" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:968"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:968" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:968"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:971:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 nft add table inet firewalld_check_log_audit "
at_fn_check_prepare_trace "firewall-cmd.at:971"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 nft add table inet firewalld_check_log_audit
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:971"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:971:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 nft add chain inet firewalld_check_log_audit foobar { type filter hook input priority 0 \\; }  "
at_fn_check_prepare_trace "firewall-cmd.at:971"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 nft add chain inet firewalld_check_log_audit foobar { type filter hook input priority 0 \; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:971"
$at_failed && at_fn_log_failure
$at_traceon; }


        $as_echo "firewall-cmd.at:971" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 nft add rule inet firewalld_check_log_audit foobar log level audit >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:971"

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:971:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 nft delete table inet firewalld_check_log_audit "
at_fn_check_prepare_trace "firewall-cmd.at:971"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 nft delete table inet firewalld_check_log_audit
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:971"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:974:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_IN_public; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:974"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_IN_public; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public {
jump filter_IN_public_pre
jump filter_IN_public_log
jump filter_IN_public_deny
jump filter_IN_public_allow
jump filter_IN_public_post
meta l4proto { icmp, ipv6-icmp } accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:974"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:986:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_FWDI_public; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:986"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_FWDI_public; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWDI_public {
jump filter_FWDI_public_pre
jump filter_FWDI_public_log
jump filter_FWDI_public_deny
jump filter_FWDI_public_allow
jump filter_FWDI_public_post
meta l4proto { icmp, ipv6-icmp } accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:986"
$at_failed && at_fn_log_failure
$at_traceon; }






















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1036:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule port port=\"1111\" protocol=\"tcp\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:1036"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule port port="1111" protocol="tcp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1036"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1037:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=0 port port=\"1122\" protocol=\"tcp\" audit accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1037"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=0 port port="1122" protocol="tcp" audit accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1037"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1038:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule port port=\"2222\" protocol=\"tcp\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1038"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule port port="2222" protocol="tcp" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1038"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1039:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule port port=\"3333\" protocol=\"tcp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1039"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule port port="3333" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1039"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1040:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=0 port port=\"4444\" protocol=\"tcp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1040"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=0 port port="4444" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1040"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1041:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_IN_public_log; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1041"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_IN_public_log; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_log {
tcp dport 1111 ct state new,untracked log
tcp dport 1122 ct state new,untracked log level audit
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1041"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1049:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_IN_public_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1049"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_IN_public_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_deny {
tcp dport 2222 ct state new,untracked drop
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1049"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1056:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1056"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 ct state new,untracked accept
ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
tcp dport 1122 ct state new,untracked accept
tcp dport 3333 ct state new,untracked accept
tcp dport 4444 ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1056"
$at_failed && at_fn_log_failure
$at_traceon; }




























    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1094:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:1094"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1094"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1094:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:1094"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1094"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1097:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=-32768 port port=\"1234\" protocol=\"tcp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1097"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=-32768 port port="1234" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1097"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1098:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=32767 port port=\"1234\" protocol=\"tcp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1098"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=32767 port port="1234" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1098"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1099:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=-32769 port port=\"1234\" protocol=\"tcp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1099"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=-32769 port port="1234" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/firewall-cmd.at:1099"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1100:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=32768 port port=\"1234\" protocol=\"tcp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1100"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=32768 port port="1234" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/firewall-cmd.at:1100"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1101:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:1101"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1101"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1101:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:1101"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1101"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1105:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1105"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1105"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1106:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --query-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1106"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --query-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1106"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1107:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_IN_public_post; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1107"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_IN_public_post; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_post {
drop
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1107"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1120:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --remove-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1120"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --remove-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1120"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1121:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --query-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1121"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --query-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1121"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1122:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --permanent --add-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1122"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --permanent --add-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1122"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1123:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --permanent --query-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1123"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --permanent --query-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1123"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1124:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --permanent --remove-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1124"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --permanent --remove-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1124"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1125:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --permanent --query-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1125"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --permanent --query-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1125"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1128:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1128"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1128"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1129:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=0 drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1129"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=0 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1129"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1130:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule log prefix=\"foobar: \"' "
at_fn_check_prepare_trace "firewall-cmd.at:1130"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule log prefix="foobar: "'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1130"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1131:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:1131"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1131"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1131:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:1131"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1131"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1134:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule family=\"ipv4\" source address=\"10.10.0.0/16\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1134"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule family="ipv4" source address="10.10.0.0/16" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1134"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1135:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-10 source address=\"10.1.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1135"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule family="ipv4" priority=-10 source address="10.1.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1135"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1136:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-1  source address=\"10.1.0.0/16\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1136"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule family="ipv4" priority=-1  source address="10.1.0.0/16" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1136"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1138:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=0 forward-port port=\"222\"  protocol=\"tcp\" to-port=\"22\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1138"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule family="ipv4" priority=0 forward-port port="222"  protocol="tcp" to-port="22"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1138"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1139:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=0 forward-port port=\"2222\" protocol=\"tcp\" to-port=\"22\" to-addr=\"10.1.1.1\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1139"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule family="ipv4" priority=0 forward-port port="2222" protocol="tcp" to-port="22" to-addr="10.1.1.1"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1139"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1140:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-10 forward-port port=\"8888\" protocol=\"tcp\" to-port=\"80\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1140"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule family="ipv4" priority=-10 forward-port port="8888" protocol="tcp" to-port="80"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1140"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1141:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-10 forward-port port=\"8080\" protocol=\"tcp\" to-port=\"80\" to-addr=\"10.1.1.1\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1141"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule family="ipv4" priority=-10 forward-port port="8080" protocol="tcp" to-port="80" to-addr="10.1.1.1"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1141"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1142:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule family=\"ipv6\" priority=0 forward-port port=\"9090\" protocol=\"tcp\" to-port=\"90\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1142"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule family="ipv6" priority=0 forward-port port="9090" protocol="tcp" to-port="90"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1142"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1142:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule family=\"ipv6\" priority=-123 forward-port port=\"999\" protocol=\"tcp\" to-port=\"99\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1142"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule family="ipv6" priority=-123 forward-port port="999" protocol="tcp" to-port="99"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1142"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1142:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule family=\"ipv6\" priority=-123 forward-port port=\"9999\" protocol=\"tcp\" to-port=\"9999\" to-addr=\"1234::4321\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1142"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule family="ipv6" priority=-123 forward-port port="9999" protocol="tcp" to-port="9999" to-addr="1234::4321"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1142"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1147:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_INPUT; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1147"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_INPUT; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT {
ct state established,related accept
ct status dnat accept
iifname \"lo\" accept
jump filter_INPUT_ZONES
ct state invalid drop
reject with icmpx type admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1147"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1159:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_IN_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1159"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_IN_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_pre {
ip saddr 10.1.0.0/16 drop
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1159"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1166:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1166"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 ct state new,untracked accept
ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1166"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1174:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_FWDI_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1174"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_FWDI_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWDI_public_pre {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1174"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1180:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_FWDI_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1180"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_FWDI_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWDI_public_allow {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1180"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1186:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_FWDO_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1186"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_FWDO_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWDO_public_pre {
ip saddr 10.1.1.0/24 ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1186"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1193:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_FWDO_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1193"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_FWDO_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWDO_public_allow {
ip saddr 10.10.0.0/16 ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1193"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1200:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455     sh <<-\"HERE\"
    { { { { nft -nn list chain ip firewalld nat_PRE_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1200"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455     sh <<-"HERE"
    { { { { nft -nn list chain ip firewalld nat_PRE_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip firewalld {
chain nat_PRE_public_pre {
tcp dport 8888 redirect to :80
tcp dport 8080 dnat to 10.1.1.1:80
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1200"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1208:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455     sh <<-\"HERE\"
    { { { { nft -nn list chain ip firewalld nat_PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1208"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455     sh <<-"HERE"
    { { { { nft -nn list chain ip firewalld nat_PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip firewalld {
chain nat_PRE_public_allow {
tcp dport 222 redirect to :22
tcp dport 2222 dnat to 10.1.1.1:22
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1208"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1216:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455     sh <<-\"HERE\"
    { { { { nft -nn list chain ip firewalld nat_POST_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1216"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455     sh <<-"HERE"
    { { { { nft -nn list chain ip firewalld nat_POST_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip firewalld {
chain nat_POST_public_pre {
ip saddr 10.1.1.0/24 oifname != \"lo\" masquerade
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1216"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1223:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455     sh <<-\"HERE\"
    { { { { nft -nn list chain ip firewalld nat_POST_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1223"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455     sh <<-"HERE"
    { { { { nft -nn list chain ip firewalld nat_POST_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip firewalld {
chain nat_POST_public_allow {
ip saddr 10.10.0.0/16 oifname != \"lo\" masquerade
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1223"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1230:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455     sh <<-\"HERE\"
    { { { { nft -nn list chain ip6 firewalld nat_PRE_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1230"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455     sh <<-"HERE"
    { { { { nft -nn list chain ip6 firewalld nat_PRE_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip6 firewalld {
chain nat_PRE_public_pre {
tcp dport 999 redirect to :99
tcp dport 9999 dnat to [1234::4321]:9999
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1230"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1238:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455     sh <<-\"HERE\"
    { { { { nft -nn list chain ip6 firewalld nat_PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1238"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455     sh <<-"HERE"
    { { { { nft -nn list chain ip6 firewalld nat_PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip6 firewalld {
chain nat_PRE_public_allow {
tcp dport 9090 redirect to :90
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1238"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1245:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455     sh <<-\"HERE\"
    { { { { nft -nn list chain ip6 firewalld nat_POST_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1245"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455     sh <<-"HERE"
    { { { { nft -nn list chain ip6 firewalld nat_POST_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip6 firewalld {
chain nat_POST_public_pre {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1245"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1251:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455     sh <<-\"HERE\"
    { { { { nft -nn list chain ip6 firewalld nat_POST_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1251"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455     sh <<-"HERE"
    { { { { nft -nn list chain ip6 firewalld nat_POST_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip6 firewalld {
chain nat_POST_public_allow {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1251"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1257:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld mangle_PRE_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1257"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld mangle_PRE_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PRE_public_pre {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1257"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1263:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld mangle_PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1263"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld mangle_PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PRE_public_allow {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1263"
$at_failed && at_fn_log_failure
$at_traceon; }






































































    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1324:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:1324"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1324"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1324:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:1324"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1324"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1327:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule icmp-block name=\"destination-unreachable\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1327"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule icmp-block name="destination-unreachable"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1327"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1328:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=-10 icmp-block name=\"destination-unreachable\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1328"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=-10 icmp-block name="destination-unreachable"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1328"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1330:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule icmp-type name=\"echo-request\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1330"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule icmp-type name="echo-request" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1330"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1331:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=-10 icmp-type name=\"echo-request\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1331"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=-10 icmp-type name="echo-request" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1331"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1332:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_IN_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1332"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_IN_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_pre {
icmp type destination-unreachable reject with icmp type admin-prohibited
icmpv6 type destination-unreachable reject with icmpv6 type admin-prohibited
icmp type echo-request accept
icmpv6 type echo-request accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1332"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1342:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_IN_public_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1342"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_IN_public_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_deny {
icmp type destination-unreachable reject with icmp type admin-prohibited
icmpv6 type destination-unreachable reject with icmpv6 type admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1342"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1350:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1350"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 ct state new,untracked accept
ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
icmp type echo-request accept
icmpv6 type echo-request accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1350"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1360:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_FWDI_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1360"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_FWDI_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWDI_public_pre {
icmp type destination-unreachable reject with icmp type admin-prohibited
icmpv6 type destination-unreachable reject with icmpv6 type admin-prohibited
icmp type echo-request accept
icmpv6 type echo-request accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1360"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1370:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_FWDI_public_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1370"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_FWDI_public_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWDI_public_deny {
icmp type destination-unreachable reject with icmp type admin-prohibited
icmpv6 type destination-unreachable reject with icmpv6 type admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1370"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1378:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_FWDI_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1378"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_FWDI_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWDI_public_allow {
icmp type echo-request accept
icmpv6 type echo-request accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1378"
$at_failed && at_fn_log_failure
$at_traceon; }














































    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1429:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:1429"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1429"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1429:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:1429"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1429"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1432:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=70   service name=\"smtps\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1432"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=70   service name="smtps" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1432"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1433:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=-111 service name=\"ntp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1433"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=-111 service name="ntp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1433"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1434:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=-10  port port=\"1111\" protocol=\"tcp\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1434"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=-10  port port="1111" protocol="tcp" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1434"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1435:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=-100 port port=\"1111\" protocol=\"tcp\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:1435"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=-100 port port="1111" protocol="tcp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1435"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1436:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=\"-77\"    service name=\"smtp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1436"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority="-77"    service name="smtp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1436"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1437:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --remove-rich-rule='rule priority=-111 service name=\"ntp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1437"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --remove-rich-rule='rule priority=-111 service name="ntp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1437"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1438:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-32768 source address=\"10.0.0.0/8\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:1438"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule family="ipv4" priority=-32768 source address="10.0.0.0/8" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1438"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1439:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-2 source address=\"10.0.0.0/8\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:1439"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule family="ipv4" priority=-2 source address="10.0.0.0/8" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1439"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1440:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-1 source address=\"10.0.0.0/8\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1440"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule family="ipv4" priority=-1 source address="10.0.0.0/8" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1440"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1441:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-5 source address=\"10.10.10.0/24\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1441"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule family="ipv4" priority=-5 source address="10.10.10.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1441"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1442:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-3 source address=\"10.100.100.0/24\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1442"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule family="ipv4" priority=-3 source address="10.100.100.0/24" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1442"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1443:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=127  drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1443"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=127  drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1443"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1444:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=125 service name=\"imap\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1444"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=125 service name="imap" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1444"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1445:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=126 log prefix=\"DROPPED: \"' "
at_fn_check_prepare_trace "firewall-cmd.at:1445"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=126 log prefix="DROPPED: "'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1445"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1446:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=10  service name=\"ssh\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1446"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=10  service name="ssh" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1446"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1447:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=1   service name=\"http\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1447"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=1   service name="http" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1447"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1448:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=100 service name=\"https\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1448"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=100 service name="https" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1448"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1449:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=5   service name=\"https\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1449"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=5   service name="https" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1449"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1450:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=66  service name=\"smtp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1450"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=66  service name="smtp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1450"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1451:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --remove-rich-rule='rule priority=66    service name=\"smtp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1451"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --remove-rich-rule='rule priority=66    service name="smtp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1451"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1452:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --remove-rich-rule='rule priority=70    service name=\"smtps\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1452"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --remove-rich-rule='rule priority=70    service name="smtps" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1452"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1453:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --remove-rich-rule='rule priority=5     service name=\"https\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1453"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --remove-rich-rule='rule priority=5     service name="https" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1453"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1454:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --remove-rich-rule='rule priority=\"-77\" service name=\"smtp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1454"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --remove-rich-rule='rule priority="-77" service name="smtp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1454"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1455:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --remove-rich-rule='rule family=\"ipv4\" priority=-3 source address=\"10.100.100.0/24\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1455"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --remove-rich-rule='rule family="ipv4" priority=-3 source address="10.100.100.0/24" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1455"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1456:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_IN_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1456"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_IN_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_pre {
ip saddr 10.0.0.0/8 log
tcp dport 1111 ct state new,untracked log
tcp dport 1111 ct state new,untracked drop
ip saddr 10.10.10.0/24 accept
ip saddr 10.0.0.0/8 log
ip saddr 10.0.0.0/8 drop
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1456"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1468:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1468"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 ct state new,untracked accept
ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1468"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1476:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_IN_public_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1476"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_IN_public_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_deny {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1476"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1482:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_IN_public_log; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1482"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_IN_public_log; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_log {
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1482"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1488:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_IN_public_post; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1488"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_IN_public_post; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_post {
tcp dport 80 ct state new,untracked accept
tcp dport 22 ct state new,untracked accept
tcp dport 443 ct state new,untracked accept
tcp dport 143 ct state new,untracked accept
log prefix \"DROPPED: \"
drop
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1488"
$at_failed && at_fn_log_failure
$at_traceon; }







































    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1543:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd -q --runtime-to-permanent "
at_fn_check_prepare_trace "firewall-cmd.at:1543"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd -q --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1543"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1544:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:1544"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1544"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1544:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:1544"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1544"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1548:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=0 service name=\"http\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1548"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --add-rich-rule='rule priority=0 service name="http" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1548"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1549:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-30389\" ip netns exec fwd-test-24455 firewall-cmd --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1549"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-30389" ip netns exec fwd-test-24455 firewall-cmd --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
target: default
icmp-block-inversion: no
interfaces:
sources:
services: dhcpv6-client ssh
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule priority=\"-32768\" family=\"ipv4\" source address=\"10.0.0.0/8\" log
rule priority=\"-100\" port port=\"1111\" protocol=\"tcp\" log
rule priority=\"-10\" port port=\"1111\" protocol=\"tcp\" drop
rule priority=\"-5\" family=\"ipv4\" source address=\"10.10.10.0/24\" accept
rule priority=\"-2\" family=\"ipv4\" source address=\"10.0.0.0/8\" log
rule priority=\"-1\" family=\"ipv4\" source address=\"10.0.0.0/8\" drop
rule service name=\"http\" accept
rule priority=\"1\" service name=\"http\" accept
rule priority=\"10\" service name=\"ssh\" accept
rule priority=\"100\" service name=\"https\" accept
rule priority=\"125\" service name=\"imap\" accept
rule priority=\"126\" log prefix=\"DROPPED: \"
rule priority=\"127\" drop
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1549"
$at_failed && at_fn_log_failure
$at_traceon; }











        if test x"-e '/INVALID_RULE: no element, no source, no destination/d'              -e '/INVALID_RULE: no element, no action/d'              -e '/ERROR: INVALID_PRIORITY: /d'" != x"ignore"; then
            if test -n "-e '/INVALID_RULE: no element, no source, no destination/d'              -e '/INVALID_RULE: no element, no action/d'              -e '/ERROR: INVALID_PRIORITY: /d'"; then
                sed -i -e '/INVALID_RULE: no element, no source, no destination/d'              -e '/INVALID_RULE: no element, no action/d'              -e '/ERROR: INVALID_PRIORITY: /d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:1578" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1578"
            $as_echo "firewall-cmd.at:1578" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1578"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_55
#AT_START_56
at_fn_group_banner 56 'firewall-cmd.at:1582' \
  "rich rules bad" "                                 " 3
at_xfail=no
(
  $as_echo "56. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1582: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1582"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1582"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1582: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1582"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1582"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1582: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1582"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1582"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1582: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1582"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1582"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-24138" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1582: ip netns add fwd-test-24138"
at_fn_check_prepare_trace "firewall-cmd.at:1582"
( $at_check_trace; ip netns add fwd-test-24138
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1582"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:1582" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1582"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1582" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1582"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1582" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1582"










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1589:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6158\" ip netns exec fwd-test-24138 firewall-cmd --add-rich-rule='' "
at_fn_check_prepare_trace "firewall-cmd.at:1589"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewall-cmd --add-rich-rule=''
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1589"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1589:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6158\" ip netns exec fwd-test-24138 firewall-cmd --permanent --add-rich-rule='' "
at_fn_check_prepare_trace "firewall-cmd.at:1589"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewall-cmd --permanent --add-rich-rule=''
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1589"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1590:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6158\" ip netns exec fwd-test-24138 firewall-cmd --add-rich-rule='name=\"dns\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1590"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewall-cmd --add-rich-rule='name="dns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1590"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1590:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6158\" ip netns exec fwd-test-24138 firewall-cmd --permanent --add-rich-rule='name=\"dns\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1590"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewall-cmd --permanent --add-rich-rule='name="dns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1590"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1591:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6158\" ip netns exec fwd-test-24138 firewall-cmd --add-rich-rule='protocol value=\"ah\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:1591"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewall-cmd --add-rich-rule='protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1591"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1591:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6158\" ip netns exec fwd-test-24138 firewall-cmd --permanent --add-rich-rule='protocol value=\"ah\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:1591"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewall-cmd --permanent --add-rich-rule='protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1591"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1592:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6158\" ip netns exec fwd-test-24138 firewall-cmd --add-rich-rule='rule protocol value=\"ah\" reject type=\"icmp-host-prohibited\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1592"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewall-cmd --add-rich-rule='rule protocol value="ah" reject type="icmp-host-prohibited"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1592"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1592:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6158\" ip netns exec fwd-test-24138 firewall-cmd --permanent --add-rich-rule='rule protocol value=\"ah\" reject type=\"icmp-host-prohibited\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1592"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewall-cmd --permanent --add-rich-rule='rule protocol value="ah" reject type="icmp-host-prohibited"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1592"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1593:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6158\" ip netns exec fwd-test-24138 firewall-cmd --add-rich-rule='rule family=\"ipv4\" protocol value=\"ah\" reject type=\"dummy\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1593"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewall-cmd --add-rich-rule='rule family="ipv4" protocol value="ah" reject type="dummy"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1593"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1593:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6158\" ip netns exec fwd-test-24138 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" protocol value=\"ah\" reject type=\"dummy\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1593"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" protocol value="ah" reject type="dummy"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1593"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1594:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6158\" ip netns exec fwd-test-24138 firewall-cmd --add-rich-rule='rule' "
at_fn_check_prepare_trace "firewall-cmd.at:1594"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewall-cmd --add-rich-rule='rule'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1594"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1594:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6158\" ip netns exec fwd-test-24138 firewall-cmd --permanent --add-rich-rule='rule' "
at_fn_check_prepare_trace "firewall-cmd.at:1594"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewall-cmd --permanent --add-rich-rule='rule'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1594"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1595:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6158\" ip netns exec fwd-test-24138 firewall-cmd --add-rich-rule='rule bad_element' "
at_fn_check_prepare_trace "firewall-cmd.at:1595"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewall-cmd --add-rich-rule='rule bad_element'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1595"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1595:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6158\" ip netns exec fwd-test-24138 firewall-cmd --permanent --add-rich-rule='rule bad_element' "
at_fn_check_prepare_trace "firewall-cmd.at:1595"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewall-cmd --permanent --add-rich-rule='rule bad_element'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1595"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1596:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6158\" ip netns exec fwd-test-24138 firewall-cmd --add-rich-rule='rule family=\"ipv5\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1596"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewall-cmd --add-rich-rule='rule family="ipv5"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1596"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1596:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6158\" ip netns exec fwd-test-24138 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv5\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1596"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewall-cmd --permanent --add-rich-rule='rule family="ipv5"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1596"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1597:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6158\" ip netns exec fwd-test-24138 firewall-cmd --add-rich-rule='rule name=\"dns\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1597"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewall-cmd --add-rich-rule='rule name="dns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1597"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1597:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6158\" ip netns exec fwd-test-24138 firewall-cmd --permanent --add-rich-rule='rule name=\"dns\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1597"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewall-cmd --permanent --add-rich-rule='rule name="dns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1597"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1598:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6158\" ip netns exec fwd-test-24138 firewall-cmd --add-rich-rule='rule protocol=\"ah\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1598"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewall-cmd --add-rich-rule='rule protocol="ah" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1598"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1598:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6158\" ip netns exec fwd-test-24138 firewall-cmd --permanent --add-rich-rule='rule protocol=\"ah\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1598"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewall-cmd --permanent --add-rich-rule='rule protocol="ah" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1598"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1599:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6158\" ip netns exec fwd-test-24138 firewall-cmd --add-rich-rule='rule protocol value=\"ah\" accept drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1599"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewall-cmd --add-rich-rule='rule protocol value="ah" accept drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1599"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1599:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6158\" ip netns exec fwd-test-24138 firewall-cmd --permanent --add-rich-rule='rule protocol value=\"ah\" accept drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1599"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewall-cmd --permanent --add-rich-rule='rule protocol value="ah" accept drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1599"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1600:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6158\" ip netns exec fwd-test-24138 firewall-cmd --add-rich-rule='rule service name=\"radius\" port port=\"4011\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:1600"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewall-cmd --add-rich-rule='rule service name="radius" port port="4011" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1600"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1600:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6158\" ip netns exec fwd-test-24138 firewall-cmd --permanent --add-rich-rule='rule service name=\"radius\" port port=\"4011\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:1600"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewall-cmd --permanent --add-rich-rule='rule service name="radius" port port="4011" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1600"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1601:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6158\" ip netns exec fwd-test-24138 firewall-cmd --add-rich-rule='rule service bad_attribute=\"dns\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1601"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewall-cmd --add-rich-rule='rule service bad_attribute="dns"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1601"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1601:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6158\" ip netns exec fwd-test-24138 firewall-cmd --permanent --add-rich-rule='rule service bad_attribute=\"dns\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1601"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewall-cmd --permanent --add-rich-rule='rule service bad_attribute="dns"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1601"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1602:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6158\" ip netns exec fwd-test-24138 firewall-cmd --add-rich-rule='rule protocol value=\"igmp\" log level=\"eror\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1602"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewall-cmd --add-rich-rule='rule protocol value="igmp" log level="eror"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 125 $at_status "$at_srcdir/firewall-cmd.at:1602"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1602:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6158\" ip netns exec fwd-test-24138 firewall-cmd --permanent --add-rich-rule='rule protocol value=\"igmp\" log level=\"eror\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1602"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewall-cmd --permanent --add-rich-rule='rule protocol value="igmp" log level="eror"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 125 $at_status "$at_srcdir/firewall-cmd.at:1602"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1603:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6158\" ip netns exec fwd-test-24138 firewall-cmd --add-rich-rule='family=\"ipv6\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1603"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewall-cmd --add-rich-rule='family="ipv6" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1603"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1603:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6158\" ip netns exec fwd-test-24138 firewall-cmd --permanent --add-rich-rule='family=\"ipv6\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1603"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewall-cmd --permanent --add-rich-rule='family="ipv6" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1603"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1603:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6158\" ip netns exec fwd-test-24138 firewall-cmd --add-rich-rule='rule source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log level=\"info\" limit value=\"1/2m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1603"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewall-cmd --add-rich-rule='rule source address="1:2:3:4:6::" icmp-block name="redirect" log level="info" limit value="1/2m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 207 $at_status "$at_srcdir/firewall-cmd.at:1603"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1603:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6158\" ip netns exec fwd-test-24138 firewall-cmd --permanent --add-rich-rule='rule source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log level=\"info\" limit value=\"1/2m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1603"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewall-cmd --permanent --add-rich-rule='rule source address="1:2:3:4:6::" icmp-block name="redirect" log level="info" limit value="1/2m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 207 $at_status "$at_srcdir/firewall-cmd.at:1603"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1603:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6158\" ip netns exec fwd-test-24138 firewall-cmd --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log level=\"info\" limit value=\"1/2m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1603"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewall-cmd --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log level="info" limit value="1/2m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 123 $at_status "$at_srcdir/firewall-cmd.at:1603"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1603:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6158\" ip netns exec fwd-test-24138 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv6\" source address=\"1:2:3:4:6::\" icmp-block name=\"redirect\" log level=\"info\" limit value=\"1/2m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1603"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewall-cmd --permanent --add-rich-rule='rule family="ipv6" source address="1:2:3:4:6::" icmp-block name="redirect" log level="info" limit value="1/2m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 123 $at_status "$at_srcdir/firewall-cmd.at:1603"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1608:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6158\" ip netns exec fwd-test-24138 firewall-cmd --add-rich-rule='rule protocol value=\"esp\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1608"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewall-cmd --add-rich-rule='rule protocol value="esp"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1608"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1608:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6158\" ip netns exec fwd-test-24138 firewall-cmd --permanent --add-rich-rule='rule protocol value=\"esp\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1608"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewall-cmd --permanent --add-rich-rule='rule protocol value="esp"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1608"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1609:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6158\" ip netns exec fwd-test-24138 firewall-cmd --add-rich-rule='rule family=\"ipv4\" masquerade drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1609"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewall-cmd --add-rich-rule='rule family="ipv4" masquerade drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1609"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1609:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6158\" ip netns exec fwd-test-24138 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" masquerade drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1609"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" masquerade drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1609"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1610:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6158\" ip netns exec fwd-test-24138 firewall-cmd --add-rich-rule='rule family=\"ipv4\" icmp-block name=\"redirect\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1610"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewall-cmd --add-rich-rule='rule family="ipv4" icmp-block name="redirect" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1610"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1610:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6158\" ip netns exec fwd-test-24138 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" icmp-block name=\"redirect\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1610"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" icmp-block name="redirect" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1610"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1611:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6158\" ip netns exec fwd-test-24138 firewall-cmd --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" protocol=\"tcp\" family=\"ipv4\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1611"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewall-cmd --add-rich-rule='rule forward-port port="2222" to-port="22" protocol="tcp" family="ipv4" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1611"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1611:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6158\" ip netns exec fwd-test-24138 firewall-cmd --permanent --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" protocol=\"tcp\" family=\"ipv4\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1611"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6158" ip netns exec fwd-test-24138 firewall-cmd --permanent --add-rich-rule='rule forward-port port="2222" to-port="22" protocol="tcp" family="ipv4" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1611"
$at_failed && at_fn_log_failure
$at_traceon; }











        if test x"-e '/ERROR: INVALID_RULE:/d'               -e '/ERROR: INVALID_LOG_LEVEL: eror/d'               -e '/ERROR: MISSING_FAMILY/d'               -e '/ERROR: INVALID_LIMIT: 1\/2m/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_RULE:/d'               -e '/ERROR: INVALID_LOG_LEVEL: eror/d'               -e '/ERROR: MISSING_FAMILY/d'               -e '/ERROR: INVALID_LIMIT: 1\/2m/d'"; then
                sed -i -e '/ERROR: INVALID_RULE:/d'               -e '/ERROR: INVALID_LOG_LEVEL: eror/d'               -e '/ERROR: MISSING_FAMILY/d'               -e '/ERROR: INVALID_LIMIT: 1\/2m/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:1613" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1613"
            $as_echo "firewall-cmd.at:1613" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1613"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_56
#AT_START_57
at_fn_group_banner 57 'firewall-cmd.at:1618' \
  "config validation" "                              " 3
at_xfail=no
(
  $as_echo "57. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1618: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1618"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1618"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1618: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1618"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1618"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1618: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1618"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1618"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1618: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1618"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1618"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-31281" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1618: ip netns add fwd-test-31281"
at_fn_check_prepare_trace "firewall-cmd.at:1618"
( $at_check_trace; ip netns add fwd-test-31281
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1618"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" ip netns exec fwd-test-31281 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:1618" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1618"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" ip netns exec fwd-test-31281 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1618" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1618"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" ip netns exec fwd-test-31281 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1618" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1618"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1622:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20760\" ip netns exec fwd-test-31281 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1622"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" ip netns exec fwd-test-31281 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1622"
$at_failed && at_fn_log_failure
$at_traceon; }






        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1627: cp ./firewalld.conf ./firewalld.conf.orig"
at_fn_check_prepare_trace "firewall-cmd.at:1627"
( $at_check_trace; cp ./firewalld.conf ./firewalld.conf.orig
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1627"
$at_failed && at_fn_log_failure
$at_traceon; }

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1628: echo \"SomeBogusField=yes\" >> ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1628"
( $at_check_trace; echo "SomeBogusField=yes" >> ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1628"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1629:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20760\" ip netns exec fwd-test-31281 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1629"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" ip netns exec fwd-test-31281 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1629"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1634: cp ./firewalld.conf.orig ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1634"
( $at_check_trace; cp ./firewalld.conf.orig ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1634"
$at_failed && at_fn_log_failure
$at_traceon; }


        cat >./direct.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<direct>
<chain table="filter" ipv="ipv7" chain="foobar"/>
</direct>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1643:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20760\" ip netns exec fwd-test-31281 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1643"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" ip netns exec fwd-test-31281 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1643"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./direct.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<direct>
<rule />
</direct>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1651:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20760\" ip netns exec fwd-test-31281 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1651"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" ip netns exec fwd-test-31281 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1651"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1652: rm ./direct.xml"
at_fn_check_prepare_trace "firewall-cmd.at:1652"
( $at_check_trace; rm ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1652"
$at_failed && at_fn_log_failure
$at_traceon; }


        cat >./lockdown-whitelist.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<whitelist>
    <user uid="666"/>
</whitelist>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1661:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20760\" ip netns exec fwd-test-31281 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1661"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" ip netns exec fwd-test-31281 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1661"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./lockdown-whitelist.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<whitelist>
    <uid id="666"/>
</whitelist>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1669:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20760\" ip netns exec fwd-test-31281 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1669"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" ip netns exec fwd-test-31281 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1669"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./lockdown-whitelist.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<whitelist>
    <group name="foobar" />
</whitelist>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1677:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20760\" ip netns exec fwd-test-31281 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1677"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" ip netns exec fwd-test-31281 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1677"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1678: rm ./lockdown-whitelist.xml"
at_fn_check_prepare_trace "firewall-cmd.at:1678"
( $at_check_trace; rm ./lockdown-whitelist.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1678"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1681: mkdir -p ./ipsets"
at_fn_check_prepare_trace "firewall-cmd.at:1681"
( $at_check_trace; mkdir -p ./ipsets
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1681"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./ipsets/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<ipset type="hash:mac">
  <entry>12:34:56:78:90</entry>
</ipset>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1688:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20760\" ip netns exec fwd-test-31281 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1688"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" ip netns exec fwd-test-31281 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1688"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./ipsets/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<ipset type="hash:mac">
  <entry bogus_attr="bogus">12:34:56:78:90:ab</entry>
</ipset>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1700:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20760\" ip netns exec fwd-test-31281 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1700"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" ip netns exec fwd-test-31281 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1700"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./ipsets/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<ipset type="hash:ip,bogus">
</ipset>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1707:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20760\" ip netns exec fwd-test-31281 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1707"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" ip netns exec fwd-test-31281 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 119 $at_status "$at_srcdir/firewall-cmd.at:1707"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1708: rm ./ipsets/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:1708"
( $at_check_trace; rm ./ipsets/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1708"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1711: mkdir -p ./helpers"
at_fn_check_prepare_trace "firewall-cmd.at:1711"
( $at_check_trace; mkdir -p ./helpers
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1711"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./helpers/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<helper>
</helper>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1717:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20760\" ip netns exec fwd-test-31281 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1717"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" ip netns exec fwd-test-31281 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1717"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./helpers/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<helper family="ipv7" module="nf_conntrack_ftp">
</helper>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1724:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20760\" ip netns exec fwd-test-31281 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1724"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" ip netns exec fwd-test-31281 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1724"
$at_failed && at_fn_log_failure
$at_traceon; }








    cat >./helpers/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<helper family="ipv6" module="nf_conntrack_ftp">
<port protocol="aoeui" port="666" />
</helper>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1726:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20760\" ip netns exec fwd-test-31281 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1726"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" ip netns exec fwd-test-31281 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:1726"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1735: rm ./helpers/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:1735"
( $at_check_trace; rm ./helpers/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1735"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1738: mkdir -p ./icmptypes"
at_fn_check_prepare_trace "firewall-cmd.at:1738"
( $at_check_trace; mkdir -p ./icmptypes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1738"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./icmptypes/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<bad_element />
<icmptype>
</icmptype>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1745:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20760\" ip netns exec fwd-test-31281 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1745"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" ip netns exec fwd-test-31281 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1745"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./icmptypes/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<icmptype>
<destination unexpected_attr="foobar" />
</icmptype>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1753:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20760\" ip netns exec fwd-test-31281 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1753"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" ip netns exec fwd-test-31281 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1753"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1754: rm ./icmptypes/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:1754"
( $at_check_trace; rm ./icmptypes/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1754"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1757: mkdir -p ./services"
at_fn_check_prepare_trace "firewall-cmd.at:1757"
( $at_check_trace; mkdir -p ./services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1757"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<protocol value="aoeui" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1764:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20760\" ip netns exec fwd-test-31281 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1764"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" ip netns exec fwd-test-31281 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:1764"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<protocol bad_attr="foo" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1772:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20760\" ip netns exec fwd-test-31281 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1772"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" ip netns exec fwd-test-31281 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1772"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<bad_element />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1780:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20760\" ip netns exec fwd-test-31281 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1780"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" ip netns exec fwd-test-31281 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1780"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<module module="bad_attr" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1788:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20760\" ip netns exec fwd-test-31281 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1788"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" ip netns exec fwd-test-31281 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1788"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<port protocol="aoeu" port="666" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1796:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20760\" ip netns exec fwd-test-31281 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1796"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" ip netns exec fwd-test-31281 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:1796"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<port protocol="tcp" port="ssssssh" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1804:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20760\" ip netns exec fwd-test-31281 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1804"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" ip netns exec fwd-test-31281 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:1804"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<port protocol="tcp" port="22" />
<source-port protocol="tcp" port="sssssh" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1813:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20760\" ip netns exec fwd-test-31281 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1813"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" ip netns exec fwd-test-31281 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:1813"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<destination ipv4="224.0.0.1" ipv7="1234" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1821:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20760\" ip netns exec fwd-test-31281 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1821"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" ip netns exec fwd-test-31281 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1821"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1822: rm ./services/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:1822"
( $at_check_trace; rm ./services/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1822"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1825: mkdir -p ./zones"
at_fn_check_prepare_trace "firewall-cmd.at:1825"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1825"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1829:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20760\" ip netns exec fwd-test-31281 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1829"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" ip netns exec fwd-test-31281 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/firewall-cmd.at:1829"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<service name="bogus_service_name" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1837:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20760\" ip netns exec fwd-test-31281 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1837"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" ip netns exec fwd-test-31281 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/firewall-cmd.at:1837"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<port protocol="ipv4" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1845:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20760\" ip netns exec fwd-test-31281 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1845"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" ip netns exec fwd-test-31281 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1845"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<protocol value="thisdoesnotexist" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1853:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20760\" ip netns exec fwd-test-31281 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1853"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" ip netns exec fwd-test-31281 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:1853"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<icmp-block invalid_attr=""/>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1861:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20760\" ip netns exec fwd-test-31281 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1861"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" ip netns exec fwd-test-31281 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1861"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<icmp-type />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1869:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20760\" ip netns exec fwd-test-31281 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1869"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" ip netns exec fwd-test-31281 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1869"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<masquerade value="true" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1877:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20760\" ip netns exec fwd-test-31281 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1877"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" ip netns exec fwd-test-31281 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1877"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<forward-port port="666" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1885:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20760\" ip netns exec fwd-test-31281 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1885"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" ip netns exec fwd-test-31281 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1885"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<forward-port protocol="sctppp" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1893:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20760\" ip netns exec fwd-test-31281 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1893"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" ip netns exec fwd-test-31281 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1893"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<source-port port="-1" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1901:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20760\" ip netns exec fwd-test-31281 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1901"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" ip netns exec fwd-test-31281 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1901"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<interface />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1909:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20760\" ip netns exec fwd-test-31281 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1909"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" ip netns exec fwd-test-31281 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1909"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<source />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1917:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20760\" ip netns exec fwd-test-31281 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1917"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" ip netns exec fwd-test-31281 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1917"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule>
<source address="10.0.0.1/24" />
<limit />
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1932:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20760\" ip netns exec fwd-test-31281 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1932"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" ip netns exec fwd-test-31281 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1932"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule family="ipv4">
<source address="10.0.0.1/24" />
<accept>
<limit value="none" />
</accept>
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1945:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20760\" ip netns exec fwd-test-31281 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1945"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" ip netns exec fwd-test-31281 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1945"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule>
<source address="10.0.0.1/24" />
<log level="super_critical" />
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1960:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20760\" ip netns exec fwd-test-31281 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1960"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" ip netns exec fwd-test-31281 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1960"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule family="ipv4">
<source address="10.0.0.1/24" />
<audit prefix="foobar" />
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1975:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20760\" ip netns exec fwd-test-31281 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1975"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" ip netns exec fwd-test-31281 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1975"
$at_failed && at_fn_log_failure
$at_traceon; }








    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule family="ipv6">
<source address="10.0.0.1/24" />
<accept />
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1977:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20760\" ip netns exec fwd-test-31281 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1977"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20760" ip netns exec fwd-test-31281 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1977"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1993: rm ./zones/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:1993"
( $at_check_trace; rm ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1993"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"-e '/ERROR:/d'              -e '/WARNING:/d'" != x"ignore"; then
            if test -n "-e '/ERROR:/d'              -e '/WARNING:/d'"; then
                sed -i -e '/ERROR:/d'              -e '/WARNING:/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:1995" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1995"
            $as_echo "firewall-cmd.at:1995" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1995"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_57
#AT_START_58
at_fn_group_banner 58 'rhbz1514043.at:1' \
  "--set-log-denied does not zero config" "          " 4
at_xfail=no
(
  $as_echo "58. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1514043.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1514043.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1514043.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1514043.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-4186" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1: ip netns add fwd-test-4186"
at_fn_check_prepare_trace "rhbz1514043.at:1"
( $at_check_trace; ip netns add fwd-test-4186
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12503" ip netns exec fwd-test-4186 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-12503" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rhbz1514043.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1514043.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12503" ip netns exec fwd-test-4186 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1514043.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1514043.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12503" ip netns exec fwd-test-4186 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1514043.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1514043.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12503\" ip netns exec fwd-test-4186 firewall-cmd -q --set-log-denied=all "
at_fn_check_prepare_trace "rhbz1514043.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12503" ip netns exec fwd-test-4186 firewall-cmd -q --set-log-denied=all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12503\" ip netns exec fwd-test-4186 firewall-cmd -q --permanent --zone=public --add-service=samba "
at_fn_check_prepare_trace "rhbz1514043.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12503" ip netns exec fwd-test-4186 firewall-cmd -q --permanent --zone=public --add-service=samba
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12503\" ip netns exec fwd-test-4186 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1514043.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12503" ip netns exec fwd-test-4186 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12503\" ip netns exec fwd-test-4186 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1514043.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12503" ip netns exec fwd-test-4186 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12503\" ip netns exec fwd-test-4186 firewall-cmd --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^services "
at_fn_check_prepare_notrace 'a shell pipeline' "rhbz1514043.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12503" ip netns exec fwd-test-4186 firewall-cmd --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "services: dhcpv6-client samba ssh
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12503\" ip netns exec fwd-test-4186     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_INPUT; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1514043.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12503" ip netns exec fwd-test-4186     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_INPUT; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT {
ct state established,related accept
ct status dnat accept
iifname \"lo\" accept
jump filter_INPUT_ZONES
ct state invalid log prefix \"STATE_INVALID_DROP: \"
ct state invalid drop
log prefix \"FINAL_REJECT: \"
reject with icmpx type admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12503\" ip netns exec fwd-test-4186     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_FORWARD; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1514043.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12503" ip netns exec fwd-test-4186     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_FORWARD; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD {
ct state established,related accept
ct status dnat accept
iifname \"lo\" accept
ip6 daddr { ::/96, ::ffff:0.0.0.0/96, 2002::/24, 2002:a00::/24, 2002:7f00::/24, 2002:a9fe::/32, 2002:ac10::/28, 2002:c0a8::/32, 2002:e000::/19 } log prefix \"RFC3964_IPv4_REJECT: \" reject with icmpv6 type addr-unreachable
jump filter_FORWARD_IN_ZONES
jump filter_FORWARD_OUT_ZONES
ct state invalid log prefix \"STATE_INVALID_DROP: \"
ct state invalid drop
log prefix \"FINAL_REJECT: \"
reject with icmpx type admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }


























        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "rhbz1514043.at:87" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1514043.at:87"
            $as_echo "rhbz1514043.at:87" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1514043.at:87"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_58
#AT_START_59
at_fn_group_banner 59 'rhbz1498923.at:1' \
  "invalid direct rule causes reload error" "        " 4
at_xfail=no
(
  $as_echo "59. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1498923.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1498923.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1498923.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-23712" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1: ip netns add fwd-test-23712"
at_fn_check_prepare_trace "rhbz1498923.at:1"
( $at_check_trace; ip netns add fwd-test-23712
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11499" ip netns exec fwd-test-23712 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-11499" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rhbz1498923.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1498923.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11499" ip netns exec fwd-test-23712 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1498923.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1498923.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11499" ip netns exec fwd-test-23712 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1498923.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1498923.at:1"





{ set +x
$as_echo "$at_srcdir/rhbz1498923.at:5: sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1498923.at:5"
( $at_check_trace; sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11499\" ip netns exec fwd-test-23712 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1498923.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11499" ip netns exec fwd-test-23712 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11499\" ip netns exec fwd-test-23712 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1498923.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11499" ip netns exec fwd-test-23712 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11499\" ip netns exec fwd-test-23712 firewall-cmd -q --zone=public --add-interface=foobar0 "
at_fn_check_prepare_trace "rhbz1498923.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11499" ip netns exec fwd-test-23712 firewall-cmd -q --zone=public --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11499\" ip netns exec fwd-test-23712 firewall-cmd --get-zone-of-interface=foobar0 "
at_fn_check_prepare_trace "rhbz1498923.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11499" ip netns exec fwd-test-23712 firewall-cmd --get-zone-of-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11499\" ip netns exec fwd-test-23712 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1498923.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11499" ip netns exec fwd-test-23712 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11499\" ip netns exec fwd-test-23712 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1498923.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11499" ip netns exec fwd-test-23712 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11499\" ip netns exec fwd-test-23712 firewall-cmd --get-zone-of-interface=foobar0 "
at_fn_check_prepare_trace "rhbz1498923.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11499" ip netns exec fwd-test-23712 firewall-cmd --get-zone-of-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "no zone
" | \
  $at_diff - "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 2 $at_status "$at_srcdir/rhbz1498923.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }





{ set +x
$as_echo "$at_srcdir/rhbz1498923.at:17: sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1498923.at:17"
( $at_check_trace; sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11499\" ip netns exec fwd-test-23712 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1498923.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11499" ip netns exec fwd-test-23712 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11499\" ip netns exec fwd-test-23712 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1498923.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11499" ip netns exec fwd-test-23712 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11499\" ip netns exec fwd-test-23712 firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 0 -p tcp --dport 8080 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1498923.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11499" ip netns exec fwd-test-23712 firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 0 -p tcp --dport 8080 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11499\" ip netns exec fwd-test-23712 firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 1 --a-bogus-flag "
at_fn_check_prepare_trace "rhbz1498923.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11499" ip netns exec fwd-test-23712 firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 1 --a-bogus-flag
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11499\" ip netns exec fwd-test-23712 firewall-cmd -q --zone=public --add-interface=foobar0 "
at_fn_check_prepare_trace "rhbz1498923.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11499" ip netns exec fwd-test-23712 firewall-cmd -q --zone=public --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11499\" ip netns exec fwd-test-23712 firewall-cmd -q --direct --direct --add-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT "
at_fn_check_prepare_trace "rhbz1498923.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11499" ip netns exec fwd-test-23712 firewall-cmd -q --direct --direct --add-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11499\" ip netns exec fwd-test-23712 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1498923.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11499" ip netns exec fwd-test-23712 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1498923.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11499\" ip netns exec fwd-test-23712 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1498923.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11499" ip netns exec fwd-test-23712 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 251 $at_status "$at_srcdir/rhbz1498923.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11499\" ip netns exec fwd-test-23712 firewall-cmd --state "
at_fn_check_prepare_trace "rhbz1498923.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11499" ip netns exec fwd-test-23712 firewall-cmd --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "failed
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 251 $at_status "$at_srcdir/rhbz1498923.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11499\" ip netns exec fwd-test-23712 firewall-cmd --get-zone-of-interface=foobar0 "
at_fn_check_prepare_trace "rhbz1498923.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11499" ip netns exec fwd-test-23712 firewall-cmd --get-zone-of-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11499\" ip netns exec fwd-test-23712 firewall-cmd -q --direct --direct --query-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT "
at_fn_check_prepare_trace "rhbz1498923.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11499" ip netns exec fwd-test-23712 firewall-cmd -q --direct --direct --query-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11499\" ip netns exec fwd-test-23712 firewall-cmd -q --permanent --direct --remove-rule ipv4 filter INPUT 1 --a-bogus-flag "
at_fn_check_prepare_trace "rhbz1498923.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11499" ip netns exec fwd-test-23712 firewall-cmd -q --permanent --direct --remove-rule ipv4 filter INPUT 1 --a-bogus-flag
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11499\" ip netns exec fwd-test-23712 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1498923.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11499" ip netns exec fwd-test-23712 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11499\" ip netns exec fwd-test-23712 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1498923.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11499" ip netns exec fwd-test-23712 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11499\" ip netns exec fwd-test-23712 firewall-cmd --get-zone-of-interface=foobar0 "
at_fn_check_prepare_trace "rhbz1498923.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11499" ip netns exec fwd-test-23712 firewall-cmd --get-zone-of-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11499\" ip netns exec fwd-test-23712 firewall-cmd -q --direct --direct --query-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT "
at_fn_check_prepare_trace "rhbz1498923.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11499" ip netns exec fwd-test-23712 firewall-cmd -q --direct --direct --query-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"-e '/.*a-bogus-flag.*/d'" != x"ignore"; then
            if test -n "-e '/.*a-bogus-flag.*/d'"; then
                sed -i -e '/.*a-bogus-flag.*/d' ./firewalld.log
            fi
            $as_echo "rhbz1498923.at:46" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1498923.at:46"
            $as_echo "rhbz1498923.at:46" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1498923.at:46"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_59
#AT_START_60
at_fn_group_banner 60 'pr181.at:1' \
  "combined zones name length check" "               " 4
at_xfail=no
(
  $as_echo "60. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/pr181.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr181.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/pr181.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "pr181.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/pr181.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "pr181.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/pr181.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "pr181.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-11707" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/pr181.at:1: ip netns add fwd-test-11707"
at_fn_check_prepare_trace "pr181.at:1"
( $at_check_trace; ip netns add fwd-test-11707
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20008" ip netns exec fwd-test-11707 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-20008" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "pr181.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/pr181.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20008" ip netns exec fwd-test-11707 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "pr181.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/pr181.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20008" ip netns exec fwd-test-11707 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "pr181.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/pr181.at:1"





{ set +x
$as_echo "$at_srcdir/pr181.at:4: mkdir -p ./zones/foobar"
at_fn_check_prepare_trace "pr181.at:4"
( $at_check_trace; mkdir -p ./zones/foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/pr181.at:6: echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:6"
( $at_check_trace; echo '<?xml version="1.0" encoding="utf-8"?>' > ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:7: echo '<zone>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:7"
( $at_check_trace; echo '<zone>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:8: echo '<short>foobar</short>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:8"
( $at_check_trace; echo '<short>foobar</short>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:9: echo '<description>foobar desc</description>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:9"
( $at_check_trace; echo '<description>foobar desc</description>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:10: echo '<service name=\"ssh\"/>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:10"
( $at_check_trace; echo '<service name="ssh"/>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:11: echo '</zone>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:11"
( $at_check_trace; echo '</zone>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/pr181.at:13: echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:13"
( $at_check_trace; echo '<?xml version="1.0" encoding="utf-8"?>' > ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:14: echo '<zone>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:14"
( $at_check_trace; echo '<zone>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:15: echo '<short>foobar</short>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:15"
( $at_check_trace; echo '<short>foobar</short>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:16: echo '<description>foobar desc</description>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:16"
( $at_check_trace; echo '<description>foobar desc</description>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:17: echo '<service name=\"http\"/>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:17"
( $at_check_trace; echo '<service name="http"/>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:18: echo '</zone>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:18"
( $at_check_trace; echo '</zone>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/pr181.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20008\" ip netns exec fwd-test-11707 firewall-cmd -q --reload "
at_fn_check_prepare_trace "pr181.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20008" ip netns exec fwd-test-11707 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/pr181.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20008\" ip netns exec fwd-test-11707 firewall-cmd -q --state "
at_fn_check_prepare_trace "pr181.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20008" ip netns exec fwd-test-11707 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/pr181.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20008\" ip netns exec fwd-test-11707 firewall-cmd --zone=foobar --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^services "
at_fn_check_prepare_notrace 'a shell pipeline' "pr181.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20008" ip netns exec fwd-test-11707 firewall-cmd --zone=foobar --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "services: http ssh
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "pr181.at:24" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/pr181.at:24"
            $as_echo "pr181.at:24" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/pr181.at:24"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_60
#AT_START_61
at_fn_group_banner 61 'gh287.at:1' \
  "ICMP block inversion" "                           " 4
at_xfail=no
(
  $as_echo "61. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh287.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh287.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh287.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh287.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/gh287.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh287.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/gh287.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh287.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-28136" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/gh287.at:1: ip netns add fwd-test-28136"
at_fn_check_prepare_trace "gh287.at:1"
( $at_check_trace; ip netns add fwd-test-28136
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-28136 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "gh287.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh287.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-28136 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh287.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh287.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-28136 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh287.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh287.at:1"





{ set +x
$as_echo "$at_srcdir/gh287.at:4: mkdir -p ./zones"
at_fn_check_prepare_trace "gh287.at:4"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:5: echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:5"
( $at_check_trace; echo '<?xml version="1.0" encoding="utf-8"?>' > ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:6: echo '<zone>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:6"
( $at_check_trace; echo '<zone>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:7: echo '<short>foobar</short>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:7"
( $at_check_trace; echo '<short>foobar</short>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:8: echo '<description>foobar desc</description>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:8"
( $at_check_trace; echo '<description>foobar desc</description>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:9: echo '<service name=\"http\"/>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:9"
( $at_check_trace; echo '<service name="http"/>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:10: echo '<source address=\"172.16.0.0/12\" />' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:10"
( $at_check_trace; echo '<source address="172.16.0.0/12" />' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:11: echo '<icmp-block-inversion />' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:11"
( $at_check_trace; echo '<icmp-block-inversion />' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:12: echo '</zone>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:12"
( $at_check_trace; echo '</zone>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh287.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29669\" ip netns exec fwd-test-28136 firewall-cmd -q --reload "
at_fn_check_prepare_trace "gh287.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-28136 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh287.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29669\" ip netns exec fwd-test-28136 firewall-cmd -q --state "
at_fn_check_prepare_trace "gh287.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-28136 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }











        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "gh287.at:15" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh287.at:15"
            $as_echo "gh287.at:15" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh287.at:15"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_61
#AT_START_62
at_fn_group_banner 62 'individual_calls.at:1' \
  "individual calls" "                               " 4
at_xfail=no
(
  $as_echo "62. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/individual_calls.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "individual_calls.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/individual_calls.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "individual_calls.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/individual_calls.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "individual_calls.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/individual_calls.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "individual_calls.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-6660" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/individual_calls.at:1: ip netns add fwd-test-6660"
at_fn_check_prepare_trace "individual_calls.at:1"
( $at_check_trace; ip netns add fwd-test-6660
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16259" ip netns exec fwd-test-6660 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-16259" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "individual_calls.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/individual_calls.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16259" ip netns exec fwd-test-6660 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "individual_calls.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/individual_calls.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16259" ip netns exec fwd-test-6660 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "individual_calls.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/individual_calls.at:1"





{ set +x
$as_echo "$at_srcdir/individual_calls.at:4: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "individual_calls.at:4"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/individual_calls.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16259\" ip netns exec fwd-test-6660 firewall-cmd -q --reload "
at_fn_check_prepare_trace "individual_calls.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16259" ip netns exec fwd-test-6660 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/individual_calls.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16259\" ip netns exec fwd-test-6660 firewall-cmd -q --state "
at_fn_check_prepare_trace "individual_calls.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16259" ip netns exec fwd-test-6660 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }












        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "individual_calls.at:7" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/individual_calls.at:7"
            $as_echo "individual_calls.at:7" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/individual_calls.at:7"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_62
#AT_START_63
at_fn_group_banner 63 'rhbz1534571.at:3' \
  "rule deduplication" "                             " 4
at_xfail=no
(
  $as_echo "63. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:3"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1534571.at:3"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1534571.at:3"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1534571.at:3"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-708" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3: ip netns add fwd-test-708"
at_fn_check_prepare_trace "rhbz1534571.at:3"
( $at_check_trace; ip netns add fwd-test-708
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14663" ip netns exec fwd-test-708 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-14663" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rhbz1534571.at:3" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1534571.at:3"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14663" ip netns exec fwd-test-708 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1534571.at:3" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1534571.at:3"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14663" ip netns exec fwd-test-708 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1534571.at:3" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1534571.at:3"








    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14663\" ip netns exec fwd-test-708 firewall-cmd -q --add-service nfs --add-service nfs3 "
at_fn_check_prepare_trace "rhbz1534571.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14663" ip netns exec fwd-test-708 firewall-cmd -q --add-service nfs --add-service nfs3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14663\" ip netns exec fwd-test-708 firewall-cmd -q --remove-service nfs3 "
at_fn_check_prepare_trace "rhbz1534571.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14663" ip netns exec fwd-test-708 firewall-cmd -q --remove-service nfs3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14663\" ip netns exec fwd-test-708 firewall-cmd -q --remove-service nfs "
at_fn_check_prepare_trace "rhbz1534571.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14663" ip netns exec fwd-test-708 firewall-cmd -q --remove-service nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14663\" ip netns exec fwd-test-708 firewall-cmd -q --permanent --add-service nfs --add-service nfs3 "
at_fn_check_prepare_trace "rhbz1534571.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14663" ip netns exec fwd-test-708 firewall-cmd -q --permanent --add-service nfs --add-service nfs3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14663\" ip netns exec fwd-test-708 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1534571.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14663" ip netns exec fwd-test-708 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14663\" ip netns exec fwd-test-708 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1534571.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14663" ip netns exec fwd-test-708 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14663\" ip netns exec fwd-test-708 firewall-cmd -q --remove-service nfs3 "
at_fn_check_prepare_trace "rhbz1534571.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14663" ip netns exec fwd-test-708 firewall-cmd -q --remove-service nfs3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14663\" ip netns exec fwd-test-708 firewall-cmd -q --remove-service nfs "
at_fn_check_prepare_trace "rhbz1534571.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14663" ip netns exec fwd-test-708 firewall-cmd -q --remove-service nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }











        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "rhbz1534571.at:17" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1534571.at:17"
            $as_echo "rhbz1534571.at:17" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1534571.at:17"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_63
#AT_START_64
at_fn_group_banner 64 'gh290.at:1' \
  "invalid syntax in xml files" "                    " 4
at_xfail=no
(
  $as_echo "64. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh290.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh290.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh290.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh290.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/gh290.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh290.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/gh290.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh290.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-15158" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/gh290.at:1: ip netns add fwd-test-15158"
at_fn_check_prepare_trace "gh290.at:1"
( $at_check_trace; ip netns add fwd-test-15158
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5538" ip netns exec fwd-test-15158 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-5538" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "gh290.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh290.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5538" ip netns exec fwd-test-15158 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh290.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh290.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5538" ip netns exec fwd-test-15158 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh290.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh290.at:1"





{ set +x
$as_echo "$at_srcdir/gh290.at:5: mkdir -p ./zones"
at_fn_check_prepare_trace "gh290.at:5"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:6: echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./direct.xml"
at_fn_check_prepare_trace "gh290.at:6"
( $at_check_trace; echo '<?xml version="1.0" encoding="utf-8"?>' > ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:7: echo '<direct>' >> ./direct.xml"
at_fn_check_prepare_trace "gh290.at:7"
( $at_check_trace; echo '<direct>' >> ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:8: echo '<chain table=\"filter\" chain=\"some_chain_name\" ipv=\"ipv4\"/>' >> ./direct.xml"
at_fn_check_prepare_trace "gh290.at:8"
( $at_check_trace; echo '<chain table="filter" chain="some_chain_name" ipv="ipv4"/>' >> ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:9: echo '<rule table=\"filter\" chain=\"some_chain_name\" ipv=\"ipv4\" priority=\"1\">--destination 127.0.0.1 --jump RETURN' >> ./direct.xml"
at_fn_check_prepare_trace "gh290.at:9"
( $at_check_trace; echo '<rule table="filter" chain="some_chain_name" ipv="ipv4" priority="1">--destination 127.0.0.1 --jump RETURN' >> ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:11: echo '</direct>' >> ./direct.xml"
at_fn_check_prepare_trace "gh290.at:11"
( $at_check_trace; echo '</direct>' >> ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/gh290.at:14: mkdir -p ./zones"
at_fn_check_prepare_trace "gh290.at:14"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:15: echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:15"
( $at_check_trace; echo '<?xml version="1.0" encoding="utf-8"?>' > ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:16: echo '<zone>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:16"
( $at_check_trace; echo '<zone>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:17: echo '<short>foobar</short>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:17"
( $at_check_trace; echo '<short>foobar</short>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:19: echo '<port port=\"22\" />' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:19"
( $at_check_trace; echo '<port port="22" />' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:20: echo '<service name=\"http\"/>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:20"
( $at_check_trace; echo '<service name="http"/>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:21: echo '</zone>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:21"
( $at_check_trace; echo '</zone>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }




    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5538" ip netns exec fwd-test-15158 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh290.at:23" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh290.at:23"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5538" ip netns exec fwd-test-15158 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh290.at:23" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh290.at:23"



    { set +x
$as_echo "$at_srcdir/gh290.at:24: grep \"ERROR:.*mismatched tag\" ./firewalld.log"
at_fn_check_prepare_trace "gh290.at:24"
( $at_check_trace; grep "ERROR:.*mismatched tag" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh290.at:25: grep \"ERROR:.*Missing attribute protocol for port\" ./firewalld.log"
at_fn_check_prepare_trace "gh290.at:25"
( $at_check_trace; grep "ERROR:.*Missing attribute protocol for port" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"-e '/ERROR:.*mismatched tag.*/d'               -e '/ERROR:.*Missing attribute protocol for port.*/d'" != x"ignore"; then
            if test -n "-e '/ERROR:.*mismatched tag.*/d'               -e '/ERROR:.*Missing attribute protocol for port.*/d'"; then
                sed -i -e '/ERROR:.*mismatched tag.*/d'               -e '/ERROR:.*Missing attribute protocol for port.*/d' ./firewalld.log
            fi
            $as_echo "gh290.at:26" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh290.at:26"
            $as_echo "gh290.at:26" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh290.at:26"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_64
#AT_START_65
at_fn_group_banner 65 'icmp_block_in_forward_chain.at:1' \
  "ICMP block present FORWARD chain" "               " 4
at_xfail=no
(
  $as_echo "65. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_block_in_forward_chain.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "icmp_block_in_forward_chain.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "icmp_block_in_forward_chain.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "icmp_block_in_forward_chain.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-17938" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1: ip netns add fwd-test-17938"
at_fn_check_prepare_trace "icmp_block_in_forward_chain.at:1"
( $at_check_trace; ip netns add fwd-test-17938
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14353" ip netns exec fwd-test-17938 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-14353" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "icmp_block_in_forward_chain.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/icmp_block_in_forward_chain.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14353" ip netns exec fwd-test-17938 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "icmp_block_in_forward_chain.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/icmp_block_in_forward_chain.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14353" ip netns exec fwd-test-17938 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "icmp_block_in_forward_chain.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/icmp_block_in_forward_chain.at:1"








    { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14353\" ip netns exec fwd-test-17938 firewall-cmd -q --zone=public --add-icmp-block=host-prohibited "
at_fn_check_prepare_trace "icmp_block_in_forward_chain.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14353" ip netns exec fwd-test-17938 firewall-cmd -q --zone=public --add-icmp-block=host-prohibited
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14353\" ip netns exec fwd-test-17938     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_IN_public_deny | sed -e 's/icmp code 10/icmp code host-prohibited/'; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "icmp_block_in_forward_chain.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14353" ip netns exec fwd-test-17938     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_IN_public_deny | sed -e 's/icmp code 10/icmp code host-prohibited/'; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_deny {
icmp type destination-unreachable icmp code host-prohibited reject with icmp type admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14353\" ip netns exec fwd-test-17938     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_FWDI_public_deny | sed -e 's/icmp code 10/icmp code host-prohibited/'; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "icmp_block_in_forward_chain.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14353" ip netns exec fwd-test-17938     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_FWDI_public_deny | sed -e 's/icmp code 10/icmp code host-prohibited/'; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FWDI_public_deny {
icmp type destination-unreachable icmp code host-prohibited reject with icmp type admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }




















        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "icmp_block_in_forward_chain.at:28" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/icmp_block_in_forward_chain.at:28"
            $as_echo "icmp_block_in_forward_chain.at:28" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/icmp_block_in_forward_chain.at:28"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_65
#AT_START_66
at_fn_group_banner 66 'pr323.at:1' \
  "GRE proto helper" "                               " 4
at_xfail=no
(
  $as_echo "66. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/pr323.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr323.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/pr323.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "pr323.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/pr323.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "pr323.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/pr323.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "pr323.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-5255" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/pr323.at:1: ip netns add fwd-test-5255"
at_fn_check_prepare_trace "pr323.at:1"
( $at_check_trace; ip netns add fwd-test-5255
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26204" ip netns exec fwd-test-5255 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-26204" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "pr323.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/pr323.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26204" ip netns exec fwd-test-5255 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "pr323.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/pr323.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26204" ip netns exec fwd-test-5255 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "pr323.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/pr323.at:1"






    $as_echo "pr323.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26204" ip netns exec fwd-test-5255 modinfo nf_conntrack_proto_gre ) \
  && at_fn_check_skip 77 "$at_srcdir/pr323.at:4"





    { set +x
$as_echo "$at_srcdir/pr323.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26204\" ip netns exec fwd-test-5255 firewall-cmd -q --add-protocol=gre "
at_fn_check_prepare_trace "pr323.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26204" ip netns exec fwd-test-5255 firewall-cmd -q --add-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/pr323.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26204\" ip netns exec fwd-test-5255 firewall-cmd -q --remove-protocol=gre "
at_fn_check_prepare_trace "pr323.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26204" ip netns exec fwd-test-5255 firewall-cmd -q --remove-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/pr323.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26204\" ip netns exec fwd-test-5255 firewall-cmd -q --add-service=gre "
at_fn_check_prepare_trace "pr323.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26204" ip netns exec fwd-test-5255 firewall-cmd -q --add-service=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/pr323.at:10: lsmod | grep nf_conntrack_proto_gre"
at_fn_check_prepare_notrace 'a shell pipeline' "pr323.at:10"
( $at_check_trace; lsmod | grep nf_conntrack_proto_gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "pr323.at:12" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/pr323.at:12"
            $as_echo "pr323.at:12" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/pr323.at:12"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_66
#AT_START_67
at_fn_group_banner 67 'rhbz1506742.at:1' \
  "ipset with timeout" "                             " 4
at_xfail=no
(
  $as_echo "67. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1506742.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1506742.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1506742.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-27292" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1: ip netns add fwd-test-27292"
at_fn_check_prepare_trace "rhbz1506742.at:1"
( $at_check_trace; ip netns add fwd-test-27292
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26006" ip netns exec fwd-test-27292 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-26006" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rhbz1506742.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1506742.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26006" ip netns exec fwd-test-27292 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1506742.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1506742.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26006" ip netns exec fwd-test-27292 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1506742.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1506742.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26006\" ip netns exec fwd-test-27292 nft add table inet firewalld_check_ipset "
at_fn_check_prepare_trace "rhbz1506742.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26006" ip netns exec fwd-test-27292 nft add table inet firewalld_check_ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26006\" ip netns exec fwd-test-27292 nft add set inet firewalld_check_ipset foobar { type ipv4_addr \\; } "
at_fn_check_prepare_trace "rhbz1506742.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26006" ip netns exec fwd-test-27292 nft add set inet firewalld_check_ipset foobar { type ipv4_addr \; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }


        $as_echo "rhbz1506742.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26006" ip netns exec fwd-test-27292 nft flush set inet firewalld_check_ipset foobar >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/rhbz1506742.at:4"

    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26006\" ip netns exec fwd-test-27292 nft delete table inet firewalld_check_ipset "
at_fn_check_prepare_trace "rhbz1506742.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26006" ip netns exec fwd-test-27292 nft delete table inet firewalld_check_ipset
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26006\" ip netns exec fwd-test-27292 firewall-cmd -q --permanent --new-ipset=foobar --type=hash:ip --option=maxelem=1000000 --option=family=inet --option=hashsize=4096 --option=timeout=600 "
at_fn_check_prepare_trace "rhbz1506742.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26006" ip netns exec fwd-test-27292 firewall-cmd -q --permanent --new-ipset=foobar --type=hash:ip --option=maxelem=1000000 --option=family=inet --option=hashsize=4096 --option=timeout=600
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26006\" ip netns exec fwd-test-27292 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1506742.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26006" ip netns exec fwd-test-27292 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26006\" ip netns exec fwd-test-27292 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1506742.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26006" ip netns exec fwd-test-27292 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26006\" ip netns exec fwd-test-27292 firewall-cmd --permanent --ipset=foobar --add-entry=1.2.3.4 "
at_fn_check_prepare_trace "rhbz1506742.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26006" ip netns exec fwd-test-27292 firewall-cmd --permanent --ipset=foobar --add-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 32 $at_status "$at_srcdir/rhbz1506742.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26006\" ip netns exec fwd-test-27292 firewall-cmd -q --ipset=foobar --add-entry=1.2.3.4 "
at_fn_check_prepare_trace "rhbz1506742.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26006" ip netns exec fwd-test-27292 firewall-cmd -q --ipset=foobar --add-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26006\" ip netns exec fwd-test-27292 firewall-cmd -q --ipset=foobar --query-entry=1.2.3.4 "
at_fn_check_prepare_trace "rhbz1506742.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26006" ip netns exec fwd-test-27292 firewall-cmd -q --ipset=foobar --query-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 32 $at_status "$at_srcdir/rhbz1506742.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26006\" ip netns exec fwd-test-27292 firewall-cmd -q --ipset=foobar --remove-entry=1.2.3.4 "
at_fn_check_prepare_trace "rhbz1506742.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26006" ip netns exec fwd-test-27292 firewall-cmd -q --ipset=foobar --remove-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }





cat >foobar_entries.txt <<'_ATEOF'

1.2.3.4
10.0.1.1
_ATEOF




    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26006\" ip netns exec fwd-test-27292 firewall-cmd --permanent --ipset=foobar --add-entries-from-file=foobar_entries.txt "
at_fn_check_prepare_trace "rhbz1506742.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26006" ip netns exec fwd-test-27292 firewall-cmd --permanent --ipset=foobar --add-entries-from-file=foobar_entries.txt
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 32 $at_status "$at_srcdir/rhbz1506742.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26006\" ip netns exec fwd-test-27292 firewall-cmd -q --ipset=foobar --add-entries-from-file=foobar_entries.txt "
at_fn_check_prepare_trace "rhbz1506742.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26006" ip netns exec fwd-test-27292 firewall-cmd -q --ipset=foobar --add-entries-from-file=foobar_entries.txt
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26006\" ip netns exec fwd-test-27292 firewall-cmd -q --ipset=foobar --query-entry=1.2.3.4 "
at_fn_check_prepare_trace "rhbz1506742.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26006" ip netns exec fwd-test-27292 firewall-cmd -q --ipset=foobar --query-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 32 $at_status "$at_srcdir/rhbz1506742.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26006\" ip netns exec fwd-test-27292 firewall-cmd -q --ipset=foobar --remove-entries-from-file=foobar_entries.txt "
at_fn_check_prepare_trace "rhbz1506742.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26006" ip netns exec fwd-test-27292 firewall-cmd -q --ipset=foobar --remove-entries-from-file=foobar_entries.txt
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"-e '/Error: IPSET_WITH_TIMEOUT/d'               -e '/ERROR: IPSET_WITH_TIMEOUT/d' 			  -e '/WARNING: NOT_ENABLED/d'" != x"ignore"; then
            if test -n "-e '/Error: IPSET_WITH_TIMEOUT/d'               -e '/ERROR: IPSET_WITH_TIMEOUT/d' 			  -e '/WARNING: NOT_ENABLED/d'"; then
                sed -i -e '/Error: IPSET_WITH_TIMEOUT/d'               -e '/ERROR: IPSET_WITH_TIMEOUT/d' 			  -e '/WARNING: NOT_ENABLED/d' ./firewalld.log
            fi
            $as_echo "rhbz1506742.at:21" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1506742.at:21"
            $as_echo "rhbz1506742.at:21" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1506742.at:21"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_67
#AT_START_68
at_fn_group_banner 68 'rhbz1594657.at:1' \
  "no log untracked passthrough queries" "           " 4
at_xfail=no
(
  $as_echo "68. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1594657.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1594657.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1594657.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-25506" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1: ip netns add fwd-test-25506"
at_fn_check_prepare_trace "rhbz1594657.at:1"
( $at_check_trace; ip netns add fwd-test-25506
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29895" ip netns exec fwd-test-25506 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-29895" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rhbz1594657.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1594657.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29895" ip netns exec fwd-test-25506 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1594657.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1594657.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29895" ip netns exec fwd-test-25506 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1594657.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1594657.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29895\" ip netns exec fwd-test-25506 firewall-cmd --direct --passthrough eb -t filter -L dummy_chain "
at_fn_check_prepare_trace "rhbz1594657.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29895" ip netns exec fwd-test-25506 firewall-cmd --direct --passthrough eb -t filter -L dummy_chain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1594657.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29895\" ip netns exec fwd-test-25506 firewall-cmd --direct --passthrough eb -t filter -L INPUT "
at_fn_check_prepare_trace "rhbz1594657.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29895" ip netns exec fwd-test-25506 firewall-cmd --direct --passthrough eb -t filter -L INPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29895\" ip netns exec fwd-test-25506 firewall-cmd --direct --passthrough ipv4 -t filter -C dummy_chain -j ACCEPT "
at_fn_check_prepare_trace "rhbz1594657.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29895" ip netns exec fwd-test-25506 firewall-cmd --direct --passthrough ipv4 -t filter -C dummy_chain -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1594657.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29895\" ip netns exec fwd-test-25506 firewall-cmd --direct --passthrough ipv4 -t filter -L dummy_chain "
at_fn_check_prepare_trace "rhbz1594657.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29895" ip netns exec fwd-test-25506 firewall-cmd --direct --passthrough ipv4 -t filter -L dummy_chain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1594657.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29895\" ip netns exec fwd-test-25506 firewall-cmd --direct --passthrough ipv4 -t filter -L INPUT "
at_fn_check_prepare_trace "rhbz1594657.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29895" ip netns exec fwd-test-25506 firewall-cmd --direct --passthrough ipv4 -t filter -L INPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }












        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "rhbz1594657.at:16" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1594657.at:16"
            $as_echo "rhbz1594657.at:16" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1594657.at:16"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_68
#AT_START_69
at_fn_group_banner 69 'rhbz1571957.at:1' \
  "set-log-denied w/ ICMP block inversion" "         " 4
at_xfail=no
(
  $as_echo "69. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1571957.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1571957.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1571957.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-10851" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1: ip netns add fwd-test-10851"
at_fn_check_prepare_trace "rhbz1571957.at:1"
( $at_check_trace; ip netns add fwd-test-10851
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17179" ip netns exec fwd-test-10851 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-17179" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rhbz1571957.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1571957.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17179" ip netns exec fwd-test-10851 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1571957.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1571957.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17179" ip netns exec fwd-test-10851 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1571957.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1571957.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17179\" ip netns exec fwd-test-10851 firewall-cmd -q --permanent --zone=public --add-icmp-block-inversion "
at_fn_check_prepare_trace "rhbz1571957.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17179" ip netns exec fwd-test-10851 firewall-cmd -q --permanent --zone=public --add-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17179\" ip netns exec fwd-test-10851 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1571957.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17179" ip netns exec fwd-test-10851 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17179\" ip netns exec fwd-test-10851 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1571957.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17179" ip netns exec fwd-test-10851 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17179\" ip netns exec fwd-test-10851 firewall-cmd -q --set-log-denied=all "
at_fn_check_prepare_trace "rhbz1571957.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17179" ip netns exec fwd-test-10851 firewall-cmd -q --set-log-denied=all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/rhbz1571957.at:7: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1571957.at:7"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17179\" ip netns exec fwd-test-10851 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1571957.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17179" ip netns exec fwd-test-10851 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17179\" ip netns exec fwd-test-10851 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1571957.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17179" ip netns exec fwd-test-10851 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17179\" ip netns exec fwd-test-10851 firewall-cmd -q --set-log-denied=broadcast "
at_fn_check_prepare_trace "rhbz1571957.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17179" ip netns exec fwd-test-10851 firewall-cmd -q --set-log-denied=broadcast
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17179\" ip netns exec fwd-test-10851 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1571957.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17179" ip netns exec fwd-test-10851 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17179\" ip netns exec fwd-test-10851 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1571957.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17179" ip netns exec fwd-test-10851 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }












        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "rhbz1571957.at:12" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1571957.at:12"
            $as_echo "rhbz1571957.at:12" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1571957.at:12"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_69
#AT_START_70
at_fn_group_banner 70 'rhbz1404076.at:1' \
  "query single port added with range" "             " 4
at_xfail=no
(
  $as_echo "70. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1404076.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1404076.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1404076.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-31562" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1: ip netns add fwd-test-31562"
at_fn_check_prepare_trace "rhbz1404076.at:1"
( $at_check_trace; ip netns add fwd-test-31562
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7547" ip netns exec fwd-test-31562 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-7547" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rhbz1404076.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1404076.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7547" ip netns exec fwd-test-31562 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1404076.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1404076.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7547" ip netns exec fwd-test-31562 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1404076.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1404076.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7547\" ip netns exec fwd-test-31562 firewall-cmd -q --add-port=8080-8090/tcp "
at_fn_check_prepare_trace "rhbz1404076.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7547" ip netns exec fwd-test-31562 firewall-cmd -q --add-port=8080-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7547\" ip netns exec fwd-test-31562 firewall-cmd -q --query-port=8085/tcp "
at_fn_check_prepare_trace "rhbz1404076.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7547" ip netns exec fwd-test-31562 firewall-cmd -q --query-port=8085/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7547\" ip netns exec fwd-test-31562 firewall-cmd -q --query-port=webcache/tcp "
at_fn_check_prepare_trace "rhbz1404076.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7547" ip netns exec fwd-test-31562 firewall-cmd -q --query-port=webcache/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7547\" ip netns exec fwd-test-31562 firewall-cmd -q --query-port=8091/tcp "
at_fn_check_prepare_trace "rhbz1404076.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7547" ip netns exec fwd-test-31562 firewall-cmd -q --query-port=8091/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7547\" ip netns exec fwd-test-31562 firewall-cmd -q --query-port=8085/udp "
at_fn_check_prepare_trace "rhbz1404076.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7547" ip netns exec fwd-test-31562 firewall-cmd -q --query-port=8085/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7547\" ip netns exec fwd-test-31562 firewall-cmd -q --permanent --add-port=8080-8090/tcp "
at_fn_check_prepare_trace "rhbz1404076.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7547" ip netns exec fwd-test-31562 firewall-cmd -q --permanent --add-port=8080-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7547\" ip netns exec fwd-test-31562 firewall-cmd -q --permanent --query-port=8085/tcp "
at_fn_check_prepare_trace "rhbz1404076.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7547" ip netns exec fwd-test-31562 firewall-cmd -q --permanent --query-port=8085/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7547\" ip netns exec fwd-test-31562 firewall-cmd -q --permanent --query-port=webcache/tcp "
at_fn_check_prepare_trace "rhbz1404076.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7547" ip netns exec fwd-test-31562 firewall-cmd -q --permanent --query-port=webcache/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7547\" ip netns exec fwd-test-31562 firewall-cmd -q --permanent --query-port=8091/tcp "
at_fn_check_prepare_trace "rhbz1404076.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7547" ip netns exec fwd-test-31562 firewall-cmd -q --permanent --query-port=8091/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-7547\" ip netns exec fwd-test-31562 firewall-cmd -q --permanent --query-port=8085/udp "
at_fn_check_prepare_trace "rhbz1404076.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-7547" ip netns exec fwd-test-31562 firewall-cmd -q --permanent --query-port=8085/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }










        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "rhbz1404076.at:18" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1404076.at:18"
            $as_echo "rhbz1404076.at:18" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1404076.at:18"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_70
#AT_START_71
at_fn_group_banner 71 'gh366.at:1' \
  "service destination multiple IP versions" "       " 4
at_xfail=no
(
  $as_echo "71. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh366.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh366.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh366.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh366.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/gh366.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh366.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/gh366.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh366.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-9183" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/gh366.at:1: ip netns add fwd-test-9183"
at_fn_check_prepare_trace "gh366.at:1"
( $at_check_trace; ip netns add fwd-test-9183
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16864" ip netns exec fwd-test-9183 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-16864" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "gh366.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh366.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16864" ip netns exec fwd-test-9183 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh366.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh366.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16864" ip netns exec fwd-test-9183 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh366.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh366.at:1"










    { set +x
$as_echo "$at_srcdir/gh366.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16864\" ip netns exec fwd-test-9183 firewall-cmd -q --zone=public --add-service=mdns "
at_fn_check_prepare_trace "gh366.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16864" ip netns exec fwd-test-9183 firewall-cmd -q --zone=public --add-service=mdns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh366.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16864\" ip netns exec fwd-test-9183     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh366.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16864" ip netns exec fwd-test-9183     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 ct state new,untracked accept
ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
ip daddr 224.0.0.251 udp dport 5353 ct state new,untracked accept
ip6 daddr ff02::fb udp dport 5353 ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/gh366.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16864\" ip netns exec fwd-test-9183 firewall-cmd -q --zone=public --remove-service=mdns "
at_fn_check_prepare_trace "gh366.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16864" ip netns exec fwd-test-9183 firewall-cmd -q --zone=public --remove-service=mdns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh366.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16864\" ip netns exec fwd-test-9183 firewall-cmd -q --zone=public --add-rich-rule=\"rule service name=\"mdns\" accept\" "
at_fn_check_prepare_trace "gh366.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16864" ip netns exec fwd-test-9183 firewall-cmd -q --zone=public --add-rich-rule="rule service name="mdns" accept"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh366.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16864\" ip netns exec fwd-test-9183     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh366.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16864" ip netns exec fwd-test-9183     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 ct state new,untracked accept
ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
ip daddr 224.0.0.251 udp dport 5353 ct state new,untracked accept
ip6 daddr ff02::fb udp dport 5353 ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/gh366.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16864\" ip netns exec fwd-test-9183 firewall-cmd -q --zone=public --add-rich-rule='rule family=\"ipv4\" destination address=\"10.10.10.0/24\" service name=\"mdns\" accept' "
at_fn_check_prepare_trace "gh366.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16864" ip netns exec fwd-test-9183 firewall-cmd -q --zone=public --add-rich-rule='rule family="ipv4" destination address="10.10.10.0/24" service name="mdns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 122 $at_status "$at_srcdir/gh366.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }












        if test x"-e '/ERROR: INVALID_RULE: Destination conflict with service/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_RULE: Destination conflict with service/d'"; then
                sed -i -e '/ERROR: INVALID_RULE: Destination conflict with service/d' ./firewalld.log
            fi
            $as_echo "gh366.at:36" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh366.at:36"
            $as_echo "gh366.at:36" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh366.at:36"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_71
#AT_START_72
at_fn_group_banner 72 'rhbz1601610.at:1' \
  "ipset duplicate entries" "                        " 4
at_xfail=no
(
  $as_echo "72. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1601610.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1601610.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1601610.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-20438" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1: ip netns add fwd-test-20438"
at_fn_check_prepare_trace "rhbz1601610.at:1"
( $at_check_trace; ip netns add fwd-test-20438
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21732" ip netns exec fwd-test-20438 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-21732" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rhbz1601610.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1601610.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21732" ip netns exec fwd-test-20438 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1601610.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1601610.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21732" ip netns exec fwd-test-20438 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1601610.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1601610.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21732\" ip netns exec fwd-test-20438 firewall-cmd -q --new-ipset=foobar --permanent --type=hash:net "
at_fn_check_prepare_trace "rhbz1601610.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21732" ip netns exec fwd-test-20438 firewall-cmd -q --new-ipset=foobar --permanent --type=hash:net
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21732\" ip netns exec fwd-test-20438 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1601610.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21732" ip netns exec fwd-test-20438 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21732\" ip netns exec fwd-test-20438 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1601610.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21732" ip netns exec fwd-test-20438 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21732\" ip netns exec fwd-test-20438 firewall-cmd -q --ipset=foobar --add-entry=10.1.1.0/22 "
at_fn_check_prepare_trace "rhbz1601610.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21732" ip netns exec fwd-test-20438 firewall-cmd -q --ipset=foobar --add-entry=10.1.1.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21732\" ip netns exec fwd-test-20438 firewall-cmd -q --ipset=foobar --add-entry=10.1.2.0/22 "
at_fn_check_prepare_trace "rhbz1601610.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21732" ip netns exec fwd-test-20438 firewall-cmd -q --ipset=foobar --add-entry=10.1.2.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1601610.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21732\" ip netns exec fwd-test-20438 firewall-cmd -q --ipset=foobar --add-entry=10.2.0.0/22 "
at_fn_check_prepare_trace "rhbz1601610.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21732" ip netns exec fwd-test-20438 firewall-cmd -q --ipset=foobar --add-entry=10.2.0.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21732\" ip netns exec fwd-test-20438 firewall-cmd --ipset=foobar --get-entries "
at_fn_check_prepare_trace "rhbz1601610.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21732" ip netns exec fwd-test-20438 firewall-cmd --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "10.1.1.0/22
10.2.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21732\" ip netns exec fwd-test-20438     sh <<-\"HERE\"
    { { { { nft -nn list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21732" ip netns exec fwd-test-20438     sh <<-"HERE"
    { { { { nft -nn list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr
flags interval
elements = { 10.1.0.0/22, 10.2.0.0/22 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21732\" ip netns exec fwd-test-20438     sh <<-\"HERE\"
    { { { { ipset list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21732" ip netns exec fwd-test-20438     sh <<-"HERE"
    { { { { ipset list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:net
Members:
10.1.0.0/22
10.2.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:31:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21732\" ip netns exec fwd-test-20438 firewall-cmd -q --ipset=foobar --remove-entry=10.1.1.0/22 "
at_fn_check_prepare_trace "rhbz1601610.at:31"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21732" ip netns exec fwd-test-20438 firewall-cmd -q --ipset=foobar --remove-entry=10.1.1.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21732\" ip netns exec fwd-test-20438 firewall-cmd --ipset=foobar --get-entries "
at_fn_check_prepare_trace "rhbz1601610.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21732" ip netns exec fwd-test-20438 firewall-cmd --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "10.2.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21732\" ip netns exec fwd-test-20438     sh <<-\"HERE\"
    { { { { nft -nn list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21732" ip netns exec fwd-test-20438     sh <<-"HERE"
    { { { { nft -nn list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr
flags interval
elements = { 10.2.0.0/22 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21732\" ip netns exec fwd-test-20438     sh <<-\"HERE\"
    { { { { ipset list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21732" ip netns exec fwd-test-20438     sh <<-"HERE"
    { { { { ipset list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:net
Members:
10.2.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:51:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21732\" ip netns exec fwd-test-20438 firewall-cmd -q --permanent --ipset=foobar --add-entry=10.1.1.0/22 "
at_fn_check_prepare_trace "rhbz1601610.at:51"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21732" ip netns exec fwd-test-20438 firewall-cmd -q --permanent --ipset=foobar --add-entry=10.1.1.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:51"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21732\" ip netns exec fwd-test-20438 firewall-cmd --permanent --ipset=foobar --get-entries "
at_fn_check_prepare_trace "rhbz1601610.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21732" ip netns exec fwd-test-20438 firewall-cmd --permanent --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "10.1.1.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21732\" ip netns exec fwd-test-20438 firewall-cmd -q --permanent --ipset=foobar --remove-entry=10.1.1.0/22 "
at_fn_check_prepare_trace "rhbz1601610.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21732" ip netns exec fwd-test-20438 firewall-cmd -q --permanent --ipset=foobar --remove-entry=10.1.1.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:56:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21732\" ip netns exec fwd-test-20438 firewall-cmd --permanent --ipset=foobar --get-entries "
at_fn_check_prepare_trace "rhbz1601610.at:56"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21732" ip netns exec fwd-test-20438 firewall-cmd --permanent --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:60:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21732\" ip netns exec fwd-test-20438 firewall-cmd -q --ipset=foobar --add-entry=10.3.0.0/22 "
at_fn_check_prepare_trace "rhbz1601610.at:60"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21732" ip netns exec fwd-test-20438 firewall-cmd -q --ipset=foobar --add-entry=10.3.0.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:60"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:61:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21732\" ip netns exec fwd-test-20438 firewall-cmd -q --runtime-to-permanent "
at_fn_check_prepare_trace "rhbz1601610.at:61"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21732" ip netns exec fwd-test-20438 firewall-cmd -q --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:61"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21732\" ip netns exec fwd-test-20438 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1601610.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21732" ip netns exec fwd-test-20438 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21732\" ip netns exec fwd-test-20438 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1601610.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21732" ip netns exec fwd-test-20438 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:63:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21732\" ip netns exec fwd-test-20438     sh <<-\"HERE\"
    { { { { nft -nn list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:63"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21732" ip netns exec fwd-test-20438     sh <<-"HERE"
    { { { { nft -nn list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr
flags interval
elements = { 10.2.0.0/22, 10.3.0.0/22 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21732\" ip netns exec fwd-test-20438     sh <<-\"HERE\"
    { { { { ipset list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21732" ip netns exec fwd-test-20438     sh <<-"HERE"
    { { { { ipset list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:net
Members:
10.2.0.0/22
10.3.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }





{ set +x
$as_echo "$at_srcdir/rhbz1601610.at:81: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1601610.at:81"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:81"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21732\" ip netns exec fwd-test-20438 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1601610.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21732" ip netns exec fwd-test-20438 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21732\" ip netns exec fwd-test-20438 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1601610.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21732" ip netns exec fwd-test-20438 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:83:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21732\" ip netns exec fwd-test-20438     sh <<-\"HERE\"
    { { { { nft -nn list set inet firewalld foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:83"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21732" ip netns exec fwd-test-20438     sh <<-"HERE"
    { { { { nft -nn list set inet firewalld foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
set foobar {
type ipv4_addr
flags interval
elements = { 10.2.0.0/22, 10.3.0.0/22 }
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:83"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:92:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21732\" ip netns exec fwd-test-20438     sh <<-\"HERE\"
    { { { { ipset list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:92"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21732" ip netns exec fwd-test-20438     sh <<-"HERE"
    { { { { ipset list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:net
Members:
10.2.0.0/22
10.3.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:92"
$at_failed && at_fn_log_failure
$at_traceon; }











        if test x"-e '/ERROR: COMMAND_FAILED:.*already added.*/d'              -e '/ERROR: COMMAND_FAILED:.*element.*exists/d'              -e '/Kernel support protocol versions/d'" != x"ignore"; then
            if test -n "-e '/ERROR: COMMAND_FAILED:.*already added.*/d'              -e '/ERROR: COMMAND_FAILED:.*element.*exists/d'              -e '/Kernel support protocol versions/d'"; then
                sed -i -e '/ERROR: COMMAND_FAILED:.*already added.*/d'              -e '/ERROR: COMMAND_FAILED:.*element.*exists/d'              -e '/Kernel support protocol versions/d' ./firewalld.log
            fi
            $as_echo "rhbz1601610.at:100" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1601610.at:100"
            $as_echo "rhbz1601610.at:100" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1601610.at:100"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_72
#AT_START_73
at_fn_group_banner 73 'gh303.at:1' \
  "unicode in XML" "                                 " 4
at_xfail=no
(
  $as_echo "73. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh303.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh303.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh303.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh303.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/gh303.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh303.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/gh303.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh303.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-4163" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/gh303.at:1: ip netns add fwd-test-4163"
at_fn_check_prepare_trace "gh303.at:1"
( $at_check_trace; ip netns add fwd-test-4163
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12070" ip netns exec fwd-test-4163 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-12070" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "gh303.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh303.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12070" ip netns exec fwd-test-4163 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh303.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh303.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12070" ip netns exec fwd-test-4163 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh303.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh303.at:1"





{ set +x
$as_echo "$at_srcdir/gh303.at:4: mkdir -p ./services"
at_fn_check_prepare_trace "gh303.at:4"
( $at_check_trace; mkdir -p ./services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh303.at:5: cat <<HERE > ./services/unicode-service-test.xml
<?xml version=\"1.0\" encoding=\"utf-8\"?>
<service>
  <short>unicode-service-test</short>
  <description>A string with unicode characters; Ё ώ € ⇶ ▜ ◯ ★ ☠ ☯ ☺ ♻ </description>
  <port protocol=\"tcp\" port=\"12345\"/>
</service>
HERE
"
at_fn_check_prepare_notrace 'an embedded newline' "gh303.at:5"
( $at_check_trace; cat <<HERE > ./services/unicode-service-test.xml
<?xml version="1.0" encoding="utf-8"?>
<service>
  <short>unicode-service-test</short>
  <description>A string with unicode characters; Ё ώ € ⇶ ▜ ◯ ★ ☠ ☯ ☺ ♻ </description>
  <port protocol="tcp" port="12345"/>
</service>
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }


LC_ALL="C"
export LC_ALL


    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12070" ip netns exec fwd-test-4163 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh303.at:17" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh303.at:17"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12070" ip netns exec fwd-test-4163 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh303.at:17" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh303.at:17"






    { set +x
$as_echo "$at_srcdir/gh303.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12070\" ip netns exec fwd-test-4163 firewall-cmd -q --permanent --add-service=unicode-service-test "
at_fn_check_prepare_trace "gh303.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12070" ip netns exec fwd-test-4163 firewall-cmd -q --permanent --add-service=unicode-service-test
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh303.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12070\" ip netns exec fwd-test-4163 firewall-cmd -q --reload "
at_fn_check_prepare_trace "gh303.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12070" ip netns exec fwd-test-4163 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh303.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12070\" ip netns exec fwd-test-4163 firewall-cmd -q --state "
at_fn_check_prepare_trace "gh303.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12070" ip netns exec fwd-test-4163 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }












        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "gh303.at:22" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh303.at:22"
            $as_echo "gh303.at:22" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh303.at:22"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_73
#AT_START_74
at_fn_group_banner 74 'gh335.at:1' \
  "forward-port toaddr enables IP forwarding" "      " 4
at_xfail=no
(
  $as_echo "74. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh335.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh335.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh335.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/gh335.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh335.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/gh335.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh335.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-16805" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/gh335.at:1: ip netns add fwd-test-16805"
at_fn_check_prepare_trace "gh335.at:1"
( $at_check_trace; ip netns add fwd-test-16805
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32552" ip netns exec fwd-test-16805 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-32552" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "gh335.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh335.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32552" ip netns exec fwd-test-16805 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh335.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh335.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32552" ip netns exec fwd-test-16805 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh335.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh335.at:1"






    { set +x
$as_echo "$at_srcdir/gh335.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32552\" ip netns exec fwd-test-16805 sysctl -w net.ipv4.conf.all.forwarding=0 "
at_fn_check_prepare_trace "gh335.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32552" ip netns exec fwd-test-16805 sysctl -w net.ipv4.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32552\" ip netns exec fwd-test-16805 sysctl -w net.ipv6.conf.all.forwarding=0 "
at_fn_check_prepare_trace "gh335.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32552" ip netns exec fwd-test-16805 sysctl -w net.ipv6.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32552\" ip netns exec fwd-test-16805 firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toaddr=10.10.10.10 "
at_fn_check_prepare_trace "gh335.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32552" ip netns exec fwd-test-16805 firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32552\" ip netns exec fwd-test-16805 sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32552" ip netns exec fwd-test-16805 sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32552\" ip netns exec fwd-test-16805 sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32552" ip netns exec fwd-test-16805 sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh335.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32552\" ip netns exec fwd-test-16805 firewall-cmd -q --reload "
at_fn_check_prepare_trace "gh335.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32552" ip netns exec fwd-test-16805 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh335.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32552\" ip netns exec fwd-test-16805 firewall-cmd -q --state "
at_fn_check_prepare_trace "gh335.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32552" ip netns exec fwd-test-16805 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh335.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32552\" ip netns exec fwd-test-16805 sysctl -w net.ipv4.conf.all.forwarding=0 "
at_fn_check_prepare_trace "gh335.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32552" ip netns exec fwd-test-16805 sysctl -w net.ipv4.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32552\" ip netns exec fwd-test-16805 sysctl -w net.ipv6.conf.all.forwarding=0 "
at_fn_check_prepare_trace "gh335.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32552" ip netns exec fwd-test-16805 sysctl -w net.ipv6.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32552\" ip netns exec fwd-test-16805 firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toport=54321:toaddr=\"1234:5678::4321\" "
at_fn_check_prepare_trace "gh335.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32552" ip netns exec fwd-test-16805 firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toport=54321:toaddr="1234:5678::4321"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32552\" ip netns exec fwd-test-16805 sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32552" ip netns exec fwd-test-16805 sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32552\" ip netns exec fwd-test-16805 sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32552" ip netns exec fwd-test-16805 sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh335.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32552\" ip netns exec fwd-test-16805 firewall-cmd -q --reload "
at_fn_check_prepare_trace "gh335.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32552" ip netns exec fwd-test-16805 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh335.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32552\" ip netns exec fwd-test-16805 firewall-cmd -q --state "
at_fn_check_prepare_trace "gh335.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32552" ip netns exec fwd-test-16805 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/gh335.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32552\" ip netns exec fwd-test-16805 sysctl -w net.ipv4.conf.all.forwarding=0 "
at_fn_check_prepare_trace "gh335.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32552" ip netns exec fwd-test-16805 sysctl -w net.ipv4.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32552\" ip netns exec fwd-test-16805 sysctl -w net.ipv6.conf.all.forwarding=0 "
at_fn_check_prepare_trace "gh335.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32552" ip netns exec fwd-test-16805 sysctl -w net.ipv6.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32552\" ip netns exec fwd-test-16805 firewall-cmd -q --add-rich-rule='rule family=ipv4 forward-port port=\"12345\" protocol=\"tcp\" to-port=\"54321\" to-addr=\"10.10.10.10\"' "
at_fn_check_prepare_trace "gh335.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32552" ip netns exec fwd-test-16805 firewall-cmd -q --add-rich-rule='rule family=ipv4 forward-port port="12345" protocol="tcp" to-port="54321" to-addr="10.10.10.10"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32552\" ip netns exec fwd-test-16805 sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32552" ip netns exec fwd-test-16805 sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32552\" ip netns exec fwd-test-16805 sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32552" ip netns exec fwd-test-16805 sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh335.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32552\" ip netns exec fwd-test-16805 firewall-cmd -q --reload "
at_fn_check_prepare_trace "gh335.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32552" ip netns exec fwd-test-16805 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh335.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32552\" ip netns exec fwd-test-16805 firewall-cmd -q --state "
at_fn_check_prepare_trace "gh335.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32552" ip netns exec fwd-test-16805 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh335.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32552\" ip netns exec fwd-test-16805 sysctl -w net.ipv4.conf.all.forwarding=0 "
at_fn_check_prepare_trace "gh335.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32552" ip netns exec fwd-test-16805 sysctl -w net.ipv4.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32552\" ip netns exec fwd-test-16805 sysctl -w net.ipv6.conf.all.forwarding=0 "
at_fn_check_prepare_trace "gh335.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32552" ip netns exec fwd-test-16805 sysctl -w net.ipv6.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32552\" ip netns exec fwd-test-16805 firewall-cmd -q --add-rich-rule='rule family=ipv6 forward-port port=\"12345\" protocol=\"tcp\" to-port=\"54321\" to-addr=\"1234:5678::4321\"' "
at_fn_check_prepare_trace "gh335.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32552" ip netns exec fwd-test-16805 firewall-cmd -q --add-rich-rule='rule family=ipv6 forward-port port="12345" protocol="tcp" to-port="54321" to-addr="1234:5678::4321"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32552\" ip netns exec fwd-test-16805 sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32552" ip netns exec fwd-test-16805 sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32552\" ip netns exec fwd-test-16805 sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32552" ip netns exec fwd-test-16805 sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh335.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32552\" ip netns exec fwd-test-16805 firewall-cmd -q --reload "
at_fn_check_prepare_trace "gh335.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32552" ip netns exec fwd-test-16805 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh335.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32552\" ip netns exec fwd-test-16805 firewall-cmd -q --state "
at_fn_check_prepare_trace "gh335.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32552" ip netns exec fwd-test-16805 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/gh335.at:37:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32552\" ip netns exec fwd-test-16805 sysctl -w net.ipv4.conf.all.forwarding=0 "
at_fn_check_prepare_trace "gh335.at:37"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32552" ip netns exec fwd-test-16805 sysctl -w net.ipv4.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:37"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32552\" ip netns exec fwd-test-16805 sysctl -w net.ipv6.conf.all.forwarding=0 "
at_fn_check_prepare_trace "gh335.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32552" ip netns exec fwd-test-16805 sysctl -w net.ipv6.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh335.at:40:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32552\" ip netns exec fwd-test-16805 firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toport=54321 "
at_fn_check_prepare_trace "gh335.at:40"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32552" ip netns exec fwd-test-16805 firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toport=54321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:41:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32552\" ip netns exec fwd-test-16805 sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:41"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32552" ip netns exec fwd-test-16805 sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32552\" ip netns exec fwd-test-16805 sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32552" ip netns exec fwd-test-16805 sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh335.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32552\" ip netns exec fwd-test-16805 firewall-cmd -q --add-rich-rule='rule family=ipv4 forward-port port=\"12345\" protocol=\"tcp\" to-port=\"54321\"' "
at_fn_check_prepare_trace "gh335.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32552" ip netns exec fwd-test-16805 firewall-cmd -q --add-rich-rule='rule family=ipv4 forward-port port="12345" protocol="tcp" to-port="54321"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32552\" ip netns exec fwd-test-16805 sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32552" ip netns exec fwd-test-16805 sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32552\" ip netns exec fwd-test-16805 sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32552" ip netns exec fwd-test-16805 sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/gh335.at:48:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32552\" ip netns exec fwd-test-16805 firewall-cmd -q --add-rich-rule='rule family=ipv6 forward-port port=\"12345\" protocol=\"tcp\" to-port=\"54321\"' "
at_fn_check_prepare_trace "gh335.at:48"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32552" ip netns exec fwd-test-16805 firewall-cmd -q --add-rich-rule='rule family=ipv6 forward-port port="12345" protocol="tcp" to-port="54321"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:48:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32552\" ip netns exec fwd-test-16805 sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:48"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32552" ip netns exec fwd-test-16805 sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:48:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-32552\" ip netns exec fwd-test-16805 sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:48"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-32552" ip netns exec fwd-test-16805 sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:48"
$at_failed && at_fn_log_failure
$at_traceon; }











        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "gh335.at:54" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh335.at:54"
            $as_echo "gh335.at:54" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh335.at:54"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_74
#AT_START_75
at_fn_group_banner 75 'gh482.at:1' \
  "remove forward-port after reload" "               " 4
at_xfail=no
(
  $as_echo "75. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh482.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh482.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh482.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/gh482.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh482.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/gh482.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh482.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-31057" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/gh482.at:1: ip netns add fwd-test-31057"
at_fn_check_prepare_trace "gh482.at:1"
( $at_check_trace; ip netns add fwd-test-31057
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5250" ip netns exec fwd-test-31057 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-5250" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "gh482.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh482.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5250" ip netns exec fwd-test-31057 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh482.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh482.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5250" ip netns exec fwd-test-31057 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh482.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh482.at:1"








    { set +x
$as_echo "$at_srcdir/gh482.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5250\" ip netns exec fwd-test-31057 firewall-cmd -q             --add-rich-rule='rule family=\"ipv4\" forward-port port=\"49152\" protocol=\"tcp\" to-port=\"49153\"' "
at_fn_check_prepare_trace "gh482.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5250" ip netns exec fwd-test-31057 firewall-cmd -q             --add-rich-rule='rule family="ipv4" forward-port port="49152" protocol="tcp" to-port="49153"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh482.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5250\" ip netns exec fwd-test-31057 firewall-cmd -q             --remove-rich-rule='rule family=\"ipv4\" forward-port port=\"49152\" protocol=\"tcp\" to-port=\"49153\"' "
at_fn_check_prepare_trace "gh482.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5250" ip netns exec fwd-test-31057 firewall-cmd -q             --remove-rich-rule='rule family="ipv4" forward-port port="49152" protocol="tcp" to-port="49153"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5250\" ip netns exec fwd-test-31057 firewall-cmd -q --permanent --add-rich-rule='rule family=\"ipv4\" forward-port port=\"49152\" protocol=\"tcp\" to-port=\"49153\"' "
at_fn_check_prepare_trace "gh482.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5250" ip netns exec fwd-test-31057 firewall-cmd -q --permanent --add-rich-rule='rule family="ipv4" forward-port port="49152" protocol="tcp" to-port="49153"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5250\" ip netns exec fwd-test-31057 firewall-cmd -q --reload "
at_fn_check_prepare_trace "gh482.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5250" ip netns exec fwd-test-31057 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh482.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5250\" ip netns exec fwd-test-31057 firewall-cmd -q --state "
at_fn_check_prepare_trace "gh482.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5250" ip netns exec fwd-test-31057 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5250\" ip netns exec fwd-test-31057 firewall-cmd -q             --remove-rich-rule='rule family=\"ipv4\" forward-port port=\"49152\" protocol=\"tcp\" to-port=\"49153\"' "
at_fn_check_prepare_trace "gh482.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5250" ip netns exec fwd-test-31057 firewall-cmd -q             --remove-rich-rule='rule family="ipv4" forward-port port="49152" protocol="tcp" to-port="49153"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh482.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5250\" ip netns exec fwd-test-31057 firewall-cmd -q --permanent --remove-rich-rule='rule family=\"ipv4\" forward-port port=\"49152\" protocol=\"tcp\" to-port=\"49153\"' "
at_fn_check_prepare_trace "gh482.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5250" ip netns exec fwd-test-31057 firewall-cmd -q --permanent --remove-rich-rule='rule family="ipv4" forward-port port="49152" protocol="tcp" to-port="49153"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5250\" ip netns exec fwd-test-31057 firewall-cmd -q --permanent --add-forward-port=port=1234:proto=tcp:toport=4321 "
at_fn_check_prepare_trace "gh482.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5250" ip netns exec fwd-test-31057 firewall-cmd -q --permanent --add-forward-port=port=1234:proto=tcp:toport=4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5250\" ip netns exec fwd-test-31057 firewall-cmd -q --reload "
at_fn_check_prepare_trace "gh482.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5250" ip netns exec fwd-test-31057 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh482.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5250\" ip netns exec fwd-test-31057 firewall-cmd -q --state "
at_fn_check_prepare_trace "gh482.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5250" ip netns exec fwd-test-31057 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5250\" ip netns exec fwd-test-31057 firewall-cmd -q             --remove-forward-port=port=1234:proto=tcp:toport=4321 "
at_fn_check_prepare_trace "gh482.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5250" ip netns exec fwd-test-31057 firewall-cmd -q             --remove-forward-port=port=1234:proto=tcp:toport=4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh482.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5250\" ip netns exec fwd-test-31057 firewall-cmd -q --permanent --remove-forward-port=port=1234:proto=tcp:toport=4321 "
at_fn_check_prepare_trace "gh482.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5250" ip netns exec fwd-test-31057 firewall-cmd -q --permanent --remove-forward-port=port=1234:proto=tcp:toport=4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }











        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "gh482.at:17" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh482.at:17"
            $as_echo "gh482.at:17" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh482.at:17"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_75
#AT_START_76
at_fn_group_banner 76 'gh478.at:1' \
  "rich rule marks every packet" "                   " 4
at_xfail=no
(
  $as_echo "76. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh478.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh478.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh478.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh478.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/gh478.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh478.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/gh478.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh478.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-23795" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/gh478.at:1: ip netns add fwd-test-23795"
at_fn_check_prepare_trace "gh478.at:1"
( $at_check_trace; ip netns add fwd-test-23795
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28331" ip netns exec fwd-test-23795 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-28331" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "gh478.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh478.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28331" ip netns exec fwd-test-23795 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh478.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh478.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28331" ip netns exec fwd-test-23795 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh478.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh478.at:1"








    { set +x
$as_echo "$at_srcdir/gh478.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28331\" ip netns exec fwd-test-23795 firewall-cmd -q --add-rich-rule='rule port port=1234 protocol=tcp mark set=10' "
at_fn_check_prepare_trace "gh478.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28331" ip netns exec fwd-test-23795 firewall-cmd -q --add-rich-rule='rule port port=1234 protocol=tcp mark set=10'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh478.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28331\" ip netns exec fwd-test-23795 firewall-cmd -q --add-rich-rule='rule protocol value=icmp mark set=11' "
at_fn_check_prepare_trace "gh478.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28331" ip netns exec fwd-test-23795 firewall-cmd -q --add-rich-rule='rule protocol value=icmp mark set=11'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh478.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28331\" ip netns exec fwd-test-23795 firewall-cmd -q --add-rich-rule='rule source-port port=4321 protocol=tcp mark set=12' "
at_fn_check_prepare_trace "gh478.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28331" ip netns exec fwd-test-23795 firewall-cmd -q --add-rich-rule='rule source-port port=4321 protocol=tcp mark set=12'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh478.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28331\" ip netns exec fwd-test-23795     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld mangle_PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh478.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28331" ip netns exec fwd-test-23795     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld mangle_PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PRE_public_allow {
tcp dport 1234 mark set 0x0000000a
meta l4proto icmp mark set 0x0000000b
tcp sport 4321 mark set 0x0000000c
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }



















        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "gh478.at:28" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh478.at:28"
            $as_echo "gh478.at:28" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh478.at:28"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_76
#AT_START_77
at_fn_group_banner 77 'gh453.at:1' \
  "nftables helper objects" "                        " 4
at_xfail=no
(
  $as_echo "77. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh453.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh453.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh453.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh453.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/gh453.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh453.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/gh453.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh453.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-32751" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/gh453.at:1: ip netns add fwd-test-32751"
at_fn_check_prepare_trace "gh453.at:1"
( $at_check_trace; ip netns add fwd-test-32751
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11442" ip netns exec fwd-test-32751 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-11442" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "gh453.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh453.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11442" ip netns exec fwd-test-32751 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh453.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh453.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11442" ip netns exec fwd-test-32751 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh453.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh453.at:1"








    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11442\" ip netns exec fwd-test-32751 nft add table inet firewalld_check_ct_helper "
at_fn_check_prepare_trace "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11442" ip netns exec fwd-test-32751 nft add table inet firewalld_check_ct_helper
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


        $as_echo "gh453.at:1" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11442" ip netns exec fwd-test-32751 nft add ct helper inet firewalld helper-ftp-tcp { type \"ftp\" protocol tcp \; } >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/gh453.at:1"

    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11442\" ip netns exec fwd-test-32751 nft delete table inet firewalld_check_ct_helper "
at_fn_check_prepare_trace "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11442" ip netns exec fwd-test-32751 nft delete table inet firewalld_check_ct_helper
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11442\" ip netns exec fwd-test-32751 firewall-cmd -q --set-automatic-helpers=no "
at_fn_check_prepare_trace "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11442" ip netns exec fwd-test-32751 firewall-cmd -q --set-automatic-helpers=no
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11442\" ip netns exec fwd-test-32751 firewall-cmd -q --add-service=ftp "
at_fn_check_prepare_trace "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11442" ip netns exec fwd-test-32751 firewall-cmd -q --add-service=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11442\" ip netns exec fwd-test-32751 nft list ruleset | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |grep -A3 \"ct helper helper-ftp-tcp\" "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11442" ip netns exec fwd-test-32751 nft list ruleset | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |grep -A3 "ct helper helper-ftp-tcp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ct helper helper-ftp-tcp {
type \"ftp\" protocol tcp
l3proto inet
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11442\" ip netns exec fwd-test-32751     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11442" ip netns exec fwd-test-32751     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 ct state new,untracked accept
ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
tcp dport 21 ct helper set \"helper-ftp-tcp\"
tcp dport 21 ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11442\" ip netns exec fwd-test-32751 firewall-cmd -q --add-service=sip "
at_fn_check_prepare_trace "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11442" ip netns exec fwd-test-32751 firewall-cmd -q --add-service=sip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11442\" ip netns exec fwd-test-32751 nft list ruleset | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |grep -A3 \"ct helper helper-sip-tcp\" "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11442" ip netns exec fwd-test-32751 nft list ruleset | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |grep -A3 "ct helper helper-sip-tcp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ct helper helper-sip-tcp {
type \"sip\" protocol tcp
l3proto inet
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11442\" ip netns exec fwd-test-32751 nft list ruleset | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |grep -A3 \"ct helper helper-sip-udp\" "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11442" ip netns exec fwd-test-32751 nft list ruleset | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |grep -A3 "ct helper helper-sip-udp"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ct helper helper-sip-udp {
type \"sip\" protocol udp
l3proto inet
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh453.at:1:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-11442\" ip netns exec fwd-test-32751     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh453.at:1"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-11442" ip netns exec fwd-test-32751     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_public_allow {
tcp dport 22 ct state new,untracked accept
ip6 daddr fe80::/64 udp dport 546 ct state new,untracked accept
tcp dport 21 ct helper set \"helper-ftp-tcp\"
tcp dport 21 ct state new,untracked accept
tcp dport 5060 ct helper set \"helper-sip-tcp\"
udp dport 5060 ct helper set \"helper-sip-udp\"
tcp dport 5060 ct state new,untracked accept
udp dport 5060 ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh453.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }













        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "gh453.at:1" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh453.at:1"
            $as_echo "gh453.at:1" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh453.at:1"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_77
#AT_START_78
at_fn_group_banner 78 'gh258.at:1' \
  "zone dispatch layout" "                           " 4
at_xfail=no
(
  $as_echo "78. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh258.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh258.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh258.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh258.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/gh258.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh258.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/gh258.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh258.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-11925" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/gh258.at:1: ip netns add fwd-test-11925"
at_fn_check_prepare_trace "gh258.at:1"
( $at_check_trace; ip netns add fwd-test-11925
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8566" ip netns exec fwd-test-11925 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-8566" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "gh258.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh258.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8566" ip netns exec fwd-test-11925 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh258.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh258.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8566" ip netns exec fwd-test-11925 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh258.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh258.at:1"








    { set +x
$as_echo "$at_srcdir/gh258.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8566\" ip netns exec fwd-test-11925 firewall-cmd --zone=work --add-source=\"1.2.3.0/24\" "
at_fn_check_prepare_trace "gh258.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8566" ip netns exec fwd-test-11925 firewall-cmd --zone=work --add-source="1.2.3.0/24"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/gh258.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8566\" ip netns exec fwd-test-11925 firewall-cmd --zone=public --add-source=\"dead:beef::/54\" "
at_fn_check_prepare_trace "gh258.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8566" ip netns exec fwd-test-11925 firewall-cmd --zone=public --add-source="dead:beef::/54"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/gh258.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8566\" ip netns exec fwd-test-11925 firewall-cmd --zone=work --add-interface=dummy0 "
at_fn_check_prepare_trace "gh258.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8566" ip netns exec fwd-test-11925 firewall-cmd --zone=work --add-interface=dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh258.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8566\" ip netns exec fwd-test-11925 firewall-cmd --zone=public --add-interface=dummy1 "
at_fn_check_prepare_trace "gh258.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8566" ip netns exec fwd-test-11925 firewall-cmd --zone=public --add-interface=dummy1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8566\" ip netns exec fwd-test-11925     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_INPUT; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8566" ip netns exec fwd-test-11925     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_INPUT; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT {
ct state established,related accept
ct status dnat accept
iifname \"lo\" accept
jump filter_INPUT_ZONES
ct state invalid drop
reject with icmpx type admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8566\" ip netns exec fwd-test-11925     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_INPUT_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8566" ip netns exec fwd-test-11925     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_INPUT_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_ZONES {
ip6 saddr dead:beef::/54 goto filter_IN_public
ip saddr 1.2.3.0/24 goto filter_IN_work
goto filter_INPUT_ZONES_IFACES
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8566\" ip netns exec fwd-test-11925     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_INPUT_ZONES_IFACES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8566" ip netns exec fwd-test-11925     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_INPUT_ZONES_IFACES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_INPUT_ZONES_IFACES {
iifname \"dummy1\" goto filter_IN_public
iifname \"dummy0\" goto filter_IN_work
goto filter_IN_public
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8566\" ip netns exec fwd-test-11925     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_FORWARD; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8566" ip netns exec fwd-test-11925     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_FORWARD; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD {
ct state established,related accept
ct status dnat accept
iifname \"lo\" accept
ip6 daddr { ::/96, ::ffff:0.0.0.0/96, 2002::/24, 2002:a00::/24, 2002:7f00::/24, 2002:a9fe::/32, 2002:ac10::/28, 2002:c0a8::/32, 2002:e000::/19 } reject with icmpv6 type addr-unreachable
jump filter_FORWARD_IN_ZONES
jump filter_FORWARD_OUT_ZONES
ct state invalid drop
reject with icmpx type admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8566\" ip netns exec fwd-test-11925     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_FORWARD_IN_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8566" ip netns exec fwd-test-11925     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_FORWARD_IN_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_IN_ZONES {
ip6 saddr dead:beef::/54 goto filter_FWDI_public
ip saddr 1.2.3.0/24 goto filter_FWDI_work
goto filter_FORWARD_IN_ZONES_IFACES
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8566\" ip netns exec fwd-test-11925     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_FORWARD_IN_ZONES_IFACES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8566" ip netns exec fwd-test-11925     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_FORWARD_IN_ZONES_IFACES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_IN_ZONES_IFACES {
iifname \"dummy1\" goto filter_FWDI_public
iifname \"dummy0\" goto filter_FWDI_work
goto filter_FWDI_public
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8566\" ip netns exec fwd-test-11925     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_FORWARD_OUT_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8566" ip netns exec fwd-test-11925     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_FORWARD_OUT_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_OUT_ZONES {
ip6 daddr dead:beef::/54 goto filter_FWDO_public
ip daddr 1.2.3.0/24 goto filter_FWDO_work
goto filter_FORWARD_OUT_ZONES_IFACES
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8566\" ip netns exec fwd-test-11925     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_FORWARD_OUT_ZONES_IFACES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8566" ip netns exec fwd-test-11925     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_FORWARD_OUT_ZONES_IFACES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD_OUT_ZONES_IFACES {
oifname \"dummy1\" goto filter_FWDO_public
oifname \"dummy0\" goto filter_FWDO_work
goto filter_FWDO_public
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8566\" ip netns exec fwd-test-11925     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld raw_PREROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8566" ip netns exec fwd-test-11925     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld raw_PREROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain raw_PREROUTING {
jump raw_PREROUTING_ZONES
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8566\" ip netns exec fwd-test-11925     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld raw_PREROUTING_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8566" ip netns exec fwd-test-11925     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld raw_PREROUTING_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain raw_PREROUTING_ZONES {
ip6 saddr dead:beef::/54 goto raw_PRE_public
ip saddr 1.2.3.0/24 goto raw_PRE_work
goto raw_PREROUTING_ZONES_IFACES
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8566\" ip netns exec fwd-test-11925     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld raw_PREROUTING_ZONES_IFACES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8566" ip netns exec fwd-test-11925     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld raw_PREROUTING_ZONES_IFACES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain raw_PREROUTING_ZONES_IFACES {
iifname \"dummy1\" goto raw_PRE_public
iifname \"dummy0\" goto raw_PRE_work
goto raw_PRE_public
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8566\" ip netns exec fwd-test-11925     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld mangle_PREROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8566" ip netns exec fwd-test-11925     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld mangle_PREROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PREROUTING {
jump mangle_PREROUTING_ZONES
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8566\" ip netns exec fwd-test-11925     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld mangle_PREROUTING_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8566" ip netns exec fwd-test-11925     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld mangle_PREROUTING_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PREROUTING_ZONES {
ip6 saddr dead:beef::/54 goto mangle_PRE_public
ip saddr 1.2.3.0/24 goto mangle_PRE_work
goto mangle_PREROUTING_ZONES_IFACES
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8566\" ip netns exec fwd-test-11925     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld mangle_PREROUTING_ZONES_IFACES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8566" ip netns exec fwd-test-11925     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld mangle_PREROUTING_ZONES_IFACES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain mangle_PREROUTING_ZONES_IFACES {
iifname \"dummy1\" goto mangle_PRE_public
iifname \"dummy0\" goto mangle_PRE_work
goto mangle_PRE_public
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8566\" ip netns exec fwd-test-11925     sh <<-\"HERE\"
    { { { { nft -nn list chain ip firewalld nat_PREROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8566" ip netns exec fwd-test-11925     sh <<-"HERE"
    { { { { nft -nn list chain ip firewalld nat_PREROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip firewalld {
chain nat_PREROUTING {
jump nat_PREROUTING_ZONES
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8566\" ip netns exec fwd-test-11925     sh <<-\"HERE\"
    { { { { nft -nn list chain ip firewalld nat_PREROUTING_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8566" ip netns exec fwd-test-11925     sh <<-"HERE"
    { { { { nft -nn list chain ip firewalld nat_PREROUTING_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip firewalld {
chain nat_PREROUTING_ZONES {
ip saddr 1.2.3.0/24 goto nat_PRE_work
goto nat_PREROUTING_ZONES_IFACES
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8566\" ip netns exec fwd-test-11925     sh <<-\"HERE\"
    { { { { nft -nn list chain ip firewalld nat_PREROUTING_ZONES_IFACES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8566" ip netns exec fwd-test-11925     sh <<-"HERE"
    { { { { nft -nn list chain ip firewalld nat_PREROUTING_ZONES_IFACES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip firewalld {
chain nat_PREROUTING_ZONES_IFACES {
iifname \"dummy1\" goto nat_PRE_public
iifname \"dummy0\" goto nat_PRE_work
goto nat_PRE_public
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8566\" ip netns exec fwd-test-11925     sh <<-\"HERE\"
    { { { { nft -nn list chain ip firewalld nat_POSTROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8566" ip netns exec fwd-test-11925     sh <<-"HERE"
    { { { { nft -nn list chain ip firewalld nat_POSTROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip firewalld {
chain nat_POSTROUTING {
jump nat_POSTROUTING_ZONES
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8566\" ip netns exec fwd-test-11925     sh <<-\"HERE\"
    { { { { nft -nn list chain ip firewalld nat_POSTROUTING_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8566" ip netns exec fwd-test-11925     sh <<-"HERE"
    { { { { nft -nn list chain ip firewalld nat_POSTROUTING_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip firewalld {
chain nat_POSTROUTING_ZONES {
ip daddr 1.2.3.0/24 goto nat_POST_work
goto nat_POSTROUTING_ZONES_IFACES
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8566\" ip netns exec fwd-test-11925     sh <<-\"HERE\"
    { { { { nft -nn list chain ip firewalld nat_POSTROUTING_ZONES_IFACES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8566" ip netns exec fwd-test-11925     sh <<-"HERE"
    { { { { nft -nn list chain ip firewalld nat_POSTROUTING_ZONES_IFACES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip firewalld {
chain nat_POSTROUTING_ZONES_IFACES {
oifname \"dummy1\" goto nat_POST_public
oifname \"dummy0\" goto nat_POST_work
goto nat_POST_public
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8566\" ip netns exec fwd-test-11925     sh <<-\"HERE\"
    { { { { nft -nn list chain ip6 firewalld nat_PREROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8566" ip netns exec fwd-test-11925     sh <<-"HERE"
    { { { { nft -nn list chain ip6 firewalld nat_PREROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip6 firewalld {
chain nat_PREROUTING {
jump nat_PREROUTING_ZONES
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8566\" ip netns exec fwd-test-11925     sh <<-\"HERE\"
    { { { { nft -nn list chain ip6 firewalld nat_PREROUTING_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8566" ip netns exec fwd-test-11925     sh <<-"HERE"
    { { { { nft -nn list chain ip6 firewalld nat_PREROUTING_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip6 firewalld {
chain nat_PREROUTING_ZONES {
ip6 saddr dead:beef::/54 goto nat_PRE_public
goto nat_PREROUTING_ZONES_IFACES
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8566\" ip netns exec fwd-test-11925     sh <<-\"HERE\"
    { { { { nft -nn list chain ip6 firewalld nat_PREROUTING_ZONES_IFACES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8566" ip netns exec fwd-test-11925     sh <<-"HERE"
    { { { { nft -nn list chain ip6 firewalld nat_PREROUTING_ZONES_IFACES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip6 firewalld {
chain nat_PREROUTING_ZONES_IFACES {
iifname \"dummy1\" goto nat_PRE_public
iifname \"dummy0\" goto nat_PRE_work
goto nat_PRE_public
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8566\" ip netns exec fwd-test-11925     sh <<-\"HERE\"
    { { { { nft -nn list chain ip6 firewalld nat_POSTROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8566" ip netns exec fwd-test-11925     sh <<-"HERE"
    { { { { nft -nn list chain ip6 firewalld nat_POSTROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip6 firewalld {
chain nat_POSTROUTING {
jump nat_POSTROUTING_ZONES
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8566\" ip netns exec fwd-test-11925     sh <<-\"HERE\"
    { { { { nft -nn list chain ip6 firewalld nat_POSTROUTING_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8566" ip netns exec fwd-test-11925     sh <<-"HERE"
    { { { { nft -nn list chain ip6 firewalld nat_POSTROUTING_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip6 firewalld {
chain nat_POSTROUTING_ZONES {
ip6 daddr dead:beef::/54 goto nat_POST_public
goto nat_POSTROUTING_ZONES_IFACES
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8566\" ip netns exec fwd-test-11925     sh <<-\"HERE\"
    { { { { nft -nn list chain ip firewalld nat_POSTROUTING_ZONES_IFACES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8566" ip netns exec fwd-test-11925     sh <<-"HERE"
    { { { { nft -nn list chain ip firewalld nat_POSTROUTING_ZONES_IFACES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table ip firewalld {
chain nat_POSTROUTING_ZONES_IFACES {
oifname \"dummy1\" goto nat_POST_public
oifname \"dummy0\" goto nat_POST_work
goto nat_POST_public
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }














        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "gh258.at:445" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh258.at:445"
            $as_echo "gh258.at:445" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh258.at:445"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_78
#AT_START_79
at_fn_group_banner 79 'rhbz1715977.at:1' \
  "rich rule destination with service destination" " " 4
at_xfail=no
(
  $as_echo "79. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1715977.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1715977.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1715977.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-17864" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1: ip netns add fwd-test-17864"
at_fn_check_prepare_trace "rhbz1715977.at:1"
( $at_check_trace; ip netns add fwd-test-17864
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19510" ip netns exec fwd-test-17864 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-19510" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rhbz1715977.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1715977.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19510" ip netns exec fwd-test-17864 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1715977.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1715977.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19510" ip netns exec fwd-test-17864 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1715977.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1715977.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19510\" ip netns exec fwd-test-17864 firewall-cmd -q --permanent --zone=internal --add-interface=foobar0 "
at_fn_check_prepare_trace "rhbz1715977.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19510" ip netns exec fwd-test-17864 firewall-cmd -q --permanent --zone=internal --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19510\" ip netns exec fwd-test-17864 firewall-cmd -q --permanent --zone=internal --add-rich-rule='rule family=ipv4 destination address=\"192.168.122.235/32\" service name=\"ssh\" accept' "
at_fn_check_prepare_trace "rhbz1715977.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19510" ip netns exec fwd-test-17864 firewall-cmd -q --permanent --zone=internal --add-rich-rule='rule family=ipv4 destination address="192.168.122.235/32" service name="ssh" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19510\" ip netns exec fwd-test-17864 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1715977.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19510" ip netns exec fwd-test-17864 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19510\" ip netns exec fwd-test-17864 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1715977.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19510" ip netns exec fwd-test-17864 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19510\" ip netns exec fwd-test-17864 firewall-cmd -q --zone=internal --add-rich-rule='rule family=ipv4 destination address=\"192.168.122.235/32\" service name=\"mdns\" accept' "
at_fn_check_prepare_trace "rhbz1715977.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19510" ip netns exec fwd-test-17864 firewall-cmd -q --zone=internal --add-rich-rule='rule family=ipv4 destination address="192.168.122.235/32" service name="mdns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rhbz1715977.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19510\" ip netns exec fwd-test-17864 firewall-cmd -q --permanent --zone=internal --add-rich-rule='rule family=ipv4 destination address=\"192.168.122.235/32\" service name=\"mdns\" accept' "
at_fn_check_prepare_trace "rhbz1715977.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19510" ip netns exec fwd-test-17864 firewall-cmd -q --permanent --zone=internal --add-rich-rule='rule family=ipv4 destination address="192.168.122.235/32" service name="mdns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19510\" ip netns exec fwd-test-17864 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1715977.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19510" ip netns exec fwd-test-17864 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rhbz1715977.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19510\" ip netns exec fwd-test-17864 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1715977.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19510" ip netns exec fwd-test-17864 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 251 $at_status "$at_srcdir/rhbz1715977.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }












        if test x"-e '/ERROR: INVALID_RULE: Destination conflict with service/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_RULE: Destination conflict with service/d'"; then
                sed -i -e '/ERROR: INVALID_RULE: Destination conflict with service/d' ./firewalld.log
            fi
            $as_echo "rhbz1715977.at:12" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1715977.at:12"
            $as_echo "rhbz1715977.at:12" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1715977.at:12"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_79
#AT_START_80
at_fn_group_banner 80 'python.at:3' \
  "firewalld_test.py" "                              " 5
at_xfail=no
(
  $as_echo "80. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/python.at:3: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:3"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/python.at:3: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "python.at:3"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/python.at:3: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:3"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/python.at:3: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:3"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-16707" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/python.at:3: ip netns add fwd-test-16707"
at_fn_check_prepare_trace "python.at:3"
( $at_check_trace; ip netns add fwd-test-16707
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29196" ip netns exec fwd-test-16707 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-29196" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "python.at:3" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:3"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29196" ip netns exec fwd-test-16707 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "python.at:3" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:3"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29196" ip netns exec fwd-test-16707 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "python.at:3" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:3"





    { set +x
$as_echo "$at_srcdir/python.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29196\" ip netns exec fwd-test-16707 \$PYTHON \${srcdir}/python/firewalld_test.py "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29196" ip netns exec fwd-test-16707 $PYTHON ${srcdir}/python/firewalld_test.py
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/python.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"ignore" != x"ignore"; then
            if test -n "ignore"; then
                sed -i ignore ./firewalld.log
            fi
            $as_echo "python.at:6" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:6"
            $as_echo "python.at:6" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:6"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_80
#AT_START_81
at_fn_group_banner 81 'python.at:8' \
  "firewalld_config.py" "                            " 5
at_xfail=no
(
  $as_echo "81. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/python.at:8: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:8"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/python.at:8: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "python.at:8"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/python.at:8: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:8"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/python.at:8: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:8"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-1068" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/python.at:8: ip netns add fwd-test-1068"
at_fn_check_prepare_trace "python.at:8"
( $at_check_trace; ip netns add fwd-test-1068
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4632" ip netns exec fwd-test-1068 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-4632" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "python.at:8" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:8"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4632" ip netns exec fwd-test-1068 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "python.at:8" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:8"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4632" ip netns exec fwd-test-1068 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "python.at:8" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:8"





    { set +x
$as_echo "$at_srcdir/python.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-4632\" ip netns exec fwd-test-1068 \$PYTHON \${srcdir}/python/firewalld_config.py "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-4632" ip netns exec fwd-test-1068 $PYTHON ${srcdir}/python/firewalld_config.py
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/python.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"ignore" != x"ignore"; then
            if test -n "ignore"; then
                sed -i ignore ./firewalld.log
            fi
            $as_echo "python.at:11" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:11"
            $as_echo "python.at:11" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:11"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_81
#AT_START_82
at_fn_group_banner 82 'python.at:13' \
  "firewalld_rich.py" "                              " 5
at_xfail=no
(
  $as_echo "82. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/python.at:13: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:13"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/python.at:13: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "python.at:13"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/python.at:13: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:13"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/python.at:13: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:13"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-11077" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/python.at:13: ip netns add fwd-test-11077"
at_fn_check_prepare_trace "python.at:13"
( $at_check_trace; ip netns add fwd-test-11077
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2839" ip netns exec fwd-test-11077 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-2839" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "python.at:13" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:13"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2839" ip netns exec fwd-test-11077 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "python.at:13" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:13"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2839" ip netns exec fwd-test-11077 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "python.at:13" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:13"





    { set +x
$as_echo "$at_srcdir/python.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-2839\" ip netns exec fwd-test-11077 \$PYTHON \${srcdir}/python/firewalld_rich.py "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-2839" ip netns exec fwd-test-11077 $PYTHON ${srcdir}/python/firewalld_rich.py
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/python.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"ignore" != x"ignore"; then
            if test -n "ignore"; then
                sed -i ignore ./firewalld.log
            fi
            $as_echo "python.at:16" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:16"
            $as_echo "python.at:16" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:16"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_82
#AT_START_83
at_fn_group_banner 83 'python.at:18' \
  "firewalld_direct.py" "                            " 5
at_xfail=no
(
  $as_echo "83. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/python.at:18: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:18"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/python.at:18: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "python.at:18"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/python.at:18: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:18"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/python.at:18: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:18"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-6062" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/python.at:18: ip netns add fwd-test-6062"
at_fn_check_prepare_trace "python.at:18"
( $at_check_trace; ip netns add fwd-test-6062
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6184" ip netns exec fwd-test-6062 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-6184" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "python.at:18" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:18"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6184" ip netns exec fwd-test-6062 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "python.at:18" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:18"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6184" ip netns exec fwd-test-6062 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "python.at:18" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:18"





    { set +x
$as_echo "$at_srcdir/python.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6184\" ip netns exec fwd-test-6062 \$PYTHON \${srcdir}/python/firewalld_direct.py "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6184" ip netns exec fwd-test-6062 $PYTHON ${srcdir}/python/firewalld_direct.py
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/python.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }








        if test x"ignore" != x"ignore"; then
            if test -n "ignore"; then
                sed -i ignore ./firewalld.log
            fi
            $as_echo "python.at:21" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:21"
            $as_echo "python.at:21" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:21"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_83
#AT_START_84
at_fn_group_banner 84 'rfc3964_ipv4.at:1' \
  "RFC3964_IPv4" "                                   " 6
at_xfail=no
(
  $as_echo "84. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rfc3964_ipv4.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rfc3964_ipv4.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-28930" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1: ip netns add fwd-test-28930"
at_fn_check_prepare_trace "rfc3964_ipv4.at:1"
( $at_check_trace; ip netns add fwd-test-28930
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24273" ip netns exec fwd-test-28930 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-24273" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rfc3964_ipv4.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rfc3964_ipv4.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24273" ip netns exec fwd-test-28930 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rfc3964_ipv4.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rfc3964_ipv4.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24273" ip netns exec fwd-test-28930 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rfc3964_ipv4.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rfc3964_ipv4.at:1"





{ set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:4: sed -i 's/^LogDenied.*/LogDenied=all/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:4"
( $at_check_trace; sed -i 's/^LogDenied.*/LogDenied=all/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:5: sed -i 's/^RFC3964_IPv4.*/RFC3964_IPv4=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:5"
( $at_check_trace; sed -i 's/^RFC3964_IPv4.*/RFC3964_IPv4=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24273\" ip netns exec fwd-test-28930 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rfc3964_ipv4.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24273" ip netns exec fwd-test-28930 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24273\" ip netns exec fwd-test-28930 firewall-cmd -q --state "
at_fn_check_prepare_trace "rfc3964_ipv4.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24273" ip netns exec fwd-test-28930 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24273\" ip netns exec fwd-test-28930     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_FORWARD; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rfc3964_ipv4.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24273" ip netns exec fwd-test-28930     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_FORWARD; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD {
ct state established,related accept
ct status dnat accept
iifname \"lo\" accept
ip6 daddr { ::/96, ::ffff:0.0.0.0/96, 2002::/24, 2002:a00::/24, 2002:7f00::/24, 2002:a9fe::/32, 2002:ac10::/28, 2002:c0a8::/32, 2002:e000::/19 } log prefix \"RFC3964_IPv4_REJECT: \" reject with icmpv6 type addr-unreachable
jump filter_FORWARD_IN_ZONES
jump filter_FORWARD_OUT_ZONES
ct state invalid log prefix \"STATE_INVALID_DROP: \"
ct state invalid drop
log prefix \"FINAL_REJECT: \"
reject with icmpx type admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24273\" ip netns exec fwd-test-28930     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_OUTPUT; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rfc3964_ipv4.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24273" ip netns exec fwd-test-28930     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_OUTPUT; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_OUTPUT {
oifname \"lo\" accept
ip6 daddr { ::/96, ::ffff:0.0.0.0/96, 2002::/24, 2002:a00::/24, 2002:7f00::/24, 2002:a9fe::/32, 2002:ac10::/28, 2002:c0a8::/32, 2002:e000::/19 } log prefix \"RFC3964_IPv4_REJECT: \" reject with icmpv6 type addr-unreachable
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }
















{ set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:70: sed -i 's/^RFC3964_IPv4.*/RFC3964_IPv4=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:70"
( $at_check_trace; sed -i 's/^RFC3964_IPv4.*/RFC3964_IPv4=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24273\" ip netns exec fwd-test-28930 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rfc3964_ipv4.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24273" ip netns exec fwd-test-28930 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24273\" ip netns exec fwd-test-28930 firewall-cmd -q --state "
at_fn_check_prepare_trace "rfc3964_ipv4.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24273" ip netns exec fwd-test-28930 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:73:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24273\" ip netns exec fwd-test-28930     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_FORWARD; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rfc3964_ipv4.at:73"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24273" ip netns exec fwd-test-28930     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_FORWARD; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_FORWARD {
ct state established,related accept
ct status dnat accept
iifname \"lo\" accept
jump filter_FORWARD_IN_ZONES
jump filter_FORWARD_OUT_ZONES
ct state invalid log prefix \"STATE_INVALID_DROP: \"
ct state invalid drop
log prefix \"FINAL_REJECT: \"
reject with icmpx type admin-prohibited
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:73"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:88:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24273\" ip netns exec fwd-test-28930     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_OUTPUT; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rfc3964_ipv4.at:88"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24273" ip netns exec fwd-test-28930     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_OUTPUT; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_OUTPUT {
oifname \"lo\" accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:88"
$at_failed && at_fn_log_failure
$at_traceon; }























        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "rfc3964_ipv4.at:113" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rfc3964_ipv4.at:113"
            $as_echo "rfc3964_ipv4.at:113" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rfc3964_ipv4.at:113"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_84
#AT_START_85
at_fn_group_banner 85 'service_include.at:1' \
  "service include" "                                " 6
at_xfail=no
(
  $as_echo "85. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/service_include.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/service_include.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "service_include.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/service_include.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "service_include.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/service_include.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf"
at_fn_check_prepare_trace "service_include.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=nftables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                sed -i 's/^IPv6_rpfilter.*/IPv6_rpfilter=no/' ./firewalld.conf



                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-17209" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/service_include.at:1: ip netns add fwd-test-17209"
at_fn_check_prepare_trace "service_include.at:1"
( $at_check_trace; ip netns add fwd-test-17209
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18315" ip netns exec fwd-test-17209 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-18315" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "service_include.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/service_include.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18315" ip netns exec fwd-test-17209 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "service_include.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/service_include.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18315" ip netns exec fwd-test-17209 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "service_include.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/service_include.at:1"





{ set +x
$as_echo "$at_srcdir/service_include.at:4: mkdir -p ./services"
at_fn_check_prepare_trace "service_include.at:4"
( $at_check_trace; mkdir -p ./services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/service_include.at:5: cat <<HERE > ./services/my-service-with-include.xml
<?xml version=\"1.0\" encoding=\"utf-8\"?>
<service>
  <short>my-service-with-include</short>
  <description>This service includes other services</description>
  <port protocol=\"tcp\" port=\"12345\"/>
  <include service=\"ssdp\"/>
  <include service=\"mdns\"/>
  <include service=\"recursive-service\"/>
</service>
HERE
"
at_fn_check_prepare_notrace 'an embedded newline' "service_include.at:5"
( $at_check_trace; cat <<HERE > ./services/my-service-with-include.xml
<?xml version="1.0" encoding="utf-8"?>
<service>
  <short>my-service-with-include</short>
  <description>This service includes other services</description>
  <port protocol="tcp" port="12345"/>
  <include service="ssdp"/>
  <include service="mdns"/>
  <include service="recursive-service"/>
</service>
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/service_include.at:17: cat <<HERE > ./services/recursive-service.xml
<?xml version=\"1.0\" encoding=\"utf-8\"?>
<service>
  <short>recursive-service</short>
  <description>Include a service that included us</description>
  <include service=\"my-service-with-include\"/>
</service>
HERE
"
at_fn_check_prepare_notrace 'an embedded newline' "service_include.at:17"
( $at_check_trace; cat <<HERE > ./services/recursive-service.xml
<?xml version="1.0" encoding="utf-8"?>
<service>
  <short>recursive-service</short>
  <description>Include a service that included us</description>
  <include service="my-service-with-include"/>
</service>
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/service_include.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18315\" ip netns exec fwd-test-17209 firewall-cmd -q --reload "
at_fn_check_prepare_trace "service_include.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18315" ip netns exec fwd-test-17209 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18315\" ip netns exec fwd-test-17209 firewall-cmd -q --state "
at_fn_check_prepare_trace "service_include.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18315" ip netns exec fwd-test-17209 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/service_include.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18315\" ip netns exec fwd-test-17209 firewall-cmd -q --zone=drop --add-interface=foobar0 "
at_fn_check_prepare_trace "service_include.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18315" ip netns exec fwd-test-17209 firewall-cmd -q --zone=drop --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18315\" ip netns exec fwd-test-17209 firewall-cmd -q --zone=drop --add-service=my-service-with-include "
at_fn_check_prepare_trace "service_include.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18315" ip netns exec fwd-test-17209 firewall-cmd -q --zone=drop --add-service=my-service-with-include
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18315\" ip netns exec fwd-test-17209 firewall-cmd --zone=drop --list-services "
at_fn_check_prepare_trace "service_include.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18315" ip netns exec fwd-test-17209 firewall-cmd --zone=drop --list-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "my-service-with-include
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/service_include.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18315\" ip netns exec fwd-test-17209 firewall-cmd -q --zone=drop --add-service=recursive-service "
at_fn_check_prepare_trace "service_include.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18315" ip netns exec fwd-test-17209 firewall-cmd -q --zone=drop --add-service=recursive-service
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18315\" ip netns exec fwd-test-17209 firewall-cmd -q --zone=drop --remove-service=recursive-service "
at_fn_check_prepare_trace "service_include.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18315" ip netns exec fwd-test-17209 firewall-cmd -q --zone=drop --remove-service=recursive-service
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/service_include.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18315\" ip netns exec fwd-test-17209     sh <<-\"HERE\"
    { { { { nft -nn list chain inet firewalld filter_IN_drop_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \\(state\\|status\\)/{s/\\(ct \\(state\\|status\\)\\) {/\\1/g; s/ }//; s/\\([a-z]*\\), /\\1,/g;}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_include.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18315" ip netns exec fwd-test-17209     sh <<-"HERE"
    { { { { nft -nn list chain inet firewalld filter_IN_drop_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |             sed -e 's/meta mark/mark/g'        -e '/type.*hook.*priority.*policy.*/d'                -e '/ct \(state\|status\)/{s/\(ct \(state\|status\)\) {/\1/g; s/ }//; s/\([a-z]*\), /\1,/g;}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "table inet firewalld {
chain filter_IN_drop_allow {
ip daddr 239.255.255.250 udp dport 1900 ct state new,untracked accept
ip6 daddr ff02::c udp dport 1900 ct state new,untracked accept
ip daddr 224.0.0.251 udp dport 5353 ct state new,untracked accept
ip6 daddr ff02::fb udp dport 5353 ct state new,untracked accept
tcp dport 12345 ct state new,untracked accept
}
}
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }
















    { set +x
$as_echo "$at_srcdir/service_include.at:61:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18315\" ip netns exec fwd-test-17209 firewall-cmd --permanent --service=my-service-with-include --query-include=recursive-service "
at_fn_check_prepare_trace "service_include.at:61"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18315" ip netns exec fwd-test-17209 firewall-cmd --permanent --service=my-service-with-include --query-include=recursive-service
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:61"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18315\" ip netns exec fwd-test-17209 firewall-cmd -q --permanent --service=my-service-with-include --add-include=ssh "
at_fn_check_prepare_trace "service_include.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18315" ip netns exec fwd-test-17209 firewall-cmd -q --permanent --service=my-service-with-include --add-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:63:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18315\" ip netns exec fwd-test-17209 firewall-cmd --permanent --service=my-service-with-include --query-include=ssh "
at_fn_check_prepare_trace "service_include.at:63"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18315" ip netns exec fwd-test-17209 firewall-cmd --permanent --service=my-service-with-include --query-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/service_include.at:64: grep '<include service=\"ssh\"/>' ./services/my-service-with-include.xml "
at_fn_check_prepare_trace "service_include.at:64"
( $at_check_trace; grep '<include service="ssh"/>' ./services/my-service-with-include.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/service_include.at:65:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18315\" ip netns exec fwd-test-17209 firewall-cmd -q --permanent --service=my-service-with-include --remove-include=ssh "
at_fn_check_prepare_trace "service_include.at:65"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18315" ip netns exec fwd-test-17209 firewall-cmd -q --permanent --service=my-service-with-include --remove-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:66:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18315\" ip netns exec fwd-test-17209 firewall-cmd --permanent --service=my-service-with-include --query-include=ssh "
at_fn_check_prepare_trace "service_include.at:66"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18315" ip netns exec fwd-test-17209 firewall-cmd --permanent --service=my-service-with-include --query-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service_include.at:66"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/service_include.at:67: grep '<include service=\"ssh\"/>' ./services/my-service-with-include.xml "
at_fn_check_prepare_trace "service_include.at:67"
( $at_check_trace; grep '<include service="ssh"/>' ./services/my-service-with-include.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service_include.at:67"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/service_include.at:68:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18315\" ip netns exec fwd-test-17209 firewall-cmd --permanent --service=my-service-with-include --get-includes "
at_fn_check_prepare_trace "service_include.at:68"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18315" ip netns exec fwd-test-17209 firewall-cmd --permanent --service=my-service-with-include --get-includes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "mdns recursive-service ssdp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:68"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18315\" ip netns exec fwd-test-17209 firewall-cmd --permanent --info-service=my-service-with-include | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_include.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18315" ip netns exec fwd-test-17209 firewall-cmd --permanent --info-service=my-service-with-include | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "my-service-with-include
ports: 12345/tcp
protocols:
source-ports:
modules:
destination:
includes: mdns recursive-service ssdp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:80:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18315\" ip netns exec fwd-test-17209 firewall-cmd --info-service=my-service-with-include | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_include.at:80"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18315" ip netns exec fwd-test-17209 firewall-cmd --info-service=my-service-with-include | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "my-service-with-include
ports: 12345/tcp
protocols:
source-ports:
modules:
destination:
includes: mdns recursive-service ssdp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:80"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:91: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=recursive-service"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=recursive-service" "service_include.at:91"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=recursive-service
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:91"
$at_failed && at_fn_log_failure
$at_traceon; }



    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:92: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --add-include=ssh"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --add-include=ssh" "service_include.at:92"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --add-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:92"
$at_failed && at_fn_log_failure
$at_traceon; }



    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:93: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh" "service_include.at:93"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/service_include.at:94: grep '<include service=\"ssh\"/>' ./services/my-service-with-include.xml "
at_fn_check_prepare_trace "service_include.at:94"
( $at_check_trace; grep '<include service="ssh"/>' ./services/my-service-with-include.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }


    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:95: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --remove-include=ssh"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --remove-include=ssh" "service_include.at:95"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --remove-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }



    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:96: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh" "service_include.at:96"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service_include.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/service_include.at:97: grep '<include service=\"ssh\"/>' ./services/my-service-with-include.xml "
at_fn_check_prepare_trace "service_include.at:97"
( $at_check_trace; grep '<include service="ssh"/>' ./services/my-service-with-include.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service_include.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }


    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:98: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --get-includes"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --get-includes" "service_include.at:98"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --get-includes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "mdns recursive-service ssdp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:98"
$at_failed && at_fn_log_failure
$at_traceon; }



    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:101: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --info-service=my-service-with-include | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }"
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_include.at:101"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --info-service=my-service-with-include | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "my-service-with-include
ports: 12345/tcp
protocols:
source-ports:
modules:
destination:
includes: mdns recursive-service ssdp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:101"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/service_include.at:112:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18315\" ip netns exec fwd-test-17209 firewall-cmd -q --permanent --zone=drop --add-interface=foobar0 "
at_fn_check_prepare_trace "service_include.at:112"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18315" ip netns exec fwd-test-17209 firewall-cmd -q --permanent --zone=drop --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:113:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18315\" ip netns exec fwd-test-17209 firewall-cmd -q --permanent --zone=drop --add-service=my-service-with-include "
at_fn_check_prepare_trace "service_include.at:113"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18315" ip netns exec fwd-test-17209 firewall-cmd -q --permanent --zone=drop --add-service=my-service-with-include
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:113"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:114:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18315\" ip netns exec fwd-test-17209 firewall-cmd -q --permanent --service=my-service-with-include --add-include=does-not-exist "
at_fn_check_prepare_trace "service_include.at:114"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18315" ip netns exec fwd-test-17209 firewall-cmd -q --permanent --service=my-service-with-include --add-include=does-not-exist
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:114"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/service_include.at:115:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18315\" ip netns exec fwd-test-17209 firewall-cmd -q --reload "
at_fn_check_prepare_trace "service_include.at:115"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18315" ip netns exec fwd-test-17209 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/service_include.at:115"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:115:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18315\" ip netns exec fwd-test-17209 firewall-cmd -q --state "
at_fn_check_prepare_trace "service_include.at:115"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18315" ip netns exec fwd-test-17209 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 251 $at_status "$at_srcdir/service_include.at:115"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/service_include.at:116:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18315\" ip netns exec fwd-test-17209 firewall-cmd --zone=drop --list-services "
at_fn_check_prepare_trace "service_include.at:116"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18315" ip netns exec fwd-test-17209 firewall-cmd --zone=drop --list-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:116"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:119:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18315\" ip netns exec fwd-test-17209 firewall-cmd --zone=public --list-services "
at_fn_check_prepare_trace "service_include.at:119"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18315" ip netns exec fwd-test-17209 firewall-cmd --zone=public --list-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dhcpv6-client ssh
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:119"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:122:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18315\" ip netns exec fwd-test-17209 firewall-cmd -q --permanent --service=my-service-with-include --remove-include=does-not-exist "
at_fn_check_prepare_trace "service_include.at:122"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18315" ip netns exec fwd-test-17209 firewall-cmd -q --permanent --service=my-service-with-include --remove-include=does-not-exist
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:122"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/service_include.at:123:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18315\" ip netns exec fwd-test-17209 firewall-cmd -q --reload "
at_fn_check_prepare_trace "service_include.at:123"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18315" ip netns exec fwd-test-17209 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:123"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:123:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18315\" ip netns exec fwd-test-17209 firewall-cmd -q --state "
at_fn_check_prepare_trace "service_include.at:123"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18315" ip netns exec fwd-test-17209 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:123"
$at_failed && at_fn_log_failure
$at_traceon; }












        if test x"-e '/ERROR: INVALID_SERVICE: does-not-exist/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_SERVICE: does-not-exist/d'"; then
                sed -i -e '/ERROR: INVALID_SERVICE: does-not-exist/d' ./firewalld.log
            fi
            $as_echo "service_include.at:125" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/service_include.at:125"
            $as_echo "service_include.at:125" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/service_include.at:125"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_85
#AT_START_86
at_fn_group_banner 86 'firewall-cmd.at:5' \
  "basic options" "                                  " 7
at_xfail=no
(
  $as_echo "86. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:5"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:5"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:5"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:5"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-4125" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:5: ip netns add fwd-test-4125"
at_fn_check_prepare_trace "firewall-cmd.at:5"
( $at_check_trace; ip netns add fwd-test-4125
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28274" ip netns exec fwd-test-4125 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-28274" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:5" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:5"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28274" ip netns exec fwd-test-4125 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:5" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:5"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28274" ip netns exec fwd-test-4125 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:5" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:5"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28274\" ip netns exec fwd-test-4125 firewall-cmd -h "
at_fn_check_prepare_trace "firewall-cmd.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28274" ip netns exec fwd-test-4125 firewall-cmd -h
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28274\" ip netns exec fwd-test-4125 firewall-cmd --help "
at_fn_check_prepare_trace "firewall-cmd.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28274" ip netns exec fwd-test-4125 firewall-cmd --help
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28274\" ip netns exec fwd-test-4125 firewall-cmd -V "
at_fn_check_prepare_trace "firewall-cmd.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28274" ip netns exec fwd-test-4125 firewall-cmd -V
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28274\" ip netns exec fwd-test-4125 firewall-cmd --reload "
at_fn_check_prepare_trace "firewall-cmd.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28274" ip netns exec fwd-test-4125 firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28274\" ip netns exec fwd-test-4125 firewall-cmd --permanent --complete-reload "
at_fn_check_prepare_trace "firewall-cmd.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28274" ip netns exec fwd-test-4125 firewall-cmd --permanent --complete-reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28274\" ip netns exec fwd-test-4125 firewall-cmd --panic-on "
at_fn_check_prepare_trace "firewall-cmd.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28274" ip netns exec fwd-test-4125 firewall-cmd --panic-on
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28274\" ip netns exec fwd-test-4125 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28274" ip netns exec fwd-test-4125 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28274\" ip netns exec fwd-test-4125 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28274" ip netns exec fwd-test-4125 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28274\" ip netns exec fwd-test-4125 firewall-cmd --query-panic "
at_fn_check_prepare_trace "firewall-cmd.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28274" ip netns exec fwd-test-4125 firewall-cmd --query-panic
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "yes
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28274\" ip netns exec fwd-test-4125 firewall-cmd --panic-off "
at_fn_check_prepare_trace "firewall-cmd.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28274" ip netns exec fwd-test-4125 firewall-cmd --panic-off
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28274\" ip netns exec fwd-test-4125 firewall-cmd --query-panic "
at_fn_check_prepare_trace "firewall-cmd.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28274" ip netns exec fwd-test-4125 firewall-cmd --query-panic
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "no
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }










            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:26" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:26"
            $as_echo "firewall-cmd.at:26" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:26"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_86
#AT_START_87
at_fn_group_banner 87 'firewall-cmd.at:28' \
  "get/list options" "                               " 7
at_xfail=no
(
  $as_echo "87. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:28: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:28"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:28: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:28"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:28: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:28"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:28: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:28"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-2898" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:28: ip netns add fwd-test-2898"
at_fn_check_prepare_trace "firewall-cmd.at:28"
( $at_check_trace; ip netns add fwd-test-2898
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13850" ip netns exec fwd-test-2898 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-13850" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:28" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:28"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13850" ip netns exec fwd-test-2898 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:28" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:28"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13850" ip netns exec fwd-test-2898 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:28" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:28"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:31:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13850\" ip netns exec fwd-test-2898 firewall-cmd --get-zones "
at_fn_check_prepare_trace "firewall-cmd.at:31"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13850" ip netns exec fwd-test-2898 firewall-cmd --get-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13850\" ip netns exec fwd-test-2898 firewall-cmd --get-services "
at_fn_check_prepare_trace "firewall-cmd.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13850" ip netns exec fwd-test-2898 firewall-cmd --get-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13850\" ip netns exec fwd-test-2898 firewall-cmd --get-icmptypes "
at_fn_check_prepare_trace "firewall-cmd.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13850" ip netns exec fwd-test-2898 firewall-cmd --get-icmptypes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:34:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13850\" ip netns exec fwd-test-2898 firewall-cmd --permanent --get-zones "
at_fn_check_prepare_trace "firewall-cmd.at:34"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13850" ip netns exec fwd-test-2898 firewall-cmd --permanent --get-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:34"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13850\" ip netns exec fwd-test-2898 firewall-cmd --permanent --get-services "
at_fn_check_prepare_trace "firewall-cmd.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13850" ip netns exec fwd-test-2898 firewall-cmd --permanent --get-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13850\" ip netns exec fwd-test-2898 firewall-cmd --permanent --get-icmptypes "
at_fn_check_prepare_trace "firewall-cmd.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13850" ip netns exec fwd-test-2898 firewall-cmd --permanent --get-icmptypes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13850\" ip netns exec fwd-test-2898 firewall-cmd --list-all-zones "
at_fn_check_prepare_trace "firewall-cmd.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13850" ip netns exec fwd-test-2898 firewall-cmd --list-all-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13850\" ip netns exec fwd-test-2898 firewall-cmd --list-all "
at_fn_check_prepare_trace "firewall-cmd.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13850" ip netns exec fwd-test-2898 firewall-cmd --list-all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:40:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13850\" ip netns exec fwd-test-2898 firewall-cmd --permanent --list-all-zones "
at_fn_check_prepare_trace "firewall-cmd.at:40"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13850" ip netns exec fwd-test-2898 firewall-cmd --permanent --list-all-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:41:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13850\" ip netns exec fwd-test-2898 firewall-cmd --permanent --list-all "
at_fn_check_prepare_trace "firewall-cmd.at:41"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13850" ip netns exec fwd-test-2898 firewall-cmd --permanent --list-all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }










            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:42" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:42"
            $as_echo "firewall-cmd.at:42" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:42"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_87
#AT_START_88
at_fn_group_banner 88 'firewall-cmd.at:44' \
  "default zone" "                                   " 7
at_xfail=no
(
  $as_echo "88. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:44: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:44"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:44: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:44"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:44: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:44"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:44: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:44"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-5452" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:44: ip netns add fwd-test-5452"
at_fn_check_prepare_trace "firewall-cmd.at:44"
( $at_check_trace; ip netns add fwd-test-5452
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15784" ip netns exec fwd-test-5452 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-15784" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:44" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:44"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15784" ip netns exec fwd-test-5452 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:44" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:44"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15784" ip netns exec fwd-test-5452 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:44" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:44"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:47:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-15784\" ip netns exec fwd-test-5452 firewall-cmd --get-default-zone "
at_fn_check_prepare_trace "firewall-cmd.at:47"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15784" ip netns exec fwd-test-5452 firewall-cmd --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:47"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-15784\" ip netns exec fwd-test-5452 firewall-cmd --set-default-zone=\"home\" "
at_fn_check_prepare_trace "firewall-cmd.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15784" ip netns exec fwd-test-5452 firewall-cmd --set-default-zone="home"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:50:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-15784\" ip netns exec fwd-test-5452 firewall-cmd --get-default-zone "
at_fn_check_prepare_trace "firewall-cmd.at:50"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15784" ip netns exec fwd-test-5452 firewall-cmd --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "home
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:50"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-15784\" ip netns exec fwd-test-5452 firewall-cmd --set-default-zone=\"public\" "
at_fn_check_prepare_trace "firewall-cmd.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15784" ip netns exec fwd-test-5452 firewall-cmd --set-default-zone="public"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:53:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-15784\" ip netns exec fwd-test-5452 firewall-cmd --set-default-zone "
at_fn_check_prepare_trace "firewall-cmd.at:53"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15784" ip netns exec fwd-test-5452 firewall-cmd --set-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:53"
$at_failed && at_fn_log_failure
$at_traceon; }










            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:54" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:54"
            $as_echo "firewall-cmd.at:54" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:54"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_88
#AT_START_89
at_fn_group_banner 89 'firewall-cmd.at:56' \
  "user zone" "                                      " 7
at_xfail=no
(
  $as_echo "89. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:56: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:56"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:56: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:56"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:56: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:56"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:56: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:56"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-30460" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:56: ip netns add fwd-test-30460"
at_fn_check_prepare_trace "firewall-cmd.at:56"
( $at_check_trace; ip netns add fwd-test-30460
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31189" ip netns exec fwd-test-30460 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-31189" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:56" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:56"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31189" ip netns exec fwd-test-30460 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:56" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:56"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31189" ip netns exec fwd-test-30460 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:56" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:56"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:59:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31189\" ip netns exec fwd-test-30460 firewall-cmd --new-zone=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:59"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31189" ip netns exec fwd-test-30460 firewall-cmd --new-zone=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:59"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:60:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31189\" ip netns exec fwd-test-30460 firewall-cmd --permanent --new-zone=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:60"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31189" ip netns exec fwd-test-30460 firewall-cmd --permanent --new-zone=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:60"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:61:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31189\" ip netns exec fwd-test-30460 firewall-cmd --permanent --get-zones | grep foobar "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:61"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31189" ip netns exec fwd-test-30460 firewall-cmd --permanent --get-zones | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:61"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31189\" ip netns exec fwd-test-30460 firewall-cmd --permanent --zone=foobar --get-target | grep default "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31189" ip netns exec fwd-test-30460 firewall-cmd --permanent --zone=foobar --get-target | grep default
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:63:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31189\" ip netns exec fwd-test-30460 firewall-cmd --permanent --zone=foobar --set-target=BAD "
at_fn_check_prepare_trace "firewall-cmd.at:63"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31189" ip netns exec fwd-test-30460 firewall-cmd --permanent --zone=foobar --set-target=BAD
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 110 $at_status "$at_srcdir/firewall-cmd.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:64:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31189\" ip netns exec fwd-test-30460 firewall-cmd --permanent --zone=foobar --set-target=%%REJECT%% "
at_fn_check_prepare_trace "firewall-cmd.at:64"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31189" ip netns exec fwd-test-30460 firewall-cmd --permanent --zone=foobar --set-target=%%REJECT%%
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:65:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31189\" ip netns exec fwd-test-30460 firewall-cmd --permanent --zone=foobar --set-target=DROP "
at_fn_check_prepare_trace "firewall-cmd.at:65"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31189" ip netns exec fwd-test-30460 firewall-cmd --permanent --zone=foobar --set-target=DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:66:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31189\" ip netns exec fwd-test-30460 firewall-cmd --permanent --zone=foobar --set-target=ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:66"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31189" ip netns exec fwd-test-30460 firewall-cmd --permanent --zone=foobar --set-target=ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:66"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:67:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31189\" ip netns exec fwd-test-30460 firewall-cmd --permanent --zone=foobar --get-target | grep ACCEPT "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:67"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31189" ip netns exec fwd-test-30460 firewall-cmd --permanent --zone=foobar --get-target | grep ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:67"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:68:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31189\" ip netns exec fwd-test-30460 firewall-cmd --permanent --zone=foobar --add-service=ssh "
at_fn_check_prepare_trace "firewall-cmd.at:68"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31189" ip netns exec fwd-test-30460 firewall-cmd --permanent --zone=foobar --add-service=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:68"
$at_failed && at_fn_log_failure
$at_traceon; }










            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/ERROR: INVALID_TARGET: BAD/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_TARGET: BAD/d'"; then
                sed -i -e '/ERROR: INVALID_TARGET: BAD/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:69" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:69"
            $as_echo "firewall-cmd.at:69" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:69"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_89
#AT_START_90
at_fn_group_banner 90 'firewall-cmd.at:71' \
  "zone interfaces" "                                " 7
at_xfail=no
(
  $as_echo "90. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:71: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:71"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:71: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:71"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:71: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:71"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:71: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:71"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-5942" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:71: ip netns add fwd-test-5942"
at_fn_check_prepare_trace "firewall-cmd.at:71"
( $at_check_trace; ip netns add fwd-test-5942
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:71" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:71"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:71" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:71"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:71" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:71"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:74:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --zone=work --add-interface=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:74"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --zone=work --add-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:74"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:75:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --get-zone-of-interface=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:75"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --get-zone-of-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:75"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:77:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --get-active-zones "
at_fn_check_prepare_trace "firewall-cmd.at:77"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --get-active-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:77"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:78:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --zone work --query-interface=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:78"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --zone work --query-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:78"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:80:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --zone=public --change-interface=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:80"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --zone=public --change-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:80"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:81:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --get-zone-of-interface=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:81"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --get-zone-of-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:81"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:83:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --zone=block --add-interface=dummy1 "
at_fn_check_prepare_trace "firewall-cmd.at:83"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --zone=block --add-interface=dummy1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:83"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:84:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --zone=block --remove-interface=dummy1 "
at_fn_check_prepare_trace "firewall-cmd.at:84"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --zone=block --remove-interface=dummy1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:84"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:86:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --zone=dmz --change-zone=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:86"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --zone=dmz --change-zone=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:86"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:87:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --get-zone-of-interface=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:87"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --get-zone-of-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dmz
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:87"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:89:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --zone=dmz --list-interfaces "
at_fn_check_prepare_trace "firewall-cmd.at:89"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --zone=dmz --list-interfaces
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dummy
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:89"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:91:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --zone=dmz --remove-interface=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:91"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --zone=dmz --remove-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:91"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:92:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --zone=dmz --query-interface dummy "
at_fn_check_prepare_trace "firewall-cmd.at:92"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --zone=dmz --query-interface dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:92"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:94:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --zone=dmz --change-interface=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:94"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --zone=dmz --change-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:95:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --zone=dmz --query-interface dummy "
at_fn_check_prepare_trace "firewall-cmd.at:95"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --zone=dmz --query-interface dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:96:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --zone=dmz --remove-interface=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:96"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --zone=dmz --remove-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:98:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --zone=dmz --query-interface dummy "
at_fn_check_prepare_trace "firewall-cmd.at:98"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --zone=dmz --query-interface dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:98"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:99:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --get-zone-of-interface=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:99"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --get-zone-of-interface=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:99"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:100:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --get-zone-of-interface "
at_fn_check_prepare_trace "firewall-cmd.at:100"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --get-zone-of-interface
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:100"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:101:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --zone=dmz --get-zones "
at_fn_check_prepare_trace "firewall-cmd.at:101"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --zone=dmz --get-zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:101"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:102:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --zone=dmz --get-services "
at_fn_check_prepare_trace "firewall-cmd.at:102"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --zone=dmz --get-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:102"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:103:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --zone=dmz --get-default-zone "
at_fn_check_prepare_trace "firewall-cmd.at:103"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --zone=dmz --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:103"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:104:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --zone=dmz --set-default-zone "
at_fn_check_prepare_trace "firewall-cmd.at:104"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --zone=dmz --set-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:104"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:105:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --zone=dmz --get-zone-of-interface "
at_fn_check_prepare_trace "firewall-cmd.at:105"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --zone=dmz --get-zone-of-interface
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:105"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:107:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --permanent --zone=work --add-interface=perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:107"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --permanent --zone=work --add-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:107"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:108:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --permanent --zone=trusted --add-interface=perm_dummy2 "
at_fn_check_prepare_trace "firewall-cmd.at:108"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --permanent --zone=trusted --add-interface=perm_dummy2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:108"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:109:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:109"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:109"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:109:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:109"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:109"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:110:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --permanent --get-zone-of-interface=perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:110"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --permanent --get-zone-of-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:110"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:112:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --permanent --zone work --query-interface=perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:112"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --permanent --zone work --query-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:113:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --permanent --zone=work --list-interfaces "
at_fn_check_prepare_trace "firewall-cmd.at:113"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --permanent --zone=work --list-interfaces
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "perm_dummy
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:113"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:116:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --permanent --zone=public --add-interface=perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:116"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --permanent --zone=public --add-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 18 $at_status "$at_srcdir/firewall-cmd.at:116"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:119:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --permanent --zone=public --change-interface=perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:119"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --permanent --zone=public --change-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:119"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:120:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --permanent --get-zone-of-interface=perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:120"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --permanent --get-zone-of-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:120"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:122:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --permanent --zone=public --remove-interface=perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:122"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --permanent --zone=public --remove-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:122"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:123:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --permanent --zone=public --query-interface perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:123"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --permanent --zone=public --query-interface perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:123"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:124:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --permanent --zone=public --change-interface=perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:124"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --permanent --zone=public --change-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:124"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:125:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --permanent --get-zone-of-interface=perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:125"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --permanent --get-zone-of-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:125"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:127:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --permanent --zone=public --remove-interface=perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:127"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --permanent --zone=public --remove-interface=perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:127"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:128:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --permanent --zone=public --query-interface perm_dummy "
at_fn_check_prepare_trace "firewall-cmd.at:128"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --permanent --zone=public --query-interface perm_dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:128"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:129:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --permanent --zone=trusted --remove-interface=perm_dummy2 "
at_fn_check_prepare_trace "firewall-cmd.at:129"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --permanent --zone=trusted --remove-interface=perm_dummy2
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:129"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:130:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:130"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:130"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:130:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:130"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:130"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:132:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --add-interface=foo "
at_fn_check_prepare_trace "firewall-cmd.at:132"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --add-interface=foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:132"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:133:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --add-interface=bar --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:133"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --add-interface=bar --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:133"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:134:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --set-default-zone=trusted "
at_fn_check_prepare_trace "firewall-cmd.at:134"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --set-default-zone=trusted
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:134"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:135:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --get-default-zone "
at_fn_check_prepare_trace "firewall-cmd.at:135"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "trusted
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:135"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:138:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --query-interface foo --zone=trusted "
at_fn_check_prepare_trace "firewall-cmd.at:138"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --query-interface foo --zone=trusted
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:138"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:140:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --query-interface bar --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:140"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --query-interface bar --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:140"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:141:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --set-default-zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:141"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --set-default-zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:141"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:142:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --remove-interface=foo "
at_fn_check_prepare_trace "firewall-cmd.at:142"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --remove-interface=foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:142"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:143:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --remove-interface=bar "
at_fn_check_prepare_trace "firewall-cmd.at:143"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --remove-interface=bar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:143"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:148:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --zone=trusted --add-interface=+ "
at_fn_check_prepare_trace "firewall-cmd.at:148"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --zone=trusted --add-interface=+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:148"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:149:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --add-interface=foobar+++ "
at_fn_check_prepare_trace "firewall-cmd.at:149"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --add-interface=foobar+++
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:149"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:150:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --add-interface=foobar+ "
at_fn_check_prepare_trace "firewall-cmd.at:150"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --add-interface=foobar+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:150"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:161:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --zone=trusted --remove-interface=+ "
at_fn_check_prepare_trace "firewall-cmd.at:161"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --zone=trusted --remove-interface=+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:161"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:162:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --remove-interface=foobar+++ "
at_fn_check_prepare_trace "firewall-cmd.at:162"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --remove-interface=foobar+++
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:162"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:163:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --remove-interface=foobar+ "
at_fn_check_prepare_trace "firewall-cmd.at:163"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --remove-interface=foobar+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:163"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:164:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --permanent --add-interface=foobar+ "
at_fn_check_prepare_trace "firewall-cmd.at:164"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --permanent --add-interface=foobar+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:164"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:165:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd --permanent --remove-interface=foobar+ "
at_fn_check_prepare_trace "firewall-cmd.at:165"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd --permanent --remove-interface=foobar+
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:165"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:166:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:166"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:166"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:166:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22238\" ip netns exec fwd-test-5942 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:166"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22238" ip netns exec fwd-test-5942 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:166"
$at_failed && at_fn_log_failure
$at_traceon; }











            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/ERROR: ZONE_CONFLICT: perm_dummy/d'" != x"ignore"; then
            if test -n "-e '/ERROR: ZONE_CONFLICT: perm_dummy/d'"; then
                sed -i -e '/ERROR: ZONE_CONFLICT: perm_dummy/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:167" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:167"
            $as_echo "firewall-cmd.at:167" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:167"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_90
#AT_START_91
at_fn_group_banner 91 'firewall-cmd.at:169' \
  "zone sources" "                                   " 7
at_xfail=no
(
  $as_echo "91. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:169: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:169"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:169"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:169: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:169"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:169"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:169: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:169"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:169"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:169: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:169"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:169"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-7315" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:169: ip netns add fwd-test-7315"
at_fn_check_prepare_trace "firewall-cmd.at:169"
( $at_check_trace; ip netns add fwd-test-7315
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:169"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:169" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:169"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:169" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:169"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:169" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:169"











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --zone=public --add-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --zone=public --add-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --get-zone-of-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --zone=public --list-sources "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --get-active-zones | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep \"^\\(public\\|sources\\)\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --get-active-zones | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep "^\(public\|sources\)"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
sources: 1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --zone public --query-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --zone public --query-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --zone=work --change-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --zone=work --change-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --get-zone-of-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --zone=work --remove-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --zone=work --remove-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --zone work --query-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --zone work --query-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --get-zone-of-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --get-zone-of-source "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --get-zone-of-source
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --permanent --zone=public --add-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --permanent --zone=public --add-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --permanent --get-zone-of-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --permanent --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --permanent --zone=public --list-sources "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --permanent --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 1.2.3.4
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --permanent --zone public --query-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --permanent --zone public --query-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --permanent --zone=work --add-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --permanent --zone=work --add-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 18 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --permanent --zone=work --change-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --permanent --zone=work --change-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --permanent --get-zone-of-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --permanent --get-zone-of-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --permanent --zone=work --remove-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --permanent --zone=work --remove-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:210:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --permanent --zone work --query-source=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:210"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --permanent --zone work --query-source=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:210"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --zone=public --add-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --zone=public --add-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --get-zone-of-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --zone=public --list-sources "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --get-active-zones | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep \"^\\(public\\|sources\\)\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --get-active-zones | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep "^\(public\|sources\)"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
sources: 192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --zone public --query-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --zone public --query-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --zone=work --change-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --zone=work --change-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --get-zone-of-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --zone=work --remove-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --zone=work --remove-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --zone work --query-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --zone work --query-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --get-zone-of-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --get-zone-of-source "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --get-zone-of-source
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --permanent --zone=public --add-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --permanent --zone=public --add-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --permanent --get-zone-of-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --permanent --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --permanent --zone=public --list-sources "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --permanent --zone=public --list-sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^sources "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --permanent --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^sources
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "sources: 192.168.1.0/24
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --permanent --zone public --query-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --permanent --zone public --query-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --permanent --zone=work --add-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --permanent --zone=work --add-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 18 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --permanent --zone=work --change-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --permanent --zone=work --change-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --permanent --get-zone-of-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --permanent --get-zone-of-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "work
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --permanent --zone=work --remove-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --permanent --zone=work --remove-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:211:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5012\" ip netns exec fwd-test-7315 firewall-cmd --permanent --zone work --query-source=192.168.1.0/24 "
at_fn_check_prepare_trace "firewall-cmd.at:211"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5012" ip netns exec fwd-test-7315 firewall-cmd --permanent --zone work --query-source=192.168.1.0/24
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:211"
$at_failed && at_fn_log_failure
$at_traceon; }




















            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x" -e '/ERROR: ZONE_CONFLICT/d'" != x"ignore"; then
            if test -n " -e '/ERROR: ZONE_CONFLICT/d'"; then
                sed -i  -e '/ERROR: ZONE_CONFLICT/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:219" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:219"
            $as_echo "firewall-cmd.at:219" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:219"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_91
#AT_START_92
at_fn_group_banner 92 'firewall-cmd.at:221' \
  "services" "                                       " 7
at_xfail=no
(
  $as_echo "92. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:221: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:221"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:221"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:221: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:221"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:221"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:221: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:221"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:221"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:221: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:221"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:221"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-30638" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:221: ip netns add fwd-test-30638"
at_fn_check_prepare_trace "firewall-cmd.at:221"
( $at_check_trace; ip netns add fwd-test-30638
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:221"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8986" ip netns exec fwd-test-30638 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-8986" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:221" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:221"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8986" ip netns exec fwd-test-30638 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:221" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:221"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8986" ip netns exec fwd-test-30638 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:221" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:221"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:224:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8986\" ip netns exec fwd-test-30638 firewall-cmd --add-service=dns --timeout 60 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:224"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8986" ip netns exec fwd-test-30638 firewall-cmd --add-service=dns --timeout 60 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:224"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:225:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8986\" ip netns exec fwd-test-30638 firewall-cmd --query-service dns "
at_fn_check_prepare_trace "firewall-cmd.at:225"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8986" ip netns exec fwd-test-30638 firewall-cmd --query-service dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:225"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:226:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8986\" ip netns exec fwd-test-30638 firewall-cmd --remove-service=dns "
at_fn_check_prepare_trace "firewall-cmd.at:226"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8986" ip netns exec fwd-test-30638 firewall-cmd --remove-service=dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:226"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:227:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8986\" ip netns exec fwd-test-30638 firewall-cmd --query-service=dns "
at_fn_check_prepare_trace "firewall-cmd.at:227"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8986" ip netns exec fwd-test-30638 firewall-cmd --query-service=dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:227"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:228:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8986\" ip netns exec fwd-test-30638 firewall-cmd --add-service=smtpssssssss "
at_fn_check_prepare_trace "firewall-cmd.at:228"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8986" ip netns exec fwd-test-30638 firewall-cmd --add-service=smtpssssssss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/firewall-cmd.at:228"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:229:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8986\" ip netns exec fwd-test-30638 firewall-cmd --add-service=dns --timeout "
at_fn_check_prepare_trace "firewall-cmd.at:229"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8986" ip netns exec fwd-test-30638 firewall-cmd --add-service=dns --timeout
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:229"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:230:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8986\" ip netns exec fwd-test-30638 firewall-cmd --add-service=dns --add-interface=dummy0 "
at_fn_check_prepare_trace "firewall-cmd.at:230"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8986" ip netns exec fwd-test-30638 firewall-cmd --add-service=dns --add-interface=dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:230"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:232:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8986\" ip netns exec fwd-test-30638 firewall-cmd --permanent --zone=external --add-service=dns --timeout 60 "
at_fn_check_prepare_trace "firewall-cmd.at:232"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8986" ip netns exec fwd-test-30638 firewall-cmd --permanent --zone=external --add-service=dns --timeout 60
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:232"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:233:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8986\" ip netns exec fwd-test-30638 firewall-cmd --permanent --zone=external --add-service dns "
at_fn_check_prepare_trace "firewall-cmd.at:233"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8986" ip netns exec fwd-test-30638 firewall-cmd --permanent --zone=external --add-service dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:233"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:234:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8986\" ip netns exec fwd-test-30638 firewall-cmd --permanent --zone=external --list-services "
at_fn_check_prepare_trace "firewall-cmd.at:234"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8986" ip netns exec fwd-test-30638 firewall-cmd --permanent --zone=external --list-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dns ssh
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:234"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:236:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8986\" ip netns exec fwd-test-30638 firewall-cmd --permanent --zone=external --query-service dns "
at_fn_check_prepare_trace "firewall-cmd.at:236"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8986" ip netns exec fwd-test-30638 firewall-cmd --permanent --zone=external --query-service dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:236"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:237:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8986\" ip netns exec fwd-test-30638 firewall-cmd --permanent --zone=external --remove-service=dns "
at_fn_check_prepare_trace "firewall-cmd.at:237"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8986" ip netns exec fwd-test-30638 firewall-cmd --permanent --zone=external --remove-service=dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:237"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:242:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8986\" ip netns exec fwd-test-30638 firewall-cmd --permanent --zone=external --query-service=dns "
at_fn_check_prepare_trace "firewall-cmd.at:242"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8986" ip netns exec fwd-test-30638 firewall-cmd --permanent --zone=external --query-service=dns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:242"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:243:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8986\" ip netns exec fwd-test-30638 firewall-cmd --permanent --zone=external --add-service=smtpssssssss "
at_fn_check_prepare_trace "firewall-cmd.at:243"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8986" ip netns exec fwd-test-30638 firewall-cmd --permanent --zone=external --add-service=smtpssssssss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/firewall-cmd.at:243"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:244:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8986\" ip netns exec fwd-test-30638 firewall-cmd --permanent --zone=external --add-service=dns --add-interface=dummy0 "
at_fn_check_prepare_trace "firewall-cmd.at:244"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8986" ip netns exec fwd-test-30638 firewall-cmd --permanent --zone=external --add-service=dns --add-interface=dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:244"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:246:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8986\" ip netns exec fwd-test-30638 firewall-cmd --add-service=http --add-service=nfs --timeout=1h "
at_fn_check_prepare_trace "firewall-cmd.at:246"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8986" ip netns exec fwd-test-30638 firewall-cmd --add-service=http --add-service=nfs --timeout=1h
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:246"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:247:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8986\" ip netns exec fwd-test-30638 firewall-cmd --query-service http "
at_fn_check_prepare_trace "firewall-cmd.at:247"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8986" ip netns exec fwd-test-30638 firewall-cmd --query-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:247"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:248:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8986\" ip netns exec fwd-test-30638 firewall-cmd --query-service=nfs --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:248"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8986" ip netns exec fwd-test-30638 firewall-cmd --query-service=nfs --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:248"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:249:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8986\" ip netns exec fwd-test-30638 firewall-cmd --remove-service=nfs --remove-service=http "
at_fn_check_prepare_trace "firewall-cmd.at:249"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8986" ip netns exec fwd-test-30638 firewall-cmd --remove-service=nfs --remove-service=http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:249"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:250:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8986\" ip netns exec fwd-test-30638 firewall-cmd --query-service http "
at_fn_check_prepare_trace "firewall-cmd.at:250"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8986" ip netns exec fwd-test-30638 firewall-cmd --query-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:250"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:251:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8986\" ip netns exec fwd-test-30638 firewall-cmd --query-service nfs "
at_fn_check_prepare_trace "firewall-cmd.at:251"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8986" ip netns exec fwd-test-30638 firewall-cmd --query-service nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:251"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:253:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8986\" ip netns exec fwd-test-30638 firewall-cmd --permanent --add-service=http --add-service=nfs "
at_fn_check_prepare_trace "firewall-cmd.at:253"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8986" ip netns exec fwd-test-30638 firewall-cmd --permanent --add-service=http --add-service=nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:253"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:254:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8986\" ip netns exec fwd-test-30638 firewall-cmd --permanent --query-service http "
at_fn_check_prepare_trace "firewall-cmd.at:254"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8986" ip netns exec fwd-test-30638 firewall-cmd --permanent --query-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:254"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:255:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8986\" ip netns exec fwd-test-30638 firewall-cmd --permanent --query-service=nfs --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:255"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8986" ip netns exec fwd-test-30638 firewall-cmd --permanent --query-service=nfs --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:255"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:256:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8986\" ip netns exec fwd-test-30638 firewall-cmd --permanent --remove-service=nfs --remove-service=http "
at_fn_check_prepare_trace "firewall-cmd.at:256"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8986" ip netns exec fwd-test-30638 firewall-cmd --permanent --remove-service=nfs --remove-service=http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:256"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:261:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8986\" ip netns exec fwd-test-30638 firewall-cmd --permanent  --query-service http "
at_fn_check_prepare_trace "firewall-cmd.at:261"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8986" ip netns exec fwd-test-30638 firewall-cmd --permanent  --query-service http
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:261"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:262:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8986\" ip netns exec fwd-test-30638 firewall-cmd --permanent  --query-service nfs "
at_fn_check_prepare_trace "firewall-cmd.at:262"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8986" ip netns exec fwd-test-30638 firewall-cmd --permanent  --query-service nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:262"
$at_failed && at_fn_log_failure
$at_traceon; }










            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/ERROR: INVALID_SERVICE:/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_SERVICE:/d'"; then
                sed -i -e '/ERROR: INVALID_SERVICE:/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:263" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:263"
            $as_echo "firewall-cmd.at:263" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:263"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_92
#AT_START_93
at_fn_group_banner 93 'firewall-cmd.at:265' \
  "user services" "                                  " 7
at_xfail=no
(
  $as_echo "93. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:265: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:265"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:265"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:265: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:265"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:265"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:265: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:265"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:265"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:265: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:265"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:265"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-15845" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:265: ip netns add fwd-test-15845"
at_fn_check_prepare_trace "firewall-cmd.at:265"
( $at_check_trace; ip netns add fwd-test-15845
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:265"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:265" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:265"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:265" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:265"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:265" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:265"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:268:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --new-service=ssh "
at_fn_check_prepare_trace "firewall-cmd.at:268"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --new-service=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 26 $at_status "$at_srcdir/firewall-cmd.at:268"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:270:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --new-service=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:270"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --new-service=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:270"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:271:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --get-services | grep foobar "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:271"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --get-services | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:271"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:273:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --add-port=666 "
at_fn_check_prepare_trace "firewall-cmd.at:273"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --add-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:273"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:274:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --add-port=666/dummy "
at_fn_check_prepare_trace "firewall-cmd.at:274"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --add-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:274"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:275:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --add-port=666/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:275"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --add-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:275"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:276:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --remove-port=666/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:276"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --remove-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:276"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:277:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --add-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:277"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --add-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:277"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:278:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --query-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:278"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:278"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:279:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --remove-port 111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:279"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --remove-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:279"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:280:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --query-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:280"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:280"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:281:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --add-port=666/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:281"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --add-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:281"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:282:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --remove-port=666/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:282"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --remove-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:282"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:283:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --remove-port 666/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:283"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --remove-port 666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:283"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:284:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --query-port=666/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:284"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --query-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:284"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:285:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --add-port=999/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:285"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --add-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:285"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:286:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --remove-port=999/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:286"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --remove-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:286"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:287:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --remove-port 999/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:287"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --remove-port 999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:287"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:288:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --query-port=999/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:288"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --query-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:288"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:289:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --add-port=666/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:289"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --add-port=666/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:289"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:290:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --add-port=999/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:290"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --add-port=999/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:290"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:292:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --add-protocol=ddp --add-protocol gre "
at_fn_check_prepare_trace "firewall-cmd.at:292"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --add-protocol=ddp --add-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:292"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:293:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --query-protocol=ddp "
at_fn_check_prepare_trace "firewall-cmd.at:293"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:293"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:294:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --query-protocol=gre "
at_fn_check_prepare_trace "firewall-cmd.at:294"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:294"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:295:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --remove-protocol ddp "
at_fn_check_prepare_trace "firewall-cmd.at:295"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --remove-protocol ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:295"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:296:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --remove-protocol gre "
at_fn_check_prepare_trace "firewall-cmd.at:296"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --remove-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:296"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:297:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --query-protocol=ddp "
at_fn_check_prepare_trace "firewall-cmd.at:297"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:297"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:298:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --query-protocol=gre "
at_fn_check_prepare_trace "firewall-cmd.at:298"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:298"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:300:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --add-module=sip "
at_fn_check_prepare_trace "firewall-cmd.at:300"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --add-module=sip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:300"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:301:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --remove-module=sip "
at_fn_check_prepare_trace "firewall-cmd.at:301"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --remove-module=sip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:301"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:302:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --add-module=ftp "
at_fn_check_prepare_trace "firewall-cmd.at:302"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --add-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:302"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:303:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --query-module=ftp "
at_fn_check_prepare_trace "firewall-cmd.at:303"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --query-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:303"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:304:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --remove-module=ftp "
at_fn_check_prepare_trace "firewall-cmd.at:304"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --remove-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:304"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:305:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --query-module=ftp "
at_fn_check_prepare_trace "firewall-cmd.at:305"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --query-module=ftp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:305"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:307:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --set-destination=ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:307"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --set-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 121 $at_status "$at_srcdir/firewall-cmd.at:307"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:308:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --set-destination=ipv4:foo "
at_fn_check_prepare_trace "firewall-cmd.at:308"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --set-destination=ipv4:foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/firewall-cmd.at:308"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:309:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --set-destination=ipv4:1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:309"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --set-destination=ipv4:1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:309"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:310:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --remove-destination=ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:310"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --service=foobar --remove-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:310"
$at_failed && at_fn_log_failure
$at_traceon; }














    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:318:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --zone=public --add-service=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:318"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --zone=public --add-service=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:318"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:319:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --zone=public --list-services | grep foobar "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:319"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --zone=public --list-services | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:319"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:320:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --delete-service=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:320"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --delete-service=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:320"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:321:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --zone=public --list-services | grep foobar "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:321"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --zone=public --list-services | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:321"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./foobar-to-be-renamed <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<protocol value="icmp" />
<port protocol="tcp" port="1234" />
</service>




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:323:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --new-service-from-file=\"./foobar-to-be-renamed\" --name=\"foobar-from-file\" "
at_fn_check_prepare_trace "firewall-cmd.at:323"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --new-service-from-file="./foobar-to-be-renamed" --name="foobar-from-file"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:323"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:323:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-24653\" ip netns exec fwd-test-15845 firewall-cmd --permanent --get-services | grep foobar-from-file "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:323"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-24653" ip netns exec fwd-test-15845 firewall-cmd --permanent --get-services | grep foobar-from-file
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:323"
$at_failed && at_fn_log_failure
$at_traceon; }




_ATEOF








            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/ERROR: NAME_CONFLICT: new_service():/d'               -e '/ERROR: INVALID_ADDR:/d'" != x"ignore"; then
            if test -n "-e '/ERROR: NAME_CONFLICT: new_service():/d'               -e '/ERROR: INVALID_ADDR:/d'"; then
                sed -i -e '/ERROR: NAME_CONFLICT: new_service():/d'               -e '/ERROR: INVALID_ADDR:/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:334" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:334"
            $as_echo "firewall-cmd.at:334" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:334"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_93
#AT_START_94
at_fn_group_banner 94 'firewall-cmd.at:337' \
  "ports" "                                          " 7
at_xfail=no
(
  $as_echo "94. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:337: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:337"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:337"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:337: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:337"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:337"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:337: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:337"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:337"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:337: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:337"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:337"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-12160" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:337: ip netns add fwd-test-12160"
at_fn_check_prepare_trace "firewall-cmd.at:337"
( $at_check_trace; ip netns add fwd-test-12160
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:337"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:337" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:337"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:337" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:337"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:337" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:337"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:340:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --zone home --list-ports "
at_fn_check_prepare_trace "firewall-cmd.at:340"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --zone home --list-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:340"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:341:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --add-port=666 "
at_fn_check_prepare_trace "firewall-cmd.at:341"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --add-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:341"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:342:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --add-port=666/dummy "
at_fn_check_prepare_trace "firewall-cmd.at:342"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --add-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:342"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:343:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --add-port 122/udpa --add-port 122/udpp --add-port 8745897/foo "
at_fn_check_prepare_trace "firewall-cmd.at:343"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --add-port 122/udpa --add-port 122/udpp --add-port 8745897/foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 254 $at_status "$at_srcdir/firewall-cmd.at:343"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:344:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --add-port 122/udpa --add-port 122/udpp --add-port 8745897/foo --add-port bar "
at_fn_check_prepare_trace "firewall-cmd.at:344"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --add-port 122/udpa --add-port 122/udpp --add-port 8745897/foo --add-port bar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 254 $at_status "$at_srcdir/firewall-cmd.at:344"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:345:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --add-port=666/tcp --zone=public --timeout=30m "
at_fn_check_prepare_trace "firewall-cmd.at:345"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --add-port=666/tcp --zone=public --timeout=30m
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:345"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:346:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --remove-port=666/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:346"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --remove-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:346"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:347:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --add-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:347"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --add-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:347"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:348:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --query-port=111-222/udp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:348"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --query-port=111-222/udp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:348"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:349:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --remove-port 111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:349"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --remove-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:349"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:350:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --query-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:350"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:350"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:352:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --add-port=5000/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:352"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --add-port=5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:352"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:353:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --query-port=5000/sctp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:353"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --query-port=5000/sctp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:353"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:354:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --remove-port 5000/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:354"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --remove-port 5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:354"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:355:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --query-port=5000/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:355"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --query-port=5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:355"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:356:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --add-port=222/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:356"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --add-port=222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:356"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:357:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --query-port=222/dccp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:357"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --query-port=222/dccp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:357"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:358:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --remove-port 222/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:358"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --remove-port 222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:358"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:359:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --query-port=222/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:359"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --query-port=222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:359"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:361:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --permanent --add-port=666 "
at_fn_check_prepare_trace "firewall-cmd.at:361"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --permanent --add-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:361"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:362:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --permanent --add-port=666/dummy "
at_fn_check_prepare_trace "firewall-cmd.at:362"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --permanent --add-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:362"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:363:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --permanent --add-port=666/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:363"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --permanent --add-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:363"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:364:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --permanent --remove-port=666/tcp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:364"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --permanent --remove-port=666/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:364"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:365:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --permanent --add-port=111-222/udp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:365"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --permanent --add-port=111-222/udp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:365"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:366:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --permanent --query-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:366"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --permanent --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:366"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:367:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --permanent --remove-port 111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:367"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --permanent --remove-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:367"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:368:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --permanent --query-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:368"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --permanent --query-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:368"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:370:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --permanent --add-port=5000/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:370"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --permanent --add-port=5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:370"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:371:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --permanent --query-port=5000/sctp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:371"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --permanent --query-port=5000/sctp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:371"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:372:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --permanent --remove-port 5000/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:372"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --permanent --remove-port 5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:372"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:373:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --permanent --query-port=5000/sctp "
at_fn_check_prepare_trace "firewall-cmd.at:373"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --permanent --query-port=5000/sctp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:373"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:374:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --permanent --add-port=222/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:374"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --permanent --add-port=222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:374"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:375:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --permanent --query-port=222/dccp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:375"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --permanent --query-port=222/dccp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:375"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:376:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --permanent --remove-port 222/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:376"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --permanent --remove-port 222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:376"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:377:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --permanent --query-port=222/dccp "
at_fn_check_prepare_trace "firewall-cmd.at:377"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --permanent --query-port=222/dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:377"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:379:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --add-port=80/tcp --add-port 443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:379"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --add-port=80/tcp --add-port 443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:379"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:380:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --query-port=80/tcp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:380"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --query-port=80/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:380"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:381:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --query-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:381"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --query-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:381"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:382:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --remove-port 80/tcp --remove-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:382"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --remove-port 80/tcp --remove-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:382"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:383:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --query-port=80/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:383"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --query-port=80/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:383"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:384:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --query-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:384"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --query-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:384"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:386:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --permanent --add-port=80/tcp --add-port 443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:386"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --permanent --add-port=80/tcp --add-port 443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:386"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:387:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --permanent --query-port=80/tcp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:387"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --permanent --query-port=80/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:387"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:388:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --permanent --query-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:388"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --permanent --query-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:388"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:389:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --permanent --remove-port 80/tcp --remove-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:389"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --permanent --remove-port 80/tcp --remove-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:389"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:390:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --permanent --query-port=80/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:390"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --permanent --query-port=80/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:390"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:391:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14749\" ip netns exec fwd-test-12160 firewall-cmd --permanent --query-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:391"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14749" ip netns exec fwd-test-12160 firewall-cmd --permanent --query-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:391"
$at_failed && at_fn_log_failure
$at_traceon; }










            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:392" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:392"
            $as_echo "firewall-cmd.at:392" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:392"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_94
#AT_START_95
at_fn_group_banner 95 'firewall-cmd.at:394' \
  "source ports" "                                   " 7
at_xfail=no
(
  $as_echo "95. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:394: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:394"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:394"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:394: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:394"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:394"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:394: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:394"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:394"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:394: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:394"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:394"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-8346" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:394: ip netns add fwd-test-8346"
at_fn_check_prepare_trace "firewall-cmd.at:394"
( $at_check_trace; ip netns add fwd-test-8346
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:394"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12124" ip netns exec fwd-test-8346 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-12124" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:394" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:394"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12124" ip netns exec fwd-test-8346 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:394" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:394"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12124" ip netns exec fwd-test-8346 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:394" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:394"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:397:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12124\" ip netns exec fwd-test-8346 firewall-cmd --zone home --list-source-ports "
at_fn_check_prepare_trace "firewall-cmd.at:397"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12124" ip netns exec fwd-test-8346 firewall-cmd --zone home --list-source-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:397"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:398:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12124\" ip netns exec fwd-test-8346 firewall-cmd --add-source-port=666 "
at_fn_check_prepare_trace "firewall-cmd.at:398"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12124" ip netns exec fwd-test-8346 firewall-cmd --add-source-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:398"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:399:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12124\" ip netns exec fwd-test-8346 firewall-cmd --add-source-port=666/dummy "
at_fn_check_prepare_trace "firewall-cmd.at:399"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12124" ip netns exec fwd-test-8346 firewall-cmd --add-source-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:399"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:400:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12124\" ip netns exec fwd-test-8346 firewall-cmd --add-source-port=666/tcp --zone=public --timeout=30m "
at_fn_check_prepare_trace "firewall-cmd.at:400"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12124" ip netns exec fwd-test-8346 firewall-cmd --add-source-port=666/tcp --zone=public --timeout=30m
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:400"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:401:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12124\" ip netns exec fwd-test-8346 firewall-cmd --remove-source-port=666/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:401"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12124" ip netns exec fwd-test-8346 firewall-cmd --remove-source-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:401"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:402:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12124\" ip netns exec fwd-test-8346 firewall-cmd --add-source-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:402"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12124" ip netns exec fwd-test-8346 firewall-cmd --add-source-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:402"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:403:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12124\" ip netns exec fwd-test-8346 firewall-cmd --query-source-port=111-222/udp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:403"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12124" ip netns exec fwd-test-8346 firewall-cmd --query-source-port=111-222/udp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:403"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:404:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12124\" ip netns exec fwd-test-8346 firewall-cmd --remove-source-port 111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:404"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12124" ip netns exec fwd-test-8346 firewall-cmd --remove-source-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:404"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:405:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12124\" ip netns exec fwd-test-8346 firewall-cmd --query-source-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:405"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12124" ip netns exec fwd-test-8346 firewall-cmd --query-source-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:405"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:407:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12124\" ip netns exec fwd-test-8346 firewall-cmd --permanent --add-source-port=666 "
at_fn_check_prepare_trace "firewall-cmd.at:407"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12124" ip netns exec fwd-test-8346 firewall-cmd --permanent --add-source-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:407"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:408:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12124\" ip netns exec fwd-test-8346 firewall-cmd --permanent --add-source-port=666/dummy "
at_fn_check_prepare_trace "firewall-cmd.at:408"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12124" ip netns exec fwd-test-8346 firewall-cmd --permanent --add-source-port=666/dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:408"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:409:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12124\" ip netns exec fwd-test-8346 firewall-cmd --permanent --add-source-port=666/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:409"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12124" ip netns exec fwd-test-8346 firewall-cmd --permanent --add-source-port=666/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:409"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:410:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12124\" ip netns exec fwd-test-8346 firewall-cmd --permanent --remove-source-port=666/tcp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:410"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12124" ip netns exec fwd-test-8346 firewall-cmd --permanent --remove-source-port=666/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:410"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:411:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12124\" ip netns exec fwd-test-8346 firewall-cmd --permanent --add-source-port=111-222/udp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:411"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12124" ip netns exec fwd-test-8346 firewall-cmd --permanent --add-source-port=111-222/udp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:411"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:412:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12124\" ip netns exec fwd-test-8346 firewall-cmd --permanent --query-source-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:412"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12124" ip netns exec fwd-test-8346 firewall-cmd --permanent --query-source-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:412"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:413:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12124\" ip netns exec fwd-test-8346 firewall-cmd --permanent --remove-source-port 111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:413"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12124" ip netns exec fwd-test-8346 firewall-cmd --permanent --remove-source-port 111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:413"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:414:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12124\" ip netns exec fwd-test-8346 firewall-cmd --permanent --query-source-port=111-222/udp "
at_fn_check_prepare_trace "firewall-cmd.at:414"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12124" ip netns exec fwd-test-8346 firewall-cmd --permanent --query-source-port=111-222/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:414"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:416:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12124\" ip netns exec fwd-test-8346 firewall-cmd --add-source-port=80/tcp --add-source-port 443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:416"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12124" ip netns exec fwd-test-8346 firewall-cmd --add-source-port=80/tcp --add-source-port 443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:416"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:417:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12124\" ip netns exec fwd-test-8346 firewall-cmd --query-source-port=80/tcp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:417"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12124" ip netns exec fwd-test-8346 firewall-cmd --query-source-port=80/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:417"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:418:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12124\" ip netns exec fwd-test-8346 firewall-cmd --query-source-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:418"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12124" ip netns exec fwd-test-8346 firewall-cmd --query-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:418"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:419:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12124\" ip netns exec fwd-test-8346 firewall-cmd --remove-source-port 80/tcp --remove-source-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:419"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12124" ip netns exec fwd-test-8346 firewall-cmd --remove-source-port 80/tcp --remove-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:419"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:420:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12124\" ip netns exec fwd-test-8346 firewall-cmd --query-source-port=80/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:420"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12124" ip netns exec fwd-test-8346 firewall-cmd --query-source-port=80/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:420"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:421:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12124\" ip netns exec fwd-test-8346 firewall-cmd --query-source-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:421"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12124" ip netns exec fwd-test-8346 firewall-cmd --query-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:421"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:423:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12124\" ip netns exec fwd-test-8346 firewall-cmd --permanent --add-source-port=80/tcp --add-source-port 443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:423"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12124" ip netns exec fwd-test-8346 firewall-cmd --permanent --add-source-port=80/tcp --add-source-port 443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:423"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:424:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12124\" ip netns exec fwd-test-8346 firewall-cmd --permanent --query-source-port=80/tcp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:424"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12124" ip netns exec fwd-test-8346 firewall-cmd --permanent --query-source-port=80/tcp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:424"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:425:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12124\" ip netns exec fwd-test-8346 firewall-cmd --permanent --query-source-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:425"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12124" ip netns exec fwd-test-8346 firewall-cmd --permanent --query-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:425"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:426:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12124\" ip netns exec fwd-test-8346 firewall-cmd --permanent --remove-source-port 80/tcp --remove-source-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:426"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12124" ip netns exec fwd-test-8346 firewall-cmd --permanent --remove-source-port 80/tcp --remove-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:426"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:427:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12124\" ip netns exec fwd-test-8346 firewall-cmd --permanent --query-source-port=80/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:427"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12124" ip netns exec fwd-test-8346 firewall-cmd --permanent --query-source-port=80/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:427"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:428:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-12124\" ip netns exec fwd-test-8346 firewall-cmd --permanent --query-source-port=443-444/udp "
at_fn_check_prepare_trace "firewall-cmd.at:428"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-12124" ip netns exec fwd-test-8346 firewall-cmd --permanent --query-source-port=443-444/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:428"
$at_failed && at_fn_log_failure
$at_traceon; }










            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:429" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:429"
            $as_echo "firewall-cmd.at:429" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:429"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_95
#AT_START_96
at_fn_group_banner 96 'firewall-cmd.at:431' \
  "protocols" "                                      " 7
at_xfail=no
(
  $as_echo "96. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:431: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:431"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:431"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:431: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:431"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:431"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:431: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:431"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:431"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:431: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:431"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:431"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-2508" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:431: ip netns add fwd-test-2508"
at_fn_check_prepare_trace "firewall-cmd.at:431"
( $at_check_trace; ip netns add fwd-test-2508
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:431"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28630" ip netns exec fwd-test-2508 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-28630" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:431" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:431"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28630" ip netns exec fwd-test-2508 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:431" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:431"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28630" ip netns exec fwd-test-2508 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:431" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:431"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:434:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28630\" ip netns exec fwd-test-2508 firewall-cmd --add-protocol=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:434"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28630" ip netns exec fwd-test-2508 firewall-cmd --add-protocol=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:434"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:435:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28630\" ip netns exec fwd-test-2508 firewall-cmd --add-protocol=dccp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:435"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28630" ip netns exec fwd-test-2508 firewall-cmd --add-protocol=dccp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:435"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:436:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28630\" ip netns exec fwd-test-2508 firewall-cmd --query-protocol=dccp "
at_fn_check_prepare_trace "firewall-cmd.at:436"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28630" ip netns exec fwd-test-2508 firewall-cmd --query-protocol=dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:436"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:437:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28630\" ip netns exec fwd-test-2508 firewall-cmd --remove-protocol dccp "
at_fn_check_prepare_trace "firewall-cmd.at:437"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28630" ip netns exec fwd-test-2508 firewall-cmd --remove-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:437"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:438:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28630\" ip netns exec fwd-test-2508 firewall-cmd --query-protocol=dccp "
at_fn_check_prepare_trace "firewall-cmd.at:438"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28630" ip netns exec fwd-test-2508 firewall-cmd --query-protocol=dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:438"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:439:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28630\" ip netns exec fwd-test-2508 firewall-cmd --permanent --add-protocol=dummy "
at_fn_check_prepare_trace "firewall-cmd.at:439"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28630" ip netns exec fwd-test-2508 firewall-cmd --permanent --add-protocol=dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:439"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:440:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28630\" ip netns exec fwd-test-2508 firewall-cmd --permanent --add-protocol=dccp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:440"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28630" ip netns exec fwd-test-2508 firewall-cmd --permanent --add-protocol=dccp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:440"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:441:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28630\" ip netns exec fwd-test-2508 firewall-cmd --permanent --query-protocol=dccp "
at_fn_check_prepare_trace "firewall-cmd.at:441"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28630" ip netns exec fwd-test-2508 firewall-cmd --permanent --query-protocol=dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:441"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:442:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28630\" ip netns exec fwd-test-2508 firewall-cmd --permanent --remove-protocol dccp "
at_fn_check_prepare_trace "firewall-cmd.at:442"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28630" ip netns exec fwd-test-2508 firewall-cmd --permanent --remove-protocol dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:442"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:443:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28630\" ip netns exec fwd-test-2508 firewall-cmd --permanent --query-protocol=dccp "
at_fn_check_prepare_trace "firewall-cmd.at:443"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28630" ip netns exec fwd-test-2508 firewall-cmd --permanent --query-protocol=dccp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:443"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:445:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28630\" ip netns exec fwd-test-2508 firewall-cmd --add-protocol=ddp --add-protocol gre "
at_fn_check_prepare_trace "firewall-cmd.at:445"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28630" ip netns exec fwd-test-2508 firewall-cmd --add-protocol=ddp --add-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:445"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:446:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28630\" ip netns exec fwd-test-2508 firewall-cmd --query-protocol=ddp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:446"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28630" ip netns exec fwd-test-2508 firewall-cmd --query-protocol=ddp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:446"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:447:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28630\" ip netns exec fwd-test-2508 firewall-cmd --query-protocol=gre "
at_fn_check_prepare_trace "firewall-cmd.at:447"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28630" ip netns exec fwd-test-2508 firewall-cmd --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:447"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:448:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28630\" ip netns exec fwd-test-2508 firewall-cmd --remove-protocol ddp --remove-protocol=gre "
at_fn_check_prepare_trace "firewall-cmd.at:448"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28630" ip netns exec fwd-test-2508 firewall-cmd --remove-protocol ddp --remove-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:448"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:449:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28630\" ip netns exec fwd-test-2508 firewall-cmd --query-protocol=ddp "
at_fn_check_prepare_trace "firewall-cmd.at:449"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28630" ip netns exec fwd-test-2508 firewall-cmd --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:449"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:450:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28630\" ip netns exec fwd-test-2508 firewall-cmd --query-protocol=gre "
at_fn_check_prepare_trace "firewall-cmd.at:450"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28630" ip netns exec fwd-test-2508 firewall-cmd --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:450"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:451:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28630\" ip netns exec fwd-test-2508 firewall-cmd --permanent --add-protocol=ddp --add-protocol gre "
at_fn_check_prepare_trace "firewall-cmd.at:451"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28630" ip netns exec fwd-test-2508 firewall-cmd --permanent --add-protocol=ddp --add-protocol gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:451"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:452:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28630\" ip netns exec fwd-test-2508 firewall-cmd --permanent --query-protocol=ddp --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:452"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28630" ip netns exec fwd-test-2508 firewall-cmd --permanent --query-protocol=ddp --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:452"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:453:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28630\" ip netns exec fwd-test-2508 firewall-cmd --permanent --query-protocol=gre "
at_fn_check_prepare_trace "firewall-cmd.at:453"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28630" ip netns exec fwd-test-2508 firewall-cmd --permanent --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:453"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:454:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28630\" ip netns exec fwd-test-2508 firewall-cmd --permanent --remove-protocol ddp --remove-protocol=gre "
at_fn_check_prepare_trace "firewall-cmd.at:454"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28630" ip netns exec fwd-test-2508 firewall-cmd --permanent --remove-protocol ddp --remove-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:454"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:455:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28630\" ip netns exec fwd-test-2508 firewall-cmd --permanent --query-protocol=ddp "
at_fn_check_prepare_trace "firewall-cmd.at:455"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28630" ip netns exec fwd-test-2508 firewall-cmd --permanent --query-protocol=ddp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:455"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:456:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-28630\" ip netns exec fwd-test-2508 firewall-cmd --permanent --query-protocol=gre "
at_fn_check_prepare_trace "firewall-cmd.at:456"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-28630" ip netns exec fwd-test-2508 firewall-cmd --permanent --query-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:456"
$at_failed && at_fn_log_failure
$at_traceon; }










            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/ERROR: INVALID_PROTOCOL: dummy/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_PROTOCOL: dummy/d'"; then
                sed -i -e '/ERROR: INVALID_PROTOCOL: dummy/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:457" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:457"
            $as_echo "firewall-cmd.at:457" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:457"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_96
#AT_START_97
at_fn_group_banner 97 'firewall-cmd.at:459' \
  "masquerade" "                                     " 7
at_xfail=no
(
  $as_echo "97. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:459: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:459"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:459"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:459: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:459"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:459"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:459: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:459"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:459"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:459: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:459"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:459"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-27058" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:459: ip netns add fwd-test-27058"
at_fn_check_prepare_trace "firewall-cmd.at:459"
( $at_check_trace; ip netns add fwd-test-27058
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:459"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14490" ip netns exec fwd-test-27058 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-14490" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:459" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:459"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14490" ip netns exec fwd-test-27058 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:459" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:459"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14490" ip netns exec fwd-test-27058 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:459" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:459"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:462:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14490\" ip netns exec fwd-test-27058 firewall-cmd --add-masquerade --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:462"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14490" ip netns exec fwd-test-27058 firewall-cmd --add-masquerade --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:462"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:463:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14490\" ip netns exec fwd-test-27058 firewall-cmd --query-masquerade "
at_fn_check_prepare_trace "firewall-cmd.at:463"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14490" ip netns exec fwd-test-27058 firewall-cmd --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:463"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:464:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14490\" ip netns exec fwd-test-27058 firewall-cmd --remove-masquerade "
at_fn_check_prepare_trace "firewall-cmd.at:464"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14490" ip netns exec fwd-test-27058 firewall-cmd --remove-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:464"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:465:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14490\" ip netns exec fwd-test-27058 firewall-cmd --query-masquerade "
at_fn_check_prepare_trace "firewall-cmd.at:465"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14490" ip netns exec fwd-test-27058 firewall-cmd --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:465"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:467:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14490\" ip netns exec fwd-test-27058 firewall-cmd --permanent --add-masquerade --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:467"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14490" ip netns exec fwd-test-27058 firewall-cmd --permanent --add-masquerade --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:467"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:468:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14490\" ip netns exec fwd-test-27058 firewall-cmd --permanent --query-masquerade "
at_fn_check_prepare_trace "firewall-cmd.at:468"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14490" ip netns exec fwd-test-27058 firewall-cmd --permanent --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:468"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:469:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14490\" ip netns exec fwd-test-27058 firewall-cmd --permanent --remove-masquerade "
at_fn_check_prepare_trace "firewall-cmd.at:469"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14490" ip netns exec fwd-test-27058 firewall-cmd --permanent --remove-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:469"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:470:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-14490\" ip netns exec fwd-test-27058 firewall-cmd --permanent --query-masquerade "
at_fn_check_prepare_trace "firewall-cmd.at:470"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-14490" ip netns exec fwd-test-27058 firewall-cmd --permanent --query-masquerade
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:470"
$at_failed && at_fn_log_failure
$at_traceon; }










            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:471" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:471"
            $as_echo "firewall-cmd.at:471" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:471"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_97
#AT_START_98
at_fn_group_banner 98 'firewall-cmd.at:473' \
  "forward ports" "                                  " 7
at_xfail=no
(
  $as_echo "98. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:473: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:473"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:473"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:473: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:473"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:473"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:473: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:473"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:473"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:473: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:473"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:473"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-7384" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:473: ip netns add fwd-test-7384"
at_fn_check_prepare_trace "firewall-cmd.at:473"
( $at_check_trace; ip netns add fwd-test-7384
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:473"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:473" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:473"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:473" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:473"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:473" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:473"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:476:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29615\" ip netns exec fwd-test-7384 firewall-cmd --add-forward-port=666 "
at_fn_check_prepare_trace "firewall-cmd.at:476"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewall-cmd --add-forward-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/firewall-cmd.at:476"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:477:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29615\" ip netns exec fwd-test-7384 firewall-cmd --add-forward-port=port=11:proto=tcp:toport=22 "
at_fn_check_prepare_trace "firewall-cmd.at:477"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewall-cmd --add-forward-port=port=11:proto=tcp:toport=22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:477"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:478:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29615\" ip netns exec fwd-test-7384 firewall-cmd --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:478"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewall-cmd --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:478"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:479:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29615\" ip netns exec fwd-test-7384 firewall-cmd --add-forward-port=port=33:proto=tcp:toaddr=4444 "
at_fn_check_prepare_trace "firewall-cmd.at:479"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewall-cmd --add-forward-port=port=33:proto=tcp:toaddr=4444
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/firewall-cmd.at:479"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:480:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29615\" ip netns exec fwd-test-7384 firewall-cmd --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:480"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewall-cmd --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:480"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:481:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29615\" ip netns exec fwd-test-7384 firewall-cmd --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 "
at_fn_check_prepare_trace "firewall-cmd.at:481"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewall-cmd --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:481"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:482:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29615\" ip netns exec fwd-test-7384 firewall-cmd --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:482"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewall-cmd --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:482"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:483:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29615\" ip netns exec fwd-test-7384 firewall-cmd --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:483"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewall-cmd --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:483"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:484:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29615\" ip netns exec fwd-test-7384 firewall-cmd --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:484"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewall-cmd --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:484"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:485:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29615\" ip netns exec fwd-test-7384 firewall-cmd --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:485"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewall-cmd --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:485"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:486:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29615\" ip netns exec fwd-test-7384 firewall-cmd --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:486"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewall-cmd --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:486"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:487:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29615\" ip netns exec fwd-test-7384 firewall-cmd --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:487"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewall-cmd --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:487"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:488:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29615\" ip netns exec fwd-test-7384 firewall-cmd --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:488"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewall-cmd --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:488"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:489:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29615\" ip netns exec fwd-test-7384 firewall-cmd --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:489"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewall-cmd --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:489"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:496:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29615\" ip netns exec fwd-test-7384 firewall-cmd --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200 "
at_fn_check_prepare_trace "firewall-cmd.at:496"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewall-cmd --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:496"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:497:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29615\" ip netns exec fwd-test-7384 firewall-cmd --query-forward-port=port=100:proto=tcp:toport=200 "
at_fn_check_prepare_trace "firewall-cmd.at:497"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewall-cmd --query-forward-port=port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:497"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:498:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29615\" ip netns exec fwd-test-7384 firewall-cmd --query-forward-port=port=88:proto=udp:toport=99 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:498"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewall-cmd --query-forward-port=port=88:proto=udp:toport=99 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:498"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:499:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29615\" ip netns exec fwd-test-7384 firewall-cmd --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99 "
at_fn_check_prepare_trace "firewall-cmd.at:499"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewall-cmd --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:499"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:500:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29615\" ip netns exec fwd-test-7384 firewall-cmd --query-forward-port port=100:proto=tcp:toport=200 "
at_fn_check_prepare_trace "firewall-cmd.at:500"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewall-cmd --query-forward-port port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:500"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:501:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29615\" ip netns exec fwd-test-7384 firewall-cmd --query-forward-port=port=88:proto=udp:toport=99 "
at_fn_check_prepare_trace "firewall-cmd.at:501"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewall-cmd --query-forward-port=port=88:proto=udp:toport=99
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:501"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:502:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29615\" ip netns exec fwd-test-7384 firewall-cmd --list-forward-ports "
at_fn_check_prepare_trace "firewall-cmd.at:502"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewall-cmd --list-forward-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:502"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:504:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29615\" ip netns exec fwd-test-7384 firewall-cmd --permanent --add-forward-port=666 "
at_fn_check_prepare_trace "firewall-cmd.at:504"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewall-cmd --permanent --add-forward-port=666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 106 $at_status "$at_srcdir/firewall-cmd.at:504"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:505:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29615\" ip netns exec fwd-test-7384 firewall-cmd --permanent --add-forward-port=port=11:proto=tcp:toport=22 "
at_fn_check_prepare_trace "firewall-cmd.at:505"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewall-cmd --permanent --add-forward-port=port=11:proto=tcp:toport=22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:505"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:506:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29615\" ip netns exec fwd-test-7384 firewall-cmd --permanent --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:506"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewall-cmd --permanent --remove-forward-port=port=11:proto=tcp:toport=22 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:506"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:507:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29615\" ip netns exec fwd-test-7384 firewall-cmd --permanent --add-forward-port=port=33:proto=tcp:toaddr=4444 "
at_fn_check_prepare_trace "firewall-cmd.at:507"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewall-cmd --permanent --add-forward-port=port=33:proto=tcp:toaddr=4444
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 105 $at_status "$at_srcdir/firewall-cmd.at:507"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:508:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29615\" ip netns exec fwd-test-7384 firewall-cmd --permanent --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:508"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewall-cmd --permanent --add-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:508"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:509:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29615\" ip netns exec fwd-test-7384 firewall-cmd --permanent --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4 "
at_fn_check_prepare_trace "firewall-cmd.at:509"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewall-cmd --permanent --remove-forward-port=port=33:proto=tcp:toaddr=4.4.4.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:509"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:510:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29615\" ip netns exec fwd-test-7384 firewall-cmd --permanent --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:510"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewall-cmd --permanent --add-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:510"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:511:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29615\" ip netns exec fwd-test-7384 firewall-cmd --permanent --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:511"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewall-cmd --permanent --query-forward-port port=55:proto=tcp:toport=66:toaddr=7.7.7.7 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:511"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:512:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29615\" ip netns exec fwd-test-7384 firewall-cmd --permanent --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:512"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewall-cmd --permanent --remove-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:512"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:513:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29615\" ip netns exec fwd-test-7384 firewall-cmd --permanent --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:513"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewall-cmd --permanent --query-forward-port=port=55:proto=tcp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:513"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:514:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29615\" ip netns exec fwd-test-7384 firewall-cmd --permanent --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:514"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewall-cmd --permanent --add-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:514"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:515:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29615\" ip netns exec fwd-test-7384 firewall-cmd --permanent --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:515"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewall-cmd --permanent --query-forward-port port=66:proto=sctp:toport=66:toaddr=7.7.7.7 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:515"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:516:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29615\" ip netns exec fwd-test-7384 firewall-cmd --permanent --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:516"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewall-cmd --permanent --remove-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:516"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:517:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29615\" ip netns exec fwd-test-7384 firewall-cmd --permanent --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7 "
at_fn_check_prepare_trace "firewall-cmd.at:517"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewall-cmd --permanent --query-forward-port=port=66:proto=sctp:toport=66:toaddr=7.7.7.7
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:517"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:524:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29615\" ip netns exec fwd-test-7384 firewall-cmd --permanent --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200 "
at_fn_check_prepare_trace "firewall-cmd.at:524"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewall-cmd --permanent --add-forward-port=port=88:proto=udp:toport=99 --add-forward-port port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:524"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:525:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29615\" ip netns exec fwd-test-7384 firewall-cmd --permanent --query-forward-port=port=100:proto=tcp:toport=200 "
at_fn_check_prepare_trace "firewall-cmd.at:525"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewall-cmd --permanent --query-forward-port=port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:525"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:526:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29615\" ip netns exec fwd-test-7384 firewall-cmd --permanent --query-forward-port=port=88:proto=udp:toport=99 --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:526"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewall-cmd --permanent --query-forward-port=port=88:proto=udp:toport=99 --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:526"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:527:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29615\" ip netns exec fwd-test-7384 firewall-cmd --permanent --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99 "
at_fn_check_prepare_trace "firewall-cmd.at:527"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewall-cmd --permanent --remove-forward-port port=100:proto=tcp:toport=200 --remove-forward-port=port=88:proto=udp:toport=99
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:527"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:528:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29615\" ip netns exec fwd-test-7384 firewall-cmd --permanent --query-forward-port port=100:proto=tcp:toport=200 "
at_fn_check_prepare_trace "firewall-cmd.at:528"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewall-cmd --permanent --query-forward-port port=100:proto=tcp:toport=200
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:528"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:529:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29615\" ip netns exec fwd-test-7384 firewall-cmd --permanent --query-forward-port=port=88:proto=udp:toport=99 "
at_fn_check_prepare_trace "firewall-cmd.at:529"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewall-cmd --permanent --query-forward-port=port=88:proto=udp:toport=99
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:529"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:530:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29615\" ip netns exec fwd-test-7384 firewall-cmd --permanent --list-forward-ports "
at_fn_check_prepare_trace "firewall-cmd.at:530"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29615" ip netns exec fwd-test-7384 firewall-cmd --permanent --list-forward-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:530"
$at_failed && at_fn_log_failure
$at_traceon; }










            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:531" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:531"
            $as_echo "firewall-cmd.at:531" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:531"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_98
#AT_START_99
at_fn_group_banner 99 'firewall-cmd.at:533' \
  "ICMP block" "                                     " 7
at_xfail=no
(
  $as_echo "99. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:533: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:533"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:533"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:533: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:533"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:533"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:533: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:533"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:533"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:533: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:533"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:533"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-14868" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:533: ip netns add fwd-test-14868"
at_fn_check_prepare_trace "firewall-cmd.at:533"
( $at_check_trace; ip netns add fwd-test-14868
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:533"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-14868 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:533" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:533"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-14868 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:533" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:533"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-14868 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:533" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:533"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:536:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29669\" ip netns exec fwd-test-14868 firewall-cmd --list-icmp-blocks "
at_fn_check_prepare_trace "firewall-cmd.at:536"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-14868 firewall-cmd --list-icmp-blocks
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:536"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:538:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29669\" ip netns exec fwd-test-14868 firewall-cmd --zone=external --add-icmp-block=dummyblock "
at_fn_check_prepare_trace "firewall-cmd.at:538"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-14868 firewall-cmd --zone=external --add-icmp-block=dummyblock
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/firewall-cmd.at:538"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:539:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29669\" ip netns exec fwd-test-14868 firewall-cmd --zone=external --add-icmp-block=redirect "
at_fn_check_prepare_trace "firewall-cmd.at:539"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-14868 firewall-cmd --zone=external --add-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:539"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:540:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29669\" ip netns exec fwd-test-14868 firewall-cmd --zone=external --query-icmp-block=redirect "
at_fn_check_prepare_trace "firewall-cmd.at:540"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-14868 firewall-cmd --zone=external --query-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:540"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:541:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29669\" ip netns exec fwd-test-14868 firewall-cmd --zone=external --remove-icmp-block redirect "
at_fn_check_prepare_trace "firewall-cmd.at:541"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-14868 firewall-cmd --zone=external --remove-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:541"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:542:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29669\" ip netns exec fwd-test-14868 firewall-cmd --zone=external --query-icmp-block=redirect "
at_fn_check_prepare_trace "firewall-cmd.at:542"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-14868 firewall-cmd --zone=external --query-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:542"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:543:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29669\" ip netns exec fwd-test-14868 firewall-cmd --permanent --zone=external --add-icmp-block=dummyblock "
at_fn_check_prepare_trace "firewall-cmd.at:543"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-14868 firewall-cmd --permanent --zone=external --add-icmp-block=dummyblock
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 107 $at_status "$at_srcdir/firewall-cmd.at:543"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:544:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29669\" ip netns exec fwd-test-14868 firewall-cmd --permanent --zone=external --add-icmp-block=redirect "
at_fn_check_prepare_trace "firewall-cmd.at:544"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-14868 firewall-cmd --permanent --zone=external --add-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:544"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:545:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29669\" ip netns exec fwd-test-14868 firewall-cmd --permanent --zone=external --query-icmp-block=redirect "
at_fn_check_prepare_trace "firewall-cmd.at:545"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-14868 firewall-cmd --permanent --zone=external --query-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:545"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:546:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29669\" ip netns exec fwd-test-14868 firewall-cmd --permanent --zone=external --remove-icmp-block redirect "
at_fn_check_prepare_trace "firewall-cmd.at:546"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-14868 firewall-cmd --permanent --zone=external --remove-icmp-block redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:546"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:547:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29669\" ip netns exec fwd-test-14868 firewall-cmd --permanent --zone=external --query-icmp-block=redirect "
at_fn_check_prepare_trace "firewall-cmd.at:547"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-14868 firewall-cmd --permanent --zone=external --query-icmp-block=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:547"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:549:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29669\" ip netns exec fwd-test-14868 firewall-cmd --add-icmp-block-inversion --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:549"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-14868 firewall-cmd --add-icmp-block-inversion --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:549"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:550:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29669\" ip netns exec fwd-test-14868 firewall-cmd --query-icmp-block-inversion "
at_fn_check_prepare_trace "firewall-cmd.at:550"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-14868 firewall-cmd --query-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:550"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:551:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29669\" ip netns exec fwd-test-14868 firewall-cmd --remove-icmp-block-inversion "
at_fn_check_prepare_trace "firewall-cmd.at:551"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-14868 firewall-cmd --remove-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:551"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:552:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29669\" ip netns exec fwd-test-14868 firewall-cmd --query-icmp-block-inversion "
at_fn_check_prepare_trace "firewall-cmd.at:552"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-14868 firewall-cmd --query-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:552"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:553:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29669\" ip netns exec fwd-test-14868 firewall-cmd --permanent --add-icmp-block-inversion --zone=public "
at_fn_check_prepare_trace "firewall-cmd.at:553"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-14868 firewall-cmd --permanent --add-icmp-block-inversion --zone=public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:553"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:554:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29669\" ip netns exec fwd-test-14868 firewall-cmd --permanent --query-icmp-block-inversion "
at_fn_check_prepare_trace "firewall-cmd.at:554"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-14868 firewall-cmd --permanent --query-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:554"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:555:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29669\" ip netns exec fwd-test-14868 firewall-cmd --permanent --remove-icmp-block-inversion "
at_fn_check_prepare_trace "firewall-cmd.at:555"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-14868 firewall-cmd --permanent --remove-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:555"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:556:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29669\" ip netns exec fwd-test-14868 firewall-cmd --permanent --query-icmp-block-inversion "
at_fn_check_prepare_trace "firewall-cmd.at:556"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-14868 firewall-cmd --permanent --query-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:556"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:558:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29669\" ip netns exec fwd-test-14868 firewall-cmd --add-icmp-block-inversion --zone=block "
at_fn_check_prepare_trace "firewall-cmd.at:558"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-14868 firewall-cmd --add-icmp-block-inversion --zone=block
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:558"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:559:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29669\" ip netns exec fwd-test-14868 firewall-cmd --remove-icmp-block-inversion --zone=block "
at_fn_check_prepare_trace "firewall-cmd.at:559"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-14868 firewall-cmd --remove-icmp-block-inversion --zone=block
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:559"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:560:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29669\" ip netns exec fwd-test-14868 firewall-cmd --add-icmp-block-inversion --zone=drop "
at_fn_check_prepare_trace "firewall-cmd.at:560"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-14868 firewall-cmd --add-icmp-block-inversion --zone=drop
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:560"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:561:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29669\" ip netns exec fwd-test-14868 firewall-cmd --remove-icmp-block-inversion --zone=drop "
at_fn_check_prepare_trace "firewall-cmd.at:561"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-14868 firewall-cmd --remove-icmp-block-inversion --zone=drop
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:561"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:562:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29669\" ip netns exec fwd-test-14868 firewall-cmd --add-icmp-block-inversion --zone=trusted "
at_fn_check_prepare_trace "firewall-cmd.at:562"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-14868 firewall-cmd --add-icmp-block-inversion --zone=trusted
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:562"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:563:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29669\" ip netns exec fwd-test-14868 firewall-cmd --remove-icmp-block-inversion --zone=trusted "
at_fn_check_prepare_trace "firewall-cmd.at:563"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-14868 firewall-cmd --remove-icmp-block-inversion --zone=trusted
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:563"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:565:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29669\" ip netns exec fwd-test-14868 firewall-cmd --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation "
at_fn_check_prepare_trace "firewall-cmd.at:565"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-14868 firewall-cmd --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:565"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:566:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29669\" ip netns exec fwd-test-14868 firewall-cmd --zone=external --query-icmp-block=echo-reply "
at_fn_check_prepare_trace "firewall-cmd.at:566"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-14868 firewall-cmd --zone=external --query-icmp-block=echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:566"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:567:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29669\" ip netns exec fwd-test-14868 firewall-cmd --zone=external --query-icmp-block=router-solicitation "
at_fn_check_prepare_trace "firewall-cmd.at:567"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-14868 firewall-cmd --zone=external --query-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:567"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:568:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29669\" ip netns exec fwd-test-14868 firewall-cmd --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation "
at_fn_check_prepare_trace "firewall-cmd.at:568"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-14868 firewall-cmd --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:568"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:569:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29669\" ip netns exec fwd-test-14868 firewall-cmd --zone=external --query-icmp-block=echo-reply "
at_fn_check_prepare_trace "firewall-cmd.at:569"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-14868 firewall-cmd --zone=external --query-icmp-block=echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:569"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:570:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29669\" ip netns exec fwd-test-14868 firewall-cmd --zone=external --query-icmp-block=router-solicitation "
at_fn_check_prepare_trace "firewall-cmd.at:570"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-14868 firewall-cmd --zone=external --query-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:570"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:571:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29669\" ip netns exec fwd-test-14868 firewall-cmd --permanent --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation "
at_fn_check_prepare_trace "firewall-cmd.at:571"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-14868 firewall-cmd --permanent --zone=external --add-icmp-block=echo-reply --add-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:571"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:572:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29669\" ip netns exec fwd-test-14868 firewall-cmd --permanent --zone=external --query-icmp-block=echo-reply "
at_fn_check_prepare_trace "firewall-cmd.at:572"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-14868 firewall-cmd --permanent --zone=external --query-icmp-block=echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:572"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:573:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29669\" ip netns exec fwd-test-14868 firewall-cmd --permanent --zone=external --query-icmp-block=router-solicitation "
at_fn_check_prepare_trace "firewall-cmd.at:573"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-14868 firewall-cmd --permanent --zone=external --query-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:573"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:574:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29669\" ip netns exec fwd-test-14868 firewall-cmd --permanent --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation "
at_fn_check_prepare_trace "firewall-cmd.at:574"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-14868 firewall-cmd --permanent --zone=external --remove-icmp-block echo-reply --remove-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:574"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:575:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29669\" ip netns exec fwd-test-14868 firewall-cmd --permanent --zone=external --query-icmp-block=echo-reply "
at_fn_check_prepare_trace "firewall-cmd.at:575"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-14868 firewall-cmd --permanent --zone=external --query-icmp-block=echo-reply
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:575"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:576:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29669\" ip netns exec fwd-test-14868 firewall-cmd --permanent --zone=external --query-icmp-block=router-solicitation "
at_fn_check_prepare_trace "firewall-cmd.at:576"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29669" ip netns exec fwd-test-14868 firewall-cmd --permanent --zone=external --query-icmp-block=router-solicitation
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:576"
$at_failed && at_fn_log_failure
$at_traceon; }










            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/ERROR: INVALID_ICMPTYPE:/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_ICMPTYPE:/d'"; then
                sed -i -e '/ERROR: INVALID_ICMPTYPE:/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:577" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:577"
            $as_echo "firewall-cmd.at:577" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:577"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_99
#AT_START_100
at_fn_group_banner 100 'firewall-cmd.at:579' \
  "user ICMP types" "                                " 7
at_xfail=no
(
  $as_echo "100. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:579: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:579"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:579"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:579: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:579"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:579"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:579: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:579"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:579"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:579: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:579"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:579"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-14149" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:579: ip netns add fwd-test-14149"
at_fn_check_prepare_trace "firewall-cmd.at:579"
( $at_check_trace; ip netns add fwd-test-14149
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:579"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10309" ip netns exec fwd-test-14149 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-10309" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:579" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:579"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10309" ip netns exec fwd-test-14149 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:579" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:579"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10309" ip netns exec fwd-test-14149 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:579" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:579"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:582:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10309\" ip netns exec fwd-test-14149 firewall-cmd --permanent --new-icmptype=redirect "
at_fn_check_prepare_trace "firewall-cmd.at:582"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10309" ip netns exec fwd-test-14149 firewall-cmd --permanent --new-icmptype=redirect
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 26 $at_status "$at_srcdir/firewall-cmd.at:582"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:584:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10309\" ip netns exec fwd-test-14149 firewall-cmd --permanent --new-icmptype=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:584"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10309" ip netns exec fwd-test-14149 firewall-cmd --permanent --new-icmptype=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:584"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:585:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10309\" ip netns exec fwd-test-14149 firewall-cmd --permanent --get-icmptypes | grep foobar "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:585"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10309" ip netns exec fwd-test-14149 firewall-cmd --permanent --get-icmptypes | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:585"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:587:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10309\" ip netns exec fwd-test-14149 firewall-cmd --permanent --icmptype=foobar --add-destination=ipv5 "
at_fn_check_prepare_trace "firewall-cmd.at:587"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10309" ip netns exec fwd-test-14149 firewall-cmd --permanent --icmptype=foobar --add-destination=ipv5
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:587"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:588:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10309\" ip netns exec fwd-test-14149 firewall-cmd --permanent --icmptype=foobar --add-destination=ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:588"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10309" ip netns exec fwd-test-14149 firewall-cmd --permanent --icmptype=foobar --add-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:588"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:589:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10309\" ip netns exec fwd-test-14149 firewall-cmd --permanent --icmptype=foobar --remove-destination=ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:589"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10309" ip netns exec fwd-test-14149 firewall-cmd --permanent --icmptype=foobar --remove-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:589"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:590:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10309\" ip netns exec fwd-test-14149 firewall-cmd --permanent --icmptype=foobar --add-destination=ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:590"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10309" ip netns exec fwd-test-14149 firewall-cmd --permanent --icmptype=foobar --add-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:590"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:591:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10309\" ip netns exec fwd-test-14149 firewall-cmd --permanent --icmptype=foobar --query-destination=ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:591"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10309" ip netns exec fwd-test-14149 firewall-cmd --permanent --icmptype=foobar --query-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:591"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:592:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10309\" ip netns exec fwd-test-14149 firewall-cmd --permanent --icmptype=foobar --remove-destination=ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:592"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10309" ip netns exec fwd-test-14149 firewall-cmd --permanent --icmptype=foobar --remove-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:592"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:593:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10309\" ip netns exec fwd-test-14149 firewall-cmd --permanent --icmptype=foobar --query-destination=ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:593"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10309" ip netns exec fwd-test-14149 firewall-cmd --permanent --icmptype=foobar --query-destination=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:593"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:595:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10309\" ip netns exec fwd-test-14149 firewall-cmd --permanent --zone=public --add-icmp-block=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:595"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10309" ip netns exec fwd-test-14149 firewall-cmd --permanent --zone=public --add-icmp-block=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:595"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:596:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10309\" ip netns exec fwd-test-14149 firewall-cmd --permanent --zone=public --list-icmp-blocks | grep foobar "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:596"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10309" ip netns exec fwd-test-14149 firewall-cmd --permanent --zone=public --list-icmp-blocks | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:596"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:598:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10309\" ip netns exec fwd-test-14149 firewall-cmd --permanent --delete-icmptype=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:598"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10309" ip netns exec fwd-test-14149 firewall-cmd --permanent --delete-icmptype=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:598"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:599:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10309\" ip netns exec fwd-test-14149 firewall-cmd --permanent --zone=public --list-icmp-blocks | grep foobar "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:599"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10309" ip netns exec fwd-test-14149 firewall-cmd --permanent --zone=public --list-icmp-blocks | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:599"
$at_failed && at_fn_log_failure
$at_traceon; }










            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/NAME_CONFLICT: new_icmptype():/d'" != x"ignore"; then
            if test -n "-e '/NAME_CONFLICT: new_icmptype():/d'"; then
                sed -i -e '/NAME_CONFLICT: new_icmptype():/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:600" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:600"
            $as_echo "firewall-cmd.at:600" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:600"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_100
#AT_START_101
at_fn_group_banner 101 'firewall-cmd.at:602' \
  "ipset" "                                          " 7
at_xfail=no
(
  $as_echo "101. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:602: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:602"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:602"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:602: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:602"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:602"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:602: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:602"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:602"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:602: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:602"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:602"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-22952" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:602: ip netns add fwd-test-22952"
at_fn_check_prepare_trace "firewall-cmd.at:602"
( $at_check_trace; ip netns add fwd-test-22952
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:602"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8068" ip netns exec fwd-test-22952 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-8068" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:602" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:602"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8068" ip netns exec fwd-test-22952 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:602" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:602"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8068" ip netns exec fwd-test-22952 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:602" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:602"










        $as_echo "firewall-cmd.at:606" >"$at_check_line_file"
(! ipset --help | grep "hash:mac") \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:606"
        $as_echo "firewall-cmd.at:606" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8068" ip netns exec fwd-test-22952 ipset create foobar hash:mac >/dev/null 2>&1 ) \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:606"

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:606:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8068\" ip netns exec fwd-test-22952 ipset destroy foobar "
at_fn_check_prepare_trace "firewall-cmd.at:606"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8068" ip netns exec fwd-test-22952 ipset destroy foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:606"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:608:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8068\" ip netns exec fwd-test-22952 firewall-cmd --permanent --new-ipset=foobar --type=hash:ip "
at_fn_check_prepare_trace "firewall-cmd.at:608"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8068" ip netns exec fwd-test-22952 firewall-cmd --permanent --new-ipset=foobar --type=hash:ip
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:608"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:609:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8068\" ip netns exec fwd-test-22952 firewall-cmd --reload "
at_fn_check_prepare_trace "firewall-cmd.at:609"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8068" ip netns exec fwd-test-22952 firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:609"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:610:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8068\" ip netns exec fwd-test-22952 firewall-cmd --ipset=foobar --get-entries "
at_fn_check_prepare_trace "firewall-cmd.at:610"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8068" ip netns exec fwd-test-22952 firewall-cmd --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:610"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:612:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8068\" ip netns exec fwd-test-22952 firewall-cmd --ipset=foobar --add-entry=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:612"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8068" ip netns exec fwd-test-22952 firewall-cmd --ipset=foobar --add-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:612"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:613:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8068\" ip netns exec fwd-test-22952 firewall-cmd --ipset=foobar --get-entries | grep \"1.2.3.4\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:613"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8068" ip netns exec fwd-test-22952 firewall-cmd --ipset=foobar --get-entries | grep "1.2.3.4"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:613"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:614:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8068\" ip netns exec fwd-test-22952 firewall-cmd --ipset=foobar --add-entry=1.2.3.400 "
at_fn_check_prepare_trace "firewall-cmd.at:614"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8068" ip netns exec fwd-test-22952 firewall-cmd --ipset=foobar --add-entry=1.2.3.400
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 136 $at_status "$at_srcdir/firewall-cmd.at:614"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:615:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8068\" ip netns exec fwd-test-22952 firewall-cmd --ipset=foobar --remove-entry=1.2.3.4 "
at_fn_check_prepare_trace "firewall-cmd.at:615"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8068" ip netns exec fwd-test-22952 firewall-cmd --ipset=foobar --remove-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:615"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:616:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8068\" ip netns exec fwd-test-22952 firewall-cmd --ipset=foobar --get-entries "
at_fn_check_prepare_trace "firewall-cmd.at:616"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8068" ip netns exec fwd-test-22952 firewall-cmd --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:616"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:619:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8068\" ip netns exec fwd-test-22952 firewall-cmd --zone=public --add-source=ipset:foobar "
at_fn_check_prepare_trace "firewall-cmd.at:619"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8068" ip netns exec fwd-test-22952 firewall-cmd --zone=public --add-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:619"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:620:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8068\" ip netns exec fwd-test-22952 firewall-cmd --get-zone-of-source=ipset:foobar | grep public "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:620"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8068" ip netns exec fwd-test-22952 firewall-cmd --get-zone-of-source=ipset:foobar | grep public
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:620"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:621:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8068\" ip netns exec fwd-test-22952 firewall-cmd --zone=public --list-sources | grep \"ipset:foobar\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:621"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8068" ip netns exec fwd-test-22952 firewall-cmd --zone=public --list-sources | grep "ipset:foobar"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:621"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:622:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8068\" ip netns exec fwd-test-22952 firewall-cmd --zone=public --query-source=ipset:foobar "
at_fn_check_prepare_trace "firewall-cmd.at:622"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8068" ip netns exec fwd-test-22952 firewall-cmd --zone=public --query-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:622"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:623:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8068\" ip netns exec fwd-test-22952 firewall-cmd --zone=public --remove-source=ipset:foobar "
at_fn_check_prepare_trace "firewall-cmd.at:623"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8068" ip netns exec fwd-test-22952 firewall-cmd --zone=public --remove-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:623"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:624:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8068\" ip netns exec fwd-test-22952 firewall-cmd --zone=public --query-source=ipset:foobar "
at_fn_check_prepare_trace "firewall-cmd.at:624"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8068" ip netns exec fwd-test-22952 firewall-cmd --zone=public --query-source=ipset:foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:624"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:626:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8068\" ip netns exec fwd-test-22952 firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:626"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8068" ip netns exec fwd-test-22952 firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:626"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:627:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8068\" ip netns exec fwd-test-22952 firewall-cmd --reload "
at_fn_check_prepare_trace "firewall-cmd.at:627"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8068" ip netns exec fwd-test-22952 firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:627"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:630:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8068\" ip netns exec fwd-test-22952 firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,port "
at_fn_check_prepare_trace "firewall-cmd.at:630"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8068" ip netns exec fwd-test-22952 firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,port
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:630"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:631:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8068\" ip netns exec fwd-test-22952 firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,1234 "
at_fn_check_prepare_trace "firewall-cmd.at:631"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8068" ip netns exec fwd-test-22952 firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:631"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:632:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8068\" ip netns exec fwd-test-22952 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:632"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8068" ip netns exec fwd-test-22952 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:632"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:632:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8068\" ip netns exec fwd-test-22952 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:632"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8068" ip netns exec fwd-test-22952 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:632"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:633:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8068\" ip netns exec fwd-test-22952 firewall-cmd --ipset=foobar --add-entry=1.2.3.4,8080 "
at_fn_check_prepare_trace "firewall-cmd.at:633"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8068" ip netns exec fwd-test-22952 firewall-cmd --ipset=foobar --add-entry=1.2.3.4,8080
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:633"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:634:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8068\" ip netns exec fwd-test-22952 firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:634"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8068" ip netns exec fwd-test-22952 firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:634"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:635:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8068\" ip netns exec fwd-test-22952 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:635"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8068" ip netns exec fwd-test-22952 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:635"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:635:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8068\" ip netns exec fwd-test-22952 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:635"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8068" ip netns exec fwd-test-22952 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:635"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:638:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8068\" ip netns exec fwd-test-22952 firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,port "
at_fn_check_prepare_trace "firewall-cmd.at:638"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8068" ip netns exec fwd-test-22952 firewall-cmd --permanent --new-ipset=foobar --type=hash:ip,port
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:638"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:639:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8068\" ip netns exec fwd-test-22952 firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,sctp:1234 "
at_fn_check_prepare_trace "firewall-cmd.at:639"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8068" ip netns exec fwd-test-22952 firewall-cmd --permanent --ipset=foobar --add-entry=10.10.10.10,sctp:1234
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:639"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:640:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8068\" ip netns exec fwd-test-22952 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:640"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8068" ip netns exec fwd-test-22952 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:640"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:640:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8068\" ip netns exec fwd-test-22952 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:640"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8068" ip netns exec fwd-test-22952 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:640"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:641:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8068\" ip netns exec fwd-test-22952 firewall-cmd --ipset=foobar --add-entry=1.2.3.4,sctp:8080 "
at_fn_check_prepare_trace "firewall-cmd.at:641"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8068" ip netns exec fwd-test-22952 firewall-cmd --ipset=foobar --add-entry=1.2.3.4,sctp:8080
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:641"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:642:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8068\" ip netns exec fwd-test-22952 firewall-cmd --permanent --delete-ipset=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:642"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8068" ip netns exec fwd-test-22952 firewall-cmd --permanent --delete-ipset=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:642"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:643:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8068\" ip netns exec fwd-test-22952 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:643"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8068" ip netns exec fwd-test-22952 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:643"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:643:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8068\" ip netns exec fwd-test-22952 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:643"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8068" ip netns exec fwd-test-22952 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:643"
$at_failed && at_fn_log_failure
$at_traceon; }


















            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/ERROR: INVALID_ENTRY: invalid address/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_ENTRY: invalid address/d'"; then
                sed -i -e '/ERROR: INVALID_ENTRY: invalid address/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:653" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:653"
            $as_echo "firewall-cmd.at:653" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:653"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_101
#AT_START_102
at_fn_group_banner 102 'firewall-cmd.at:655' \
  "user helpers" "                                   " 7
at_xfail=no
(
  $as_echo "102. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:655: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:655"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:655"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:655: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:655"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:655"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:655: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:655"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:655"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:655: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:655"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:655"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-20402" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:655: ip netns add fwd-test-20402"
at_fn_check_prepare_trace "firewall-cmd.at:655"
( $at_check_trace; ip netns add fwd-test-20402
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:655"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23979" ip netns exec fwd-test-20402 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-23979" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:655" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:655"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23979" ip netns exec fwd-test-20402 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:655" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:655"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23979" ip netns exec fwd-test-20402 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:655" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:655"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:658:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23979\" ip netns exec fwd-test-20402 firewall-cmd --permanent --new-helper=foobar --module=foo "
at_fn_check_prepare_trace "firewall-cmd.at:658"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23979" ip netns exec fwd-test-20402 firewall-cmd --permanent --new-helper=foobar --module=foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 132 $at_status "$at_srcdir/firewall-cmd.at:658"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:659:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23979\" ip netns exec fwd-test-20402 firewall-cmd --permanent --new-helper=foobar --module=nf_conntrack_foo "
at_fn_check_prepare_trace "firewall-cmd.at:659"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23979" ip netns exec fwd-test-20402 firewall-cmd --permanent --new-helper=foobar --module=nf_conntrack_foo
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:659"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:660:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23979\" ip netns exec fwd-test-20402 firewall-cmd --permanent --get-helpers | grep foobar "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:660"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23979" ip netns exec fwd-test-20402 firewall-cmd --permanent --get-helpers | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:660"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:661:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23979\" ip netns exec fwd-test-20402 firewall-cmd --permanent --helper=foobar --get-family | grep ipv4 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:661"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23979" ip netns exec fwd-test-20402 firewall-cmd --permanent --helper=foobar --get-family | grep ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:661"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:662:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23979\" ip netns exec fwd-test-20402 firewall-cmd --permanent --helper=foobar --set-family=ipv5 "
at_fn_check_prepare_trace "firewall-cmd.at:662"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23979" ip netns exec fwd-test-20402 firewall-cmd --permanent --helper=foobar --set-family=ipv5
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:662"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:663:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23979\" ip netns exec fwd-test-20402 firewall-cmd --permanent --helper=foobar --set-family=ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:663"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23979" ip netns exec fwd-test-20402 firewall-cmd --permanent --helper=foobar --set-family=ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:663"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:664:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23979\" ip netns exec fwd-test-20402 firewall-cmd --permanent --helper=foobar --get-family | grep ipv4 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:664"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23979" ip netns exec fwd-test-20402 firewall-cmd --permanent --helper=foobar --get-family | grep ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:664"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:665:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23979\" ip netns exec fwd-test-20402 firewall-cmd --permanent --helper=foobar --set-family= "
at_fn_check_prepare_trace "firewall-cmd.at:665"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23979" ip netns exec fwd-test-20402 firewall-cmd --permanent --helper=foobar --set-family=
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:665"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:667:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23979\" ip netns exec fwd-test-20402 firewall-cmd --permanent --helper=foobar --get-family "
at_fn_check_prepare_trace "firewall-cmd.at:667"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23979" ip netns exec fwd-test-20402 firewall-cmd --permanent --helper=foobar --get-family
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:667"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:669:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23979\" ip netns exec fwd-test-20402 firewall-cmd --permanent --helper=foobar --get-ports "
at_fn_check_prepare_trace "firewall-cmd.at:669"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23979" ip netns exec fwd-test-20402 firewall-cmd --permanent --helper=foobar --get-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:669"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:672:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23979\" ip netns exec fwd-test-20402 firewall-cmd --permanent --helper=foobar --add-port=44/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:672"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23979" ip netns exec fwd-test-20402 firewall-cmd --permanent --helper=foobar --add-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:672"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:673:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23979\" ip netns exec fwd-test-20402 firewall-cmd --permanent --helper=foobar --get-ports | grep 44 "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:673"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23979" ip netns exec fwd-test-20402 firewall-cmd --permanent --helper=foobar --get-ports | grep 44
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:673"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:674:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23979\" ip netns exec fwd-test-20402 firewall-cmd --permanent --helper=foobar --query-port=44/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:674"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23979" ip netns exec fwd-test-20402 firewall-cmd --permanent --helper=foobar --query-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:674"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:675:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23979\" ip netns exec fwd-test-20402 firewall-cmd --permanent --helper=foobar --remove-port=44/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:675"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23979" ip netns exec fwd-test-20402 firewall-cmd --permanent --helper=foobar --remove-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:675"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:676:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23979\" ip netns exec fwd-test-20402 firewall-cmd --permanent --helper=foobar --query-port=44/tcp "
at_fn_check_prepare_trace "firewall-cmd.at:676"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23979" ip netns exec fwd-test-20402 firewall-cmd --permanent --helper=foobar --query-port=44/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:676"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:677:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23979\" ip netns exec fwd-test-20402 firewall-cmd --permanent --helper=foobar --get-ports "
at_fn_check_prepare_trace "firewall-cmd.at:677"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23979" ip netns exec fwd-test-20402 firewall-cmd --permanent --helper=foobar --get-ports
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:677"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:679:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23979\" ip netns exec fwd-test-20402 firewall-cmd --permanent --delete-helper=foobar "
at_fn_check_prepare_trace "firewall-cmd.at:679"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23979" ip netns exec fwd-test-20402 firewall-cmd --permanent --delete-helper=foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:679"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:680:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-23979\" ip netns exec fwd-test-20402 firewall-cmd --permanent --get-helpers | grep foobar "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:680"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-23979" ip netns exec fwd-test-20402 firewall-cmd --permanent --get-helpers | grep foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:680"
$at_failed && at_fn_log_failure
$at_traceon; }










            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/ERROR: INVALID_MODULE:/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_MODULE:/d'"; then
                sed -i -e '/ERROR: INVALID_MODULE:/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:681" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:681"
            $as_echo "firewall-cmd.at:681" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:681"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_102
#AT_START_103
at_fn_group_banner 103 'firewall-cmd.at:683' \
  "direct" "                                         " 7
at_xfail=no
(
  $as_echo "103. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:683: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:683"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:683"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:683: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:683"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:683"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:683: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:683"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:683"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:683: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:683"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:683"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-20007" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:683: ip netns add fwd-test-20007"
at_fn_check_prepare_trace "firewall-cmd.at:683"
( $at_check_trace; ip netns add fwd-test-20007
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:683"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:683" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:683"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:683" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:683"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:683" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:683"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:686:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --add-chain ipv4 filter mychain "
at_fn_check_prepare_trace "firewall-cmd.at:686"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --add-chain ipv4 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:686"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:687:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --get-chains ipv4 filter | grep mychain "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:687"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --get-chains ipv4 filter | grep mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:687"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:688:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --get-all-chains | grep \"ipv4 filter mychain\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:688"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --get-all-chains | grep "ipv4 filter mychain"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:688"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:689:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --query-chain ipv4 filter mychain "
at_fn_check_prepare_trace "firewall-cmd.at:689"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --query-chain ipv4 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:689"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:690:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --add-chain ipv5 filter mychain "
at_fn_check_prepare_trace "firewall-cmd.at:690"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --add-chain ipv5 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:690"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:691:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --add-chain ipv4 badtable mychain "
at_fn_check_prepare_trace "firewall-cmd.at:691"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --add-chain ipv4 badtable mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 108 $at_status "$at_srcdir/firewall-cmd.at:691"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:693:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --add-rule ipv4 filter mychain 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:693"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --add-rule ipv4 filter mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:693"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:694:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --get-rules ipv4 filter mychain | grep \"3 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:694"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --get-rules ipv4 filter mychain | grep "3 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:694"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:695:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --get-all-rules | grep \"ipv4 filter mychain 3 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:695"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --get-all-rules | grep "ipv4 filter mychain 3 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:695"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:696:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --query-rule ipv4 filter mychain 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:696"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --query-rule ipv4 filter mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:696"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:697:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --remove-rule ipv4 filter mychain 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:697"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --remove-rule ipv4 filter mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:697"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:698:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --query-rule ipv4 filter mychain 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:698"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --query-rule ipv4 filter mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:698"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:699:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --add-rule ipv5 filter mychain 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:699"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --add-rule ipv5 filter mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:699"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:700:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --add-rule ipv4 badtable mychain 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:700"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --add-rule ipv4 badtable mychain 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 108 $at_status "$at_srcdir/firewall-cmd.at:700"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:702:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --add-rule ipv4 filter mychain 3 -s 192.168.1.1 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:702"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --add-rule ipv4 filter mychain 3 -s 192.168.1.1 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:702"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:703:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --add-rule ipv4 filter mychain 4 -s 192.168.1.2 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:703"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --add-rule ipv4 filter mychain 4 -s 192.168.1.2 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:703"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:704:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --add-rule ipv4 filter mychain 5 -s 192.168.1.3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:704"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --add-rule ipv4 filter mychain 5 -s 192.168.1.3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:704"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:705:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --add-rule ipv4 filter mychain 6 -s 192.168.1.4 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:705"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --add-rule ipv4 filter mychain 6 -s 192.168.1.4 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:705"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:706:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --get-rules ipv4 filter mychain | grep \"3 -s 192.168.1.1 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:706"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --get-rules ipv4 filter mychain | grep "3 -s 192.168.1.1 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:706"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:707:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --get-rules ipv4 filter mychain | grep \"4 -s 192.168.1.2 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:707"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --get-rules ipv4 filter mychain | grep "4 -s 192.168.1.2 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:707"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:708:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --get-rules ipv4 filter mychain | grep \"5 -s 192.168.1.3 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:708"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --get-rules ipv4 filter mychain | grep "5 -s 192.168.1.3 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:708"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:709:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --get-rules ipv4 filter mychain | grep \"6 -s 192.168.1.4 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:709"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --get-rules ipv4 filter mychain | grep "6 -s 192.168.1.4 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:709"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:710:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --remove-rules ipv4 filter mychain "
at_fn_check_prepare_trace "firewall-cmd.at:710"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --remove-rules ipv4 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:710"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:711:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --query-rule ipv4 filter mychain 3 -s 192.168.1.1 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:711"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --query-rule ipv4 filter mychain 3 -s 192.168.1.1 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:711"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:712:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --query-rule ipv4 filter mychain 4 -s 192.168.1.2 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:712"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --query-rule ipv4 filter mychain 4 -s 192.168.1.2 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:712"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:713:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --query-rule ipv4 filter mychain 5 -s 192.168.1.3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:713"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --query-rule ipv4 filter mychain 5 -s 192.168.1.3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:713"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:714:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --query-rule ipv4 filter mychain 6 -s 192.168.1.4 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:714"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --query-rule ipv4 filter mychain 6 -s 192.168.1.4 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:714"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:716:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --remove-chain ipv5 filter mychain "
at_fn_check_prepare_trace "firewall-cmd.at:716"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --remove-chain ipv5 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:716"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:717:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --remove-chain ipv4 badtable mychain "
at_fn_check_prepare_trace "firewall-cmd.at:717"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --remove-chain ipv4 badtable mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 108 $at_status "$at_srcdir/firewall-cmd.at:717"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:718:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --remove-chain ipv4 filter mychain "
at_fn_check_prepare_trace "firewall-cmd.at:718"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --remove-chain ipv4 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:718"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:719:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --query-chain ipv4 filter mychain "
at_fn_check_prepare_trace "firewall-cmd.at:719"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --query-chain ipv4 filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:719"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:720:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --remove-chain ipv4 filter dummy "
at_fn_check_prepare_trace "firewall-cmd.at:720"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --remove-chain ipv4 filter dummy
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:720"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:723:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --reload "
at_fn_check_prepare_trace "firewall-cmd.at:723"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:723"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:724:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --list-all "
at_fn_check_prepare_trace "firewall-cmd.at:724"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --list-all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:724"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:725:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --get-services "
at_fn_check_prepare_trace "firewall-cmd.at:725"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --get-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:725"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:726:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --get-default-zone "
at_fn_check_prepare_trace "firewall-cmd.at:726"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --get-default-zone
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:726"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:727:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --zone=home --list-services "
at_fn_check_prepare_trace "firewall-cmd.at:727"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --zone=home --list-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:727"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:728:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --permanent --list-all "
at_fn_check_prepare_trace "firewall-cmd.at:728"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --permanent --list-all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:728"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:731:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --permanent --direct --add-chain ipv4 filter žluťoučký "
at_fn_check_prepare_trace "firewall-cmd.at:731"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --permanent --direct --add-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:731"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:732:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --permanent --direct --get-chains ipv4 filter |grep \"žluťoučký\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:732"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --permanent --direct --get-chains ipv4 filter |grep "žluťoučký"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:732"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:733:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --permanent --direct --get-all-chains | grep \"ipv4 filter žluťoučký\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:733"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --permanent --direct --get-all-chains | grep "ipv4 filter žluťoučký"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:733"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:734:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --permanent --direct --query-chain ipv4 filter žluťoučký "
at_fn_check_prepare_trace "firewall-cmd.at:734"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --permanent --direct --query-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:734"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:735:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --permanent --direct --add-rule ipv4 filter žluťoučký 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:735"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --permanent --direct --add-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:735"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:736:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --permanent --direct --get-rules ipv4 filter žluťoučký | grep ACCEPT "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:736"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --permanent --direct --get-rules ipv4 filter žluťoučký | grep ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:736"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:737:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --permanent --direct --get-all-rules | grep \"ipv4 filter žluťoučký 3 -j ACCEPT\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:737"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --permanent --direct --get-all-rules | grep "ipv4 filter žluťoučký 3 -j ACCEPT"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:737"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:738:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --permanent --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:738"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --permanent --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:738"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:739:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --permanent --direct --remove-rule ipv4 filter žluťoučký 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:739"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --permanent --direct --remove-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:739"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:740:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --permanent --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:740"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --permanent --direct --query-rule ipv4 filter žluťoučký 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:740"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:741:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --permanent --direct --remove-chain ipv4 filter žluťoučký "
at_fn_check_prepare_trace "firewall-cmd.at:741"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --permanent --direct --remove-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:741"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:742:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --permanent --direct --query-chain ipv4 filter žluťoučký "
at_fn_check_prepare_trace "firewall-cmd.at:742"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --permanent --direct --query-chain ipv4 filter žluťoučký
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:742"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:745:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:745"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:745"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:746:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --add-rule ipv4 filter FORWARD_direct 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:746"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --add-rule ipv4 filter FORWARD_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:746"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:747:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --add-rule ipv4 security INPUT_direct 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:747"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --add-rule ipv4 security INPUT_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:747"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:748:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --add-rule ipv4 raw PREROUTING_direct 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:748"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --add-rule ipv4 raw PREROUTING_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:748"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:749:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --add-rule ipv4 mangle PREROUTING_direct 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:749"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --add-rule ipv4 mangle PREROUTING_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:749"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:750:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --direct --add-rule ipv4 nat PREROUTING_direct 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:750"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --direct --add-rule ipv4 nat PREROUTING_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:750"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:751:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd --permanent --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:751"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd --permanent --direct --add-rule ipv4 filter INPUT_direct 3 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:751"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:752:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:752"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:752"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:752:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-16745\" ip netns exec fwd-test-20007 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:752"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-16745" ip netns exec fwd-test-20007 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:752"
$at_failed && at_fn_log_failure
$at_traceon; }











            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/ERROR: INVALID_TABLE:/d'               -e '/WARNING: NOT_ENABLED: chain/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_TABLE:/d'               -e '/WARNING: NOT_ENABLED: chain/d'"; then
                sed -i -e '/ERROR: INVALID_TABLE:/d'               -e '/WARNING: NOT_ENABLED: chain/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:753" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:753"
            $as_echo "firewall-cmd.at:753" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:753"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_103
#AT_START_104
at_fn_group_banner 104 'firewall-cmd.at:756' \
  "direct nat" "                                     " 7
at_xfail=no
(
  $as_echo "104. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:756: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:756"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:756"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:756: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:756"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:756"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:756: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:756"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:756"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:756: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:756"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:756"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-25049" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:756: ip netns add fwd-test-25049"
at_fn_check_prepare_trace "firewall-cmd.at:756"
( $at_check_trace; ip netns add fwd-test-25049
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:756"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1944" ip netns exec fwd-test-25049 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-1944" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:756" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:756"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1944" ip netns exec fwd-test-25049 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:756" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:756"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1944" ip netns exec fwd-test-25049 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:756" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:756"














    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:763:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1944\" ip netns exec fwd-test-25049 firewall-cmd --permanent --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81 "
at_fn_check_prepare_trace "firewall-cmd.at:763"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1944" ip netns exec fwd-test-25049 firewall-cmd --permanent --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:763"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:764:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1944\" ip netns exec fwd-test-25049 firewall-cmd --permanent --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:764"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1944" ip netns exec fwd-test-25049 firewall-cmd --permanent --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:764"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:765:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1944\" ip netns exec fwd-test-25049 firewall-cmd --reload "
at_fn_check_prepare_trace "firewall-cmd.at:765"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1944" ip netns exec fwd-test-25049 firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:765"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:766:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1944\" ip netns exec fwd-test-25049 firewall-cmd --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:766"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1944" ip netns exec fwd-test-25049 firewall-cmd --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:766"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:767:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1944\" ip netns exec fwd-test-25049 firewall-cmd --permanent --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81 "
at_fn_check_prepare_trace "firewall-cmd.at:767"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1944" ip netns exec fwd-test-25049 firewall-cmd --permanent --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:767"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:768:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1944\" ip netns exec fwd-test-25049 firewall-cmd --permanent --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82 "
at_fn_check_prepare_trace "firewall-cmd.at:768"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1944" ip netns exec fwd-test-25049 firewall-cmd --permanent --direct --add-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:768"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:769:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1944\" ip netns exec fwd-test-25049 firewall-cmd --permanent --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:769"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1944" ip netns exec fwd-test-25049 firewall-cmd --permanent --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:769"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:770:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1944\" ip netns exec fwd-test-25049 firewall-cmd --reload "
at_fn_check_prepare_trace "firewall-cmd.at:770"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1944" ip netns exec fwd-test-25049 firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:770"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:771:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1944\" ip netns exec fwd-test-25049 firewall-cmd --direct --get-all-rules |grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:771"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1944" ip netns exec fwd-test-25049 firewall-cmd --direct --get-all-rules |grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 81"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:771"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:772:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1944\" ip netns exec fwd-test-25049 firewall-cmd --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:772"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1944" ip netns exec fwd-test-25049 firewall-cmd --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:772"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:773:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1944\" ip netns exec fwd-test-25049 firewall-cmd --permanent --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82 "
at_fn_check_prepare_trace "firewall-cmd.at:773"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1944" ip netns exec fwd-test-25049 firewall-cmd --permanent --direct --remove-rule ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:773"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:774:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1944\" ip netns exec fwd-test-25049 firewall-cmd --reload "
at_fn_check_prepare_trace "firewall-cmd.at:774"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1944" ip netns exec fwd-test-25049 firewall-cmd --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:774"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:775:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-1944\" ip netns exec fwd-test-25049 firewall-cmd --direct --get-all-rules | grep \"ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:775"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-1944" ip netns exec fwd-test-25049 firewall-cmd --direct --get-all-rules | grep "ipv4 nat OUTPUT 0 -s 1.2.3.4 -d 1.2.3.4 -p tcp --dport 80 -j REDIRECT --to-ports 82"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:775"
$at_failed && at_fn_log_failure
$at_traceon; }












            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:778" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:778"
            $as_echo "firewall-cmd.at:778" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:778"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_104
#AT_START_105
at_fn_group_banner 105 'firewall-cmd.at:780' \
  "direct passthrough" "                             " 7
at_xfail=no
(
  $as_echo "105. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:780: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:780"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:780"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:780: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:780"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:780"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:780: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:780"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:780"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:780: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:780"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:780"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-16660" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:780: ip netns add fwd-test-16660"
at_fn_check_prepare_trace "firewall-cmd.at:780"
( $at_check_trace; ip netns add fwd-test-16660
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:780"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-88" ip netns exec fwd-test-16660 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-88" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:780" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:780"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-88" ip netns exec fwd-test-16660 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:780" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:780"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-88" ip netns exec fwd-test-16660 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:780" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:780"





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:783: if ! modprobe dummy; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:783"
( $at_check_trace; if ! modprobe dummy; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:783"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:785:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-88\" ip netns exec fwd-test-16660 firewall-cmd --direct --passthrough ipv4 --table mangle --append POSTROUTING --out-interface dummy0 --protocol udp --destination-port 68 --jump CHECKSUM --checksum-fill "
at_fn_check_prepare_trace "firewall-cmd.at:785"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-88" ip netns exec fwd-test-16660 firewall-cmd --direct --passthrough ipv4 --table mangle --append POSTROUTING --out-interface dummy0 --protocol udp --destination-port 68 --jump CHECKSUM --checksum-fill
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:785"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:786:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-88\" ip netns exec fwd-test-16660 firewall-cmd --direct --passthrough ipv4 --table mangle --delete POSTROUTING --out-interface dummy0 --protocol udp --destination-port 68 --jump CHECKSUM --checksum-fill "
at_fn_check_prepare_trace "firewall-cmd.at:786"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-88" ip netns exec fwd-test-16660 firewall-cmd --direct --passthrough ipv4 --table mangle --delete POSTROUTING --out-interface dummy0 --protocol udp --destination-port 68 --jump CHECKSUM --checksum-fill
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:786"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:788:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-88\" ip netns exec fwd-test-16660 firewall-cmd --direct --add-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:788"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-88" ip netns exec fwd-test-16660 firewall-cmd --direct --add-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:788"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:789:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-88\" ip netns exec fwd-test-16660 firewall-cmd --direct --add-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:789"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-88" ip netns exec fwd-test-16660 firewall-cmd --direct --add-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:789"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:790:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-88\" ip netns exec fwd-test-16660 firewall-cmd --direct --query-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:790"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-88" ip netns exec fwd-test-16660 firewall-cmd --direct --query-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:790"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:791:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-88\" ip netns exec fwd-test-16660 firewall-cmd --direct --query-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:791"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-88" ip netns exec fwd-test-16660 firewall-cmd --direct --query-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:791"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:792:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-88\" ip netns exec fwd-test-16660 firewall-cmd --direct --remove-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:792"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-88" ip netns exec fwd-test-16660 firewall-cmd --direct --remove-passthrough ipv7 --table filter -A INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:792"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:793:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-88\" ip netns exec fwd-test-16660 firewall-cmd --direct --remove-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:793"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-88" ip netns exec fwd-test-16660 firewall-cmd --direct --remove-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:793"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:794:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-88\" ip netns exec fwd-test-16660 firewall-cmd --direct --query-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT "
at_fn_check_prepare_trace "firewall-cmd.at:794"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-88" ip netns exec fwd-test-16660 firewall-cmd --direct --query-passthrough ipv4 --table filter --append INPUT --in-interface dummy0 --protocol tcp --destination-port 67 --jump ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:794"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:804:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-88\" ip netns exec fwd-test-16660 firewall-cmd --direct --passthrough ipv5 -nvL "
at_fn_check_prepare_trace "firewall-cmd.at:804"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-88" ip netns exec fwd-test-16660 firewall-cmd --direct --passthrough ipv5 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:804"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:805:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-88\" ip netns exec fwd-test-16660 firewall-cmd --direct --passthrough ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:805"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-88" ip netns exec fwd-test-16660 firewall-cmd --direct --passthrough ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:805"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:807:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-88\" ip netns exec fwd-test-16660 firewall-cmd --direct --passthrough --get-chains ipv4 filter "
at_fn_check_prepare_trace "firewall-cmd.at:807"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-88" ip netns exec fwd-test-16660 firewall-cmd --direct --passthrough --get-chains ipv4 filter
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:807"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:809:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-88\" ip netns exec fwd-test-16660 firewall-cmd --permanent --direct --add-passthrough ipv4 "
at_fn_check_prepare_trace "firewall-cmd.at:809"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-88" ip netns exec fwd-test-16660 firewall-cmd --permanent --direct --add-passthrough ipv4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:809"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:810:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-88\" ip netns exec fwd-test-16660 firewall-cmd --permanent --direct --add-passthrough ipv5 -nvL "
at_fn_check_prepare_trace "firewall-cmd.at:810"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-88" ip netns exec fwd-test-16660 firewall-cmd --permanent --direct --add-passthrough ipv5 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:810"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:811:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-88\" ip netns exec fwd-test-16660 firewall-cmd --permanent --direct --add-passthrough ipv4 -nvL "
at_fn_check_prepare_trace "firewall-cmd.at:811"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-88" ip netns exec fwd-test-16660 firewall-cmd --permanent --direct --add-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:811"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:812:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-88\" ip netns exec fwd-test-16660 firewall-cmd --permanent --direct --get-passthroughs ipv4 | grep \"\\-nvL\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:812"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-88" ip netns exec fwd-test-16660 firewall-cmd --permanent --direct --get-passthroughs ipv4 | grep "\-nvL"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:812"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:813:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-88\" ip netns exec fwd-test-16660 firewall-cmd --permanent --direct --get-all-passthroughs | grep \"ipv4 \\-nvL\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:813"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-88" ip netns exec fwd-test-16660 firewall-cmd --permanent --direct --get-all-passthroughs | grep "ipv4 \-nvL"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:813"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:814:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-88\" ip netns exec fwd-test-16660 firewall-cmd --permanent --direct --query-passthrough ipv4 -nvL "
at_fn_check_prepare_trace "firewall-cmd.at:814"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-88" ip netns exec fwd-test-16660 firewall-cmd --permanent --direct --query-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:814"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:815:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-88\" ip netns exec fwd-test-16660 firewall-cmd --permanent --direct --remove-passthrough ipv4 -nvL "
at_fn_check_prepare_trace "firewall-cmd.at:815"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-88" ip netns exec fwd-test-16660 firewall-cmd --permanent --direct --remove-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:815"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:816:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-88\" ip netns exec fwd-test-16660 firewall-cmd --permanent --direct --query-passthrough ipv4 -nvL "
at_fn_check_prepare_trace "firewall-cmd.at:816"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-88" ip netns exec fwd-test-16660 firewall-cmd --permanent --direct --query-passthrough ipv4 -nvL
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:816"
$at_failed && at_fn_log_failure
$at_traceon; }










            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/WARNING: NOT_ENABLED: passthrough/d'" != x"ignore"; then
            if test -n "-e '/WARNING: NOT_ENABLED: passthrough/d'"; then
                sed -i -e '/WARNING: NOT_ENABLED: passthrough/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:817" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:817"
            $as_echo "firewall-cmd.at:817" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:817"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_105
#AT_START_106
at_fn_group_banner 106 'firewall-cmd.at:819' \
  "direct ebtables" "                                " 7
at_xfail=no
(
  $as_echo "106. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:819: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:819"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:819"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:819: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:819"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:819"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:819: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:819"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:819"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:819: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:819"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:819"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-11265" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:819: ip netns add fwd-test-11265"
at_fn_check_prepare_trace "firewall-cmd.at:819"
( $at_check_trace; ip netns add fwd-test-11265
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:819"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27955" ip netns exec fwd-test-11265 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-27955" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:819" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:819"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27955" ip netns exec fwd-test-11265 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:819" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:819"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27955" ip netns exec fwd-test-11265 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:819" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:819"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:822:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27955\" ip netns exec fwd-test-11265 firewall-cmd --direct --add-chain eb filter mychain "
at_fn_check_prepare_trace "firewall-cmd.at:822"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27955" ip netns exec fwd-test-11265 firewall-cmd --direct --add-chain eb filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:822"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:823:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27955\" ip netns exec fwd-test-11265 firewall-cmd --direct --get-chains eb filter | grep mychain "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:823"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27955" ip netns exec fwd-test-11265 firewall-cmd --direct --get-chains eb filter | grep mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:823"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:824:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27955\" ip netns exec fwd-test-11265 firewall-cmd --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP "
at_fn_check_prepare_trace "firewall-cmd.at:824"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27955" ip netns exec fwd-test-11265 firewall-cmd --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:824"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:825:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27955\" ip netns exec fwd-test-11265 firewall-cmd --direct --add-rule eb filter mychain 999 -p IPv6 --ip6-protocol UDP --ip6-source-port ! 12345 -j DROP "
at_fn_check_prepare_trace "firewall-cmd.at:825"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27955" ip netns exec fwd-test-11265 firewall-cmd --direct --add-rule eb filter mychain 999 -p IPv6 --ip6-protocol UDP --ip6-source-port ! 12345 -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:825"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:826:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27955\" ip netns exec fwd-test-11265     sh <<-\"HERE\"
    { { { { ebtables --concurrent -t filter -L mychain; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     grep -v \"^Bridge\" |     sed -e 's/\\([-][-][-a-zA-Z0-9]\\+\\)[ ]\\+[!]/! \\1/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:826"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27955" ip netns exec fwd-test-11265     sh <<-"HERE"
    { { { { ebtables --concurrent -t filter -L mychain; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     grep -v "^Bridge" |     sed -e 's/\([-][-][-a-zA-Z0-9]\+\)[ ]\+[!]/! \1/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-p IPv6 -j DROP
-p IPv6 --ip6-proto udp ! --ip6-sport 12345 -j DROP
-j RETURN
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:826"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:831:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27955\" ip netns exec fwd-test-11265 firewall-cmd --direct --remove-rule eb filter mychain 1 -p 0x86dd -j DROP "
at_fn_check_prepare_trace "firewall-cmd.at:831"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27955" ip netns exec fwd-test-11265 firewall-cmd --direct --remove-rule eb filter mychain 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:831"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:832:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27955\" ip netns exec fwd-test-11265     sh <<-\"HERE\"
    { { { { ebtables --concurrent -t filter -L mychain; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     grep -v \"^Bridge\" |     sed -e 's/\\([-][-][-a-zA-Z0-9]\\+\\)[ ]\\+[!]/! \\1/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:832"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27955" ip netns exec fwd-test-11265     sh <<-"HERE"
    { { { { ebtables --concurrent -t filter -L mychain; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     grep -v "^Bridge" |     sed -e 's/\([-][-][-a-zA-Z0-9]\+\)[ ]\+[!]/! \1/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-p IPv6 --ip6-proto udp ! --ip6-sport 12345 -j DROP
-j RETURN
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:832"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:837:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27955\" ip netns exec fwd-test-11265 firewall-cmd --direct --add-rule eb filter INPUT 1 -p 0x86dd -j DROP "
at_fn_check_prepare_trace "firewall-cmd.at:837"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27955" ip netns exec fwd-test-11265 firewall-cmd --direct --add-rule eb filter INPUT 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:837"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:838:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27955\" ip netns exec fwd-test-11265 firewall-cmd --direct --add-rule eb filter INPUT_direct 1 -p 0x86dd -j DROP "
at_fn_check_prepare_trace "firewall-cmd.at:838"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27955" ip netns exec fwd-test-11265 firewall-cmd --direct --add-rule eb filter INPUT_direct 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:838"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:839:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27955\" ip netns exec fwd-test-11265     sh <<-\"HERE\"
    { { { { ebtables --concurrent -t filter -L INPUT_direct; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     grep -v \"^Bridge\" |     sed -e 's/\\([-][-][-a-zA-Z0-9]\\+\\)[ ]\\+[!]/! \\1/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:839"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27955" ip netns exec fwd-test-11265     sh <<-"HERE"
    { { { { ebtables --concurrent -t filter -L INPUT_direct; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     grep -v "^Bridge" |     sed -e 's/\([-][-][-a-zA-Z0-9]\+\)[ ]\+[!]/! \1/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-p IPv6 -j DROP
-p IPv6 -j DROP
-j RETURN
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:839"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:851:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27955\" ip netns exec fwd-test-11265 firewall-cmd --direct --remove-rules eb filter INPUT "
at_fn_check_prepare_trace "firewall-cmd.at:851"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27955" ip netns exec fwd-test-11265 firewall-cmd --direct --remove-rules eb filter INPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:851"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:852:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27955\" ip netns exec fwd-test-11265 firewall-cmd --direct --remove-rules eb filter mychain "
at_fn_check_prepare_trace "firewall-cmd.at:852"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27955" ip netns exec fwd-test-11265 firewall-cmd --direct --remove-rules eb filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:852"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:854:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27955\" ip netns exec fwd-test-11265 firewall-cmd --permanent --direct --add-chain eb filter mychain "
at_fn_check_prepare_trace "firewall-cmd.at:854"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27955" ip netns exec fwd-test-11265 firewall-cmd --permanent --direct --add-chain eb filter mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:854"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:855:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27955\" ip netns exec fwd-test-11265 firewall-cmd --permanent --direct --get-chains eb filter | grep mychain "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:855"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27955" ip netns exec fwd-test-11265 firewall-cmd --permanent --direct --get-chains eb filter | grep mychain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:855"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:856:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27955\" ip netns exec fwd-test-11265 firewall-cmd --permanent --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP "
at_fn_check_prepare_trace "firewall-cmd.at:856"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27955" ip netns exec fwd-test-11265 firewall-cmd --permanent --direct --add-rule eb filter mychain 1 -p 0x86dd -j DROP
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:856"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:857:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27955\" ip netns exec fwd-test-11265 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:857"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27955" ip netns exec fwd-test-11265 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:857"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:857:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27955\" ip netns exec fwd-test-11265 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:857"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27955" ip netns exec fwd-test-11265 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:857"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:858:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27955\" ip netns exec fwd-test-11265     sh <<-\"HERE\"
    { { { { ebtables --concurrent -t filter -L mychain; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     grep -v \"^Bridge\" |     sed -e 's/\\([-][-][-a-zA-Z0-9]\\+\\)[ ]\\+[!]/! \\1/g'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:858"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27955" ip netns exec fwd-test-11265     sh <<-"HERE"
    { { { { ebtables --concurrent -t filter -L mychain; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     grep -v "^Bridge" |     sed -e 's/\([-][-][-a-zA-Z0-9]\+\)[ ]\+[!]/! \1/g'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "-p IPv6 -j DROP
-j RETURN
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:858"
$at_failed && at_fn_log_failure
$at_traceon; }










            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:862" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:862"
            $as_echo "firewall-cmd.at:862" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:862"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_106
#AT_START_107
at_fn_group_banner 107 'firewall-cmd.at:864' \
  "lockdown" "                                       " 7
at_xfail=no
(
  $as_echo "107. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:864: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:864"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:864"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:864: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:864"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:864"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:864: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:864"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:864"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:864: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:864"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:864"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-26216" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:864: ip netns add fwd-test-26216"
at_fn_check_prepare_trace "firewall-cmd.at:864"
( $at_check_trace; ip netns add fwd-test-26216
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:864"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:864" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:864"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:864" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:864"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:864" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:864"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:867:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --add-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_trace "firewall-cmd.at:867"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --add-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:867"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:868:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --query-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_trace "firewall-cmd.at:868"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --query-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:868"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:869:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --list-lockdown-whitelist-commands | grep \"/usr/bin/command\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:869"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --list-lockdown-whitelist-commands | grep "/usr/bin/command"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:869"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:870:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --remove-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_trace "firewall-cmd.at:870"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --remove-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:870"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:871:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --query-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_trace "firewall-cmd.at:871"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --query-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:871"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:872:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --permanent --add-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_trace "firewall-cmd.at:872"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --permanent --add-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:872"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:873:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --permanent --query-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_trace "firewall-cmd.at:873"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --permanent --query-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:873"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:874:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --permanent --list-lockdown-whitelist-commands | grep \"/usr/bin/command\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:874"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --permanent --list-lockdown-whitelist-commands | grep "/usr/bin/command"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:874"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:875:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --permanent --remove-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_trace "firewall-cmd.at:875"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --permanent --remove-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:875"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:876:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --permanent --query-lockdown-whitelist-command /usr/bin/command "
at_fn_check_prepare_trace "firewall-cmd.at:876"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --permanent --query-lockdown-whitelist-command /usr/bin/command
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:876"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:878:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_trace "firewall-cmd.at:878"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:878"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:879:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_trace "firewall-cmd.at:879"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:879"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:880:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --list-lockdown-whitelist-contexts | grep \"system_u:system_r:MadDaemon_t:s0\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:880"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --list-lockdown-whitelist-contexts | grep "system_u:system_r:MadDaemon_t:s0"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:880"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:881:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_trace "firewall-cmd.at:881"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:881"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:882:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_trace "firewall-cmd.at:882"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:882"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:883:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --permanent --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_trace "firewall-cmd.at:883"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --permanent --add-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:883"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:884:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --permanent --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_trace "firewall-cmd.at:884"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --permanent --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:884"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:885:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --permanent --list-lockdown-whitelist-contexts | grep \"system_u:system_r:MadDaemon_t:s0\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:885"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --permanent --list-lockdown-whitelist-contexts | grep "system_u:system_r:MadDaemon_t:s0"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:885"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:886:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --permanent --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_trace "firewall-cmd.at:886"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --permanent --remove-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:886"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:887:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --permanent --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0 "
at_fn_check_prepare_trace "firewall-cmd.at:887"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --permanent --query-lockdown-whitelist-context system_u:system_r:MadDaemon_t:s0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:887"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:889:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --add-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_trace "firewall-cmd.at:889"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --add-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:889"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:890:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --query-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_trace "firewall-cmd.at:890"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --query-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:890"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:891:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --list-lockdown-whitelist-uids | grep \"6666\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:891"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --list-lockdown-whitelist-uids | grep "6666"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:891"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:892:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --remove-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_trace "firewall-cmd.at:892"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --remove-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:892"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:893:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --query-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_trace "firewall-cmd.at:893"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --query-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:893"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:894:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --add-lockdown-whitelist-uid 6666x "
at_fn_check_prepare_trace "firewall-cmd.at:894"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --add-lockdown-whitelist-uid 6666x
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:894"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:895:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --permanent --add-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_trace "firewall-cmd.at:895"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --permanent --add-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:895"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:896:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --permanent --query-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_trace "firewall-cmd.at:896"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --permanent --query-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:896"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:897:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --permanent --list-lockdown-whitelist-uids | grep \"6666\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:897"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --permanent --list-lockdown-whitelist-uids | grep "6666"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:897"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:898:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --permanent --remove-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_trace "firewall-cmd.at:898"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --permanent --remove-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:898"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:899:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --permanent --query-lockdown-whitelist-uid 6666 "
at_fn_check_prepare_trace "firewall-cmd.at:899"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --permanent --query-lockdown-whitelist-uid 6666
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:899"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:900:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --permanent --add-lockdown-whitelist-uid 6666x "
at_fn_check_prepare_trace "firewall-cmd.at:900"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --permanent --add-lockdown-whitelist-uid 6666x
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 2 $at_status "$at_srcdir/firewall-cmd.at:900"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:902:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --add-lockdown-whitelist-user theboss "
at_fn_check_prepare_trace "firewall-cmd.at:902"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --add-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:902"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:903:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --query-lockdown-whitelist-user theboss "
at_fn_check_prepare_trace "firewall-cmd.at:903"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --query-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:903"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:904:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --list-lockdown-whitelist-users | grep \"theboss\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:904"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --list-lockdown-whitelist-users | grep "theboss"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:904"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:905:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --remove-lockdown-whitelist-user theboss "
at_fn_check_prepare_trace "firewall-cmd.at:905"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --remove-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:905"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:906:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --query-lockdown-whitelist-user theboss "
at_fn_check_prepare_trace "firewall-cmd.at:906"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --query-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:906"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:907:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --permanent --add-lockdown-whitelist-user theboss "
at_fn_check_prepare_trace "firewall-cmd.at:907"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --permanent --add-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:907"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:908:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --permanent --query-lockdown-whitelist-user theboss "
at_fn_check_prepare_trace "firewall-cmd.at:908"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --permanent --query-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:908"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:909:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --permanent --list-lockdown-whitelist-users | grep \"theboss\" "
at_fn_check_prepare_notrace 'a shell pipeline' "firewall-cmd.at:909"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --permanent --list-lockdown-whitelist-users | grep "theboss"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:909"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:910:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --permanent --remove-lockdown-whitelist-user theboss "
at_fn_check_prepare_trace "firewall-cmd.at:910"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --permanent --remove-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:910"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:911:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --permanent --query-lockdown-whitelist-user theboss "
at_fn_check_prepare_trace "firewall-cmd.at:911"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --permanent --query-lockdown-whitelist-user theboss
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:911"
$at_failed && at_fn_log_failure
$at_traceon; }





    $as_echo "firewall-cmd.at:913" >"$at_check_line_file"
(test `whoami` != 'root') \
  && at_fn_check_skip 77 "$at_srcdir/firewall-cmd.at:913"



    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:914:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --add-lockdown-whitelist-user root "
at_fn_check_prepare_trace "firewall-cmd.at:914"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --add-lockdown-whitelist-user root
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:914"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:915:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --lockdown-on "
at_fn_check_prepare_trace "firewall-cmd.at:915"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --lockdown-on
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:915"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:916:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --query-lockdown "
at_fn_check_prepare_trace "firewall-cmd.at:916"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --query-lockdown
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:916"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:917:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --lockdown-off "
at_fn_check_prepare_trace "firewall-cmd.at:917"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --lockdown-off
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:917"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:918:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3948\" ip netns exec fwd-test-26216 firewall-cmd --query-lockdown "
at_fn_check_prepare_trace "firewall-cmd.at:918"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3948" ip netns exec fwd-test-26216 firewall-cmd --query-lockdown
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:918"
$at_failed && at_fn_log_failure
$at_traceon; }










            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:919" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:919"
            $as_echo "firewall-cmd.at:919" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:919"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_107
#AT_START_108
at_fn_group_banner 108 'firewall-cmd.at:931' \
  "rich rules good" "                                " 7
at_xfail=no
(
  $as_echo "108. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:931: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:931"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:931"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:931: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:931"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:931"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:931: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:931"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:931"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:931: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:931"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:931"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-14520" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:931: ip netns add fwd-test-14520"
at_fn_check_prepare_trace "firewall-cmd.at:931"
( $at_check_trace; ip netns add fwd-test-14520
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:931"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:931" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:931"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:931" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:931"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:931" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:931"









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:934:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --add-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:934"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --add-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:934"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:934:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:934"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:934"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:934:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --remove-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:934"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --remove-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:934"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:934:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:934"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:934"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:934:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --add-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:934"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --add-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:934"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:934:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:934"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:934"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:934:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --remove-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:934"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --remove-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:934"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:934:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule protocol value=\"ah\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:934"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:934"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:935:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --add-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:935"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --add-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:935"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:935:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:935"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:935"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:935:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --remove-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:935"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --remove-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:935"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:935:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:935"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:935"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:935:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --add-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:935"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --add-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:935"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:935:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:935"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:935"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:935:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --remove-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:935"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --remove-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:935"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:935:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule protocol value=\"esp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:935"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule protocol value="esp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:935"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:936:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --add-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:936"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --add-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:936"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:936:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:936"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:936"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:936:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --remove-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:936"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --remove-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:936"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:936:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:936"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:936"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:936:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --add-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:936"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --add-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:936"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:936:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:936"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:936"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:936:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --remove-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:936"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --remove-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:936"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:936:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule protocol value=\"sctp\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:936"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule protocol value="sctp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:936"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:937:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:937"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:937"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:937:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:937"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:937"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:937:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:937"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:937"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:937:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:937"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:937"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:937:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:937"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:937"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:937:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:937"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:937"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:937:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:937"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:937"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:937:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" service name=\"tftp\" log prefix=\"tftp: \" level=\"info\" limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:937"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" service name="tftp" log prefix="tftp: " level="info" limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:937"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:938:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --add-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:938"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --add-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:938"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:938:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:938"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:938"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:938:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:938"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --remove-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:938"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:938:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:938"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:938"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:938:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:938"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:938"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:938:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:938"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:938"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:938:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:938"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:938"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:938:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source not address=\"192.168.0.0/24\" service name=\"dns\" log prefix=\"dns: \" level=\"info\" limit value=\"2/m\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:938"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source not address="192.168.0.0/24" service name="dns" log prefix="dns: " level="info" limit value="2/m" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:938"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:947:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --add-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_trace "firewall-cmd.at:947"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --add-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:947"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:947:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_trace "firewall-cmd.at:947"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:947"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:947:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --remove-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_trace "firewall-cmd.at:947"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --remove-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:947"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:947:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_trace "firewall-cmd.at:947"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:947"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:947:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_trace "firewall-cmd.at:947"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:947"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:947:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_trace "firewall-cmd.at:947"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:947"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:947:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_trace "firewall-cmd.at:947"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:947"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:947:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" destination address=\"1.2.3.4\" forward-port port=\"4011\" protocol=\"tcp\" to-port=\"4012\" to-addr=\"9.8.7.6\"' "
at_fn_check_prepare_trace "firewall-cmd.at:947"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" destination address="1.2.3.4" forward-port port="4011" protocol="tcp" to-port="4012" to-addr="9.8.7.6"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:947"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:948:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:948"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:948"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:948:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:948"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:948"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:948:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:948"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:948"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:948:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:948"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:948"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:948:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:948"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:948"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:948:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:948"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:948"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:948:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:948"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:948"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:948:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.0.0/24\" icmp-block name=\"source-quench\" log prefix=\"source-quench: \" level=\"info\" limit value=\"4/m\"' "
at_fn_check_prepare_trace "firewall-cmd.at:948"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.0.0/24" icmp-block name="source-quench" log prefix="source-quench: " level="info" limit value="4/m"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:948"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:949:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:949"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --add-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:949"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:949:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:949"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:949"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:949:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:949"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --remove-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:949"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:949:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:949"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:949"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:949:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:949"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:949"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:949:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:949"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:949"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:949:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:949"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:949"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:949:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:949"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:949"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:950:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --add-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:950"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --add-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:950"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:950:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:950"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:950"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:950:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --remove-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:950"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --remove-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:950"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:950:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:950"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:950"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:950:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:950"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:950"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:950:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:950"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:950"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:950:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:950"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:950"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:950:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" source address=\"10.1.1.0/24\" destination address=\"192.168.1.0/24\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:950"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" source address="10.1.1.0/24" destination address="192.168.1.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:950"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:951:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --add-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:951"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --add-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:951"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:951:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:951"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:951"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:951:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --remove-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:951"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --remove-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:951"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:951:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:951"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:951"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:951:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:951"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:951"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:951:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:951"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:951"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:951:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:951"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:951"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:951:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" destination address=\"192.168.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:951"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" destination address="192.168.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:951"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:952:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:952"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --add-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:952"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:952:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:952"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:952"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:952:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --remove-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:952"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --remove-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:952"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:952:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:952"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:952"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:952:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:952"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --add-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:952"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:952:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:952"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:952"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:952:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --remove-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:952"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --remove-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:952"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:952:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" to-addr=\"192.168.100.2\" protocol=\"tcp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:952"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule forward-port port="2222" to-port="22" to-addr="192.168.100.2" protocol="tcp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:952"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:953:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --add-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:953"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --add-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:953"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:953:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:953"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:953"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:953:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --remove-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:953"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --remove-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:953"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:953:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:953"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:953"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:953:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --add-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:953"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --add-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:953"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:953:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:953"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:953"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:953:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --remove-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:953"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --remove-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:953"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:953:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule forward-port port=\"66\" to-port=\"666\" to-addr=\"192.168.100.2\" protocol=\"sctp\" family=\"ipv4\" source address=\"192.168.2.100\"' "
at_fn_check_prepare_trace "firewall-cmd.at:953"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule forward-port port="66" to-port="666" to-addr="192.168.100.2" protocol="sctp" family="ipv4" source address="192.168.2.100"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:953"
$at_failed && at_fn_log_failure
$at_traceon; }















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:958:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --add-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_trace "firewall-cmd.at:958"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --add-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:958"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:958:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_trace "firewall-cmd.at:958"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:958"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:958:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --remove-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_trace "firewall-cmd.at:958"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --remove-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:958"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:958:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_trace "firewall-cmd.at:958"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --query-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:958"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:958:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_trace "firewall-cmd.at:958"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:958"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:958:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_trace "firewall-cmd.at:958"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:958"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:958:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --remove-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_trace "firewall-cmd.at:958"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --remove-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:958"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:958:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18868\" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule family=\"ipv4\" port port=\"222\" protocol=\"tcp\" mark set=\"0xff\"' "
at_fn_check_prepare_trace "firewall-cmd.at:958"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18868" ip netns exec fwd-test-14520 firewall-cmd --permanent --query-rich-rule='rule family="ipv4" port port="222" protocol="tcp" mark set="0xff"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:958"
$at_failed && at_fn_log_failure
$at_traceon; }











            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:959" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:959"
            $as_echo "firewall-cmd.at:959" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:959"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_108
#AT_START_109
at_fn_group_banner 109 'firewall-cmd.at:960' \
  "rich rules audit" "                               " 7
at_xfail=no
(
  $as_echo "109. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:960: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:960"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:960"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:960: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:960"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:960"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:960: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:960"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:960"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:960: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:960"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:960"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-4407" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:960: ip netns add fwd-test-4407"
at_fn_check_prepare_trace "firewall-cmd.at:960"
( $at_check_trace; ip netns add fwd-test-4407
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:960"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18911" ip netns exec fwd-test-4407 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-18911" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:960" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:960"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18911" ip netns exec fwd-test-4407 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:960" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:960"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18911" ip netns exec fwd-test-4407 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:960" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:960"












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:964:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18911\" ip netns exec fwd-test-4407 firewall-cmd --add-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:964"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18911" ip netns exec fwd-test-4407 firewall-cmd --add-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:964"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:964:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18911\" ip netns exec fwd-test-4407 firewall-cmd --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:964"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18911" ip netns exec fwd-test-4407 firewall-cmd --query-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:964"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:964:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18911\" ip netns exec fwd-test-4407 firewall-cmd --remove-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:964"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18911" ip netns exec fwd-test-4407 firewall-cmd --remove-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:964"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:964:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18911\" ip netns exec fwd-test-4407 firewall-cmd --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:964"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18911" ip netns exec fwd-test-4407 firewall-cmd --query-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:964"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:964:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18911\" ip netns exec fwd-test-4407 firewall-cmd --permanent --add-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:964"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18911" ip netns exec fwd-test-4407 firewall-cmd --permanent --add-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:964"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:964:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18911\" ip netns exec fwd-test-4407 firewall-cmd --permanent --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:964"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18911" ip netns exec fwd-test-4407 firewall-cmd --permanent --query-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:964"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:964:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18911\" ip netns exec fwd-test-4407 firewall-cmd --permanent --remove-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:964"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18911" ip netns exec fwd-test-4407 firewall-cmd --permanent --remove-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:964"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:964:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-18911\" ip netns exec fwd-test-4407 firewall-cmd --permanent --query-rich-rule='rule service name=\"ftp\" audit limit value=\"1/m\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:964"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-18911" ip netns exec fwd-test-4407 firewall-cmd --permanent --query-rich-rule='rule service name="ftp" audit limit value="1/m" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:964"
$at_failed && at_fn_log_failure
$at_traceon; }











            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:965" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:965"
            $as_echo "firewall-cmd.at:965" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:965"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_109
#AT_START_110
at_fn_group_banner 110 'firewall-cmd.at:968' \
  "rich rules priority" "                            " 7
at_xfail=no
(
  $as_echo "110. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:968: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:968"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:968"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:968: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:968"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:968"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:968: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:968"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:968"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:968: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:968"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:968"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-32448" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:968: ip netns add fwd-test-32448"
at_fn_check_prepare_trace "firewall-cmd.at:968"
( $at_check_trace; ip netns add fwd-test-32448
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:968"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:968" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:968"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:968" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:968"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:968" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:968"




















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:998:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:998"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_public_pre all -- 0.0.0.0/0 0.0.0.0/0
IN_public_log all -- 0.0.0.0/0 0.0.0.0/0
IN_public_deny all -- 0.0.0.0/0 0.0.0.0/0
IN_public_allow all -- 0.0.0.0/0 0.0.0.0/0
IN_public_post all -- 0.0.0.0/0 0.0.0.0/0
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:998"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1006:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L FWDI_public; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1006"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L FWDI_public; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWDI_public_pre all -- 0.0.0.0/0 0.0.0.0/0
FWDI_public_log all -- 0.0.0.0/0 0.0.0.0/0
FWDI_public_deny all -- 0.0.0.0/0 0.0.0.0/0
FWDI_public_allow all -- 0.0.0.0/0 0.0.0.0/0
FWDI_public_post all -- 0.0.0.0/0 0.0.0.0/0
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1006"
$at_failed && at_fn_log_failure
$at_traceon; }




























    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1036:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule port port=\"1111\" protocol=\"tcp\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:1036"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule port port="1111" protocol="tcp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1036"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1037:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=0 port port=\"1122\" protocol=\"tcp\" audit accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1037"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=0 port port="1122" protocol="tcp" audit accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1037"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1038:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule port port=\"2222\" protocol=\"tcp\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1038"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule port port="2222" protocol="tcp" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1038"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1039:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule port port=\"3333\" protocol=\"tcp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1039"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule port port="3333" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1039"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1040:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=0 port port=\"4444\" protocol=\"tcp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1040"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=0 port port="4444" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1040"
$at_failed && at_fn_log_failure
$at_traceon; }


















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1067:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_log; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1067"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_log; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "LOG tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:1111 ctstate NEW,UNTRACKED LOG flags 0 level 4
AUDIT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:1122 ctstate NEW,UNTRACKED AUDIT accept
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1067"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1071:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1071"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:2222 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1071"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1074:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1074"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:1122 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:3333 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:4444 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1074"
$at_failed && at_fn_log_failure
$at_traceon; }





































    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1094:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:1094"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1094"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1094:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:1094"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1094"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1097:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=-32768 port port=\"1234\" protocol=\"tcp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1097"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=-32768 port port="1234" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1097"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1098:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=32767 port port=\"1234\" protocol=\"tcp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1098"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=32767 port port="1234" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1098"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1099:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=-32769 port port=\"1234\" protocol=\"tcp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1099"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=-32769 port port="1234" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/firewall-cmd.at:1099"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1100:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=32768 port port=\"1234\" protocol=\"tcp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1100"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=32768 port port="1234" protocol="tcp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 139 $at_status "$at_srcdir/firewall-cmd.at:1100"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1101:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:1101"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1101"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1101:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:1101"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1101"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1105:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1105"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1105"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1106:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --query-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1106"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --query-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1106"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1114:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_post; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1114"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_post; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DROP all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1114"
$at_failed && at_fn_log_failure
$at_traceon; }


















    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1120:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --remove-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1120"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --remove-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1120"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1121:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --query-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1121"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --query-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1121"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1122:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --permanent --add-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1122"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --permanent --add-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1122"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1123:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --permanent --query-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1123"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --permanent --query-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1123"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1124:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --permanent --remove-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1124"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --permanent --remove-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1124"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1125:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --permanent --query-rich-rule='rule priority=127 drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1125"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --permanent --query-rich-rule='rule priority=127 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/firewall-cmd.at:1125"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1128:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1128"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1128"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1129:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=0 drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1129"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=0 drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1129"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1130:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule log prefix=\"foobar: \"' "
at_fn_check_prepare_trace "firewall-cmd.at:1130"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule log prefix="foobar: "'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1130"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1131:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:1131"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1131"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1131:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:1131"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1131"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1134:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule family=\"ipv4\" source address=\"10.10.0.0/16\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1134"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule family="ipv4" source address="10.10.0.0/16" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1134"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1135:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-10 source address=\"10.1.1.0/24\" masquerade' "
at_fn_check_prepare_trace "firewall-cmd.at:1135"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule family="ipv4" priority=-10 source address="10.1.1.0/24" masquerade'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1135"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1136:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-1  source address=\"10.1.0.0/16\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1136"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule family="ipv4" priority=-1  source address="10.1.0.0/16" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1136"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1138:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=0 forward-port port=\"222\"  protocol=\"tcp\" to-port=\"22\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1138"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule family="ipv4" priority=0 forward-port port="222"  protocol="tcp" to-port="22"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1138"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1139:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=0 forward-port port=\"2222\" protocol=\"tcp\" to-port=\"22\" to-addr=\"10.1.1.1\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1139"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule family="ipv4" priority=0 forward-port port="2222" protocol="tcp" to-port="22" to-addr="10.1.1.1"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1139"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1140:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-10 forward-port port=\"8888\" protocol=\"tcp\" to-port=\"80\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1140"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule family="ipv4" priority=-10 forward-port port="8888" protocol="tcp" to-port="80"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1140"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1141:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-10 forward-port port=\"8080\" protocol=\"tcp\" to-port=\"80\" to-addr=\"10.1.1.1\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1141"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule family="ipv4" priority=-10 forward-port port="8080" protocol="tcp" to-port="80" to-addr="10.1.1.1"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1141"
$at_failed && at_fn_log_failure
$at_traceon; }


































































    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1269:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1269"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DROP all -- 10.1.0.0/16 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1269"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1272:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1272"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1272"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1275:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L FWDI_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1275"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L FWDI_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1275"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1277:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L FWDI_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1277"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L FWDI_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1277"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1279:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L FWDO_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1279"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L FWDO_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all -- 10.1.1.0/24 0.0.0.0/0 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1279"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1282:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L FWDO_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1282"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L FWDO_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all -- 10.10.0.0/16 0.0.0.0/0 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1282"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1285:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t nat -L PRE_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1285"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t nat -L PRE_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DNAT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:8888 to::80
DNAT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:8080 to:10.1.1.1:80
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1285"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1289:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t nat -L PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1289"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t nat -L PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "DNAT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:222 to::22
DNAT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:2222 to:10.1.1.1:22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1289"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1293:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t nat -L POST_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1293"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t nat -L POST_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "MASQUERADE all -- 10.1.1.0/24 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1293"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1296:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t nat -L POST_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1296"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t nat -L POST_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "MASQUERADE all -- 10.10.0.0/16 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1296"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1299:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t mangle -L PRE_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1299"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t mangle -L PRE_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1299"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1301:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t mangle -L PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1301"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t mangle -L PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1301"
$at_failed && at_fn_log_failure
$at_traceon; }


















































































    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1324:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:1324"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1324"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1324:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:1324"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1324"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1327:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule icmp-block name=\"destination-unreachable\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1327"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule icmp-block name="destination-unreachable"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1327"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1328:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=-10 icmp-block name=\"destination-unreachable\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1328"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=-10 icmp-block name="destination-unreachable"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1328"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1330:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule icmp-type name=\"echo-request\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1330"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule icmp-type name="echo-request" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1330"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1331:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=-10 icmp-type name=\"echo-request\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1331"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=-10 icmp-type name="echo-request" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1331"
$at_failed && at_fn_log_failure
$at_traceon; }



























    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1386:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1386"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "REJECT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 3 reject-with icmp-host-prohibited
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 8
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1386"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1390:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1390"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "REJECT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 3 reject-with icmp-host-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1390"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1393:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1393"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 8
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1393"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1397:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L FWDI_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1397"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L FWDI_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "REJECT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 3 reject-with icmp-host-prohibited
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 8
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1397"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1401:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L FWDI_public_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1401"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L FWDI_public_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "REJECT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 3 reject-with icmp-host-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1401"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1404:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L FWDI_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1404"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L FWDI_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 8
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1404"
$at_failed && at_fn_log_failure
$at_traceon; }
































































    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1429:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:1429"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1429"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1429:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:1429"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1429"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1432:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=70   service name=\"smtps\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1432"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=70   service name="smtps" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1432"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1433:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=-111 service name=\"ntp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1433"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=-111 service name="ntp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1433"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1434:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=-10  port port=\"1111\" protocol=\"tcp\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1434"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=-10  port port="1111" protocol="tcp" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1434"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1435:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=-100 port port=\"1111\" protocol=\"tcp\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:1435"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=-100 port port="1111" protocol="tcp" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1435"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1436:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=\"-77\"    service name=\"smtp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1436"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority="-77"    service name="smtp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1436"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1437:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --remove-rich-rule='rule priority=-111 service name=\"ntp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1437"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --remove-rich-rule='rule priority=-111 service name="ntp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1437"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1438:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-32768 source address=\"10.0.0.0/8\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:1438"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule family="ipv4" priority=-32768 source address="10.0.0.0/8" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1438"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1439:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-2 source address=\"10.0.0.0/8\" log' "
at_fn_check_prepare_trace "firewall-cmd.at:1439"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule family="ipv4" priority=-2 source address="10.0.0.0/8" log'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1439"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1440:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-1 source address=\"10.0.0.0/8\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1440"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule family="ipv4" priority=-1 source address="10.0.0.0/8" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1440"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1441:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-5 source address=\"10.10.10.0/24\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1441"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule family="ipv4" priority=-5 source address="10.10.10.0/24" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1441"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1442:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule family=\"ipv4\" priority=-3 source address=\"10.100.100.0/24\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1442"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule family="ipv4" priority=-3 source address="10.100.100.0/24" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1442"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1443:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=127  drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1443"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=127  drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1443"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1444:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=125 service name=\"imap\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1444"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=125 service name="imap" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1444"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1445:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=126 log prefix=\"DROPPED: \"' "
at_fn_check_prepare_trace "firewall-cmd.at:1445"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=126 log prefix="DROPPED: "'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1445"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1446:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=10  service name=\"ssh\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1446"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=10  service name="ssh" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1446"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1447:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=1   service name=\"http\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1447"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=1   service name="http" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1447"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1448:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=100 service name=\"https\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1448"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=100 service name="https" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1448"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1449:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=5   service name=\"https\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1449"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=5   service name="https" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1449"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1450:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=66  service name=\"smtp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1450"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=66  service name="smtp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1450"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1451:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --remove-rich-rule='rule priority=66    service name=\"smtp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1451"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --remove-rich-rule='rule priority=66    service name="smtp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1451"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1452:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --remove-rich-rule='rule priority=70    service name=\"smtps\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1452"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --remove-rich-rule='rule priority=70    service name="smtps" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1452"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1453:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --remove-rich-rule='rule priority=5     service name=\"https\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1453"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --remove-rich-rule='rule priority=5     service name="https" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1453"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1454:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --remove-rich-rule='rule priority=\"-77\" service name=\"smtp\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1454"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --remove-rich-rule='rule priority="-77" service name="smtp" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1454"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1455:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --remove-rich-rule='rule family=\"ipv4\" priority=-3 source address=\"10.100.100.0/24\" drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1455"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --remove-rich-rule='rule family="ipv4" priority=-3 source address="10.100.100.0/24" drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1455"
$at_failed && at_fn_log_failure
$at_traceon; }
























    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1500:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_pre; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1500"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_pre; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "LOG all -- 10.0.0.0/8 0.0.0.0/0 LOG flags 0 level 4
LOG tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:1111 ctstate NEW,UNTRACKED LOG flags 0 level 4
DROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:1111 ctstate NEW,UNTRACKED
ACCEPT all -- 10.10.10.0/24 0.0.0.0/0
LOG all -- 10.0.0.0/8 0.0.0.0/0 LOG flags 0 level 4
DROP all -- 10.0.0.0/8 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1500"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1508:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1508"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1508"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1511:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1511"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1511"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1513:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_log; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1513"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_log; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1513"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1515:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_post; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1515"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_post; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:443 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:143 ctstate NEW,UNTRACKED
LOG all -- 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4 prefix \"'DROPPED: '\"
DROP all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1515"
$at_failed && at_fn_log_failure
$at_traceon; }






















































    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1543:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd -q --runtime-to-permanent "
at_fn_check_prepare_trace "firewall-cmd.at:1543"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd -q --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1543"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1544:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd -q --reload "
at_fn_check_prepare_trace "firewall-cmd.at:1544"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1544"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1544:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd -q --state "
at_fn_check_prepare_trace "firewall-cmd.at:1544"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1544"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1548:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=0 service name=\"http\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1548"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --add-rich-rule='rule priority=0 service name="http" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1548"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1549:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20613\" ip netns exec fwd-test-32448 firewall-cmd --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "firewall-cmd.at:1549"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20613" ip netns exec fwd-test-32448 firewall-cmd --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
target: default
icmp-block-inversion: no
interfaces:
sources:
services: dhcpv6-client ssh
ports:
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
rule priority=\"-32768\" family=\"ipv4\" source address=\"10.0.0.0/8\" log
rule priority=\"-100\" port port=\"1111\" protocol=\"tcp\" log
rule priority=\"-10\" port port=\"1111\" protocol=\"tcp\" drop
rule priority=\"-5\" family=\"ipv4\" source address=\"10.10.10.0/24\" accept
rule priority=\"-2\" family=\"ipv4\" source address=\"10.0.0.0/8\" log
rule priority=\"-1\" family=\"ipv4\" source address=\"10.0.0.0/8\" drop
rule service name=\"http\" accept
rule priority=\"1\" service name=\"http\" accept
rule priority=\"10\" service name=\"ssh\" accept
rule priority=\"100\" service name=\"https\" accept
rule priority=\"125\" service name=\"imap\" accept
rule priority=\"126\" log prefix=\"DROPPED: \"
rule priority=\"127\" drop
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1549"
$at_failed && at_fn_log_failure
$at_traceon; }











            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/INVALID_RULE: no element, no source, no destination/d'              -e '/INVALID_RULE: no element, no action/d'              -e '/ERROR: INVALID_PRIORITY: /d'" != x"ignore"; then
            if test -n "-e '/INVALID_RULE: no element, no source, no destination/d'              -e '/INVALID_RULE: no element, no action/d'              -e '/ERROR: INVALID_PRIORITY: /d'"; then
                sed -i -e '/INVALID_RULE: no element, no source, no destination/d'              -e '/INVALID_RULE: no element, no action/d'              -e '/ERROR: INVALID_PRIORITY: /d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:1578" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1578"
            $as_echo "firewall-cmd.at:1578" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1578"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_110
#AT_START_111
at_fn_group_banner 111 'firewall-cmd.at:1582' \
  "rich rules bad" "                                 " 7
at_xfail=no
(
  $as_echo "111. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1582: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1582"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1582"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1582: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1582"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1582"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1582: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1582"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1582"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1582: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1582"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1582"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-5618" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1582: ip netns add fwd-test-5618"
at_fn_check_prepare_trace "firewall-cmd.at:1582"
( $at_check_trace; ip netns add fwd-test-5618
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1582"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8884" ip netns exec fwd-test-5618 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-8884" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:1582" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1582"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8884" ip netns exec fwd-test-5618 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1582" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1582"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8884" ip netns exec fwd-test-5618 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1582" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1582"










    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1589:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8884\" ip netns exec fwd-test-5618 firewall-cmd --add-rich-rule='' "
at_fn_check_prepare_trace "firewall-cmd.at:1589"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8884" ip netns exec fwd-test-5618 firewall-cmd --add-rich-rule=''
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1589"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1589:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8884\" ip netns exec fwd-test-5618 firewall-cmd --permanent --add-rich-rule='' "
at_fn_check_prepare_trace "firewall-cmd.at:1589"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8884" ip netns exec fwd-test-5618 firewall-cmd --permanent --add-rich-rule=''
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1589"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1590:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8884\" ip netns exec fwd-test-5618 firewall-cmd --add-rich-rule='name=\"dns\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1590"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8884" ip netns exec fwd-test-5618 firewall-cmd --add-rich-rule='name="dns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1590"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1590:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8884\" ip netns exec fwd-test-5618 firewall-cmd --permanent --add-rich-rule='name=\"dns\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1590"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8884" ip netns exec fwd-test-5618 firewall-cmd --permanent --add-rich-rule='name="dns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1590"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1591:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8884\" ip netns exec fwd-test-5618 firewall-cmd --add-rich-rule='protocol value=\"ah\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:1591"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8884" ip netns exec fwd-test-5618 firewall-cmd --add-rich-rule='protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1591"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1591:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8884\" ip netns exec fwd-test-5618 firewall-cmd --permanent --add-rich-rule='protocol value=\"ah\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:1591"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8884" ip netns exec fwd-test-5618 firewall-cmd --permanent --add-rich-rule='protocol value="ah" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1591"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1592:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8884\" ip netns exec fwd-test-5618 firewall-cmd --add-rich-rule='rule protocol value=\"ah\" reject type=\"icmp-host-prohibited\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1592"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8884" ip netns exec fwd-test-5618 firewall-cmd --add-rich-rule='rule protocol value="ah" reject type="icmp-host-prohibited"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1592"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1592:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8884\" ip netns exec fwd-test-5618 firewall-cmd --permanent --add-rich-rule='rule protocol value=\"ah\" reject type=\"icmp-host-prohibited\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1592"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8884" ip netns exec fwd-test-5618 firewall-cmd --permanent --add-rich-rule='rule protocol value="ah" reject type="icmp-host-prohibited"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1592"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1593:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8884\" ip netns exec fwd-test-5618 firewall-cmd --add-rich-rule='rule family=\"ipv4\" protocol value=\"ah\" reject type=\"dummy\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1593"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8884" ip netns exec fwd-test-5618 firewall-cmd --add-rich-rule='rule family="ipv4" protocol value="ah" reject type="dummy"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1593"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1593:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8884\" ip netns exec fwd-test-5618 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" protocol value=\"ah\" reject type=\"dummy\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1593"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8884" ip netns exec fwd-test-5618 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" protocol value="ah" reject type="dummy"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1593"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1594:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8884\" ip netns exec fwd-test-5618 firewall-cmd --add-rich-rule='rule' "
at_fn_check_prepare_trace "firewall-cmd.at:1594"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8884" ip netns exec fwd-test-5618 firewall-cmd --add-rich-rule='rule'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1594"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1594:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8884\" ip netns exec fwd-test-5618 firewall-cmd --permanent --add-rich-rule='rule' "
at_fn_check_prepare_trace "firewall-cmd.at:1594"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8884" ip netns exec fwd-test-5618 firewall-cmd --permanent --add-rich-rule='rule'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1594"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1595:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8884\" ip netns exec fwd-test-5618 firewall-cmd --add-rich-rule='rule bad_element' "
at_fn_check_prepare_trace "firewall-cmd.at:1595"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8884" ip netns exec fwd-test-5618 firewall-cmd --add-rich-rule='rule bad_element'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1595"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1595:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8884\" ip netns exec fwd-test-5618 firewall-cmd --permanent --add-rich-rule='rule bad_element' "
at_fn_check_prepare_trace "firewall-cmd.at:1595"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8884" ip netns exec fwd-test-5618 firewall-cmd --permanent --add-rich-rule='rule bad_element'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1595"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1596:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8884\" ip netns exec fwd-test-5618 firewall-cmd --add-rich-rule='rule family=\"ipv5\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1596"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8884" ip netns exec fwd-test-5618 firewall-cmd --add-rich-rule='rule family="ipv5"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1596"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1596:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8884\" ip netns exec fwd-test-5618 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv5\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1596"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8884" ip netns exec fwd-test-5618 firewall-cmd --permanent --add-rich-rule='rule family="ipv5"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1596"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1597:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8884\" ip netns exec fwd-test-5618 firewall-cmd --add-rich-rule='rule name=\"dns\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1597"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8884" ip netns exec fwd-test-5618 firewall-cmd --add-rich-rule='rule name="dns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1597"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1597:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8884\" ip netns exec fwd-test-5618 firewall-cmd --permanent --add-rich-rule='rule name=\"dns\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1597"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8884" ip netns exec fwd-test-5618 firewall-cmd --permanent --add-rich-rule='rule name="dns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1597"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1598:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8884\" ip netns exec fwd-test-5618 firewall-cmd --add-rich-rule='rule protocol=\"ah\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1598"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8884" ip netns exec fwd-test-5618 firewall-cmd --add-rich-rule='rule protocol="ah" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1598"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1598:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8884\" ip netns exec fwd-test-5618 firewall-cmd --permanent --add-rich-rule='rule protocol=\"ah\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1598"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8884" ip netns exec fwd-test-5618 firewall-cmd --permanent --add-rich-rule='rule protocol="ah" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1598"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1599:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8884\" ip netns exec fwd-test-5618 firewall-cmd --add-rich-rule='rule protocol value=\"ah\" accept drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1599"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8884" ip netns exec fwd-test-5618 firewall-cmd --add-rich-rule='rule protocol value="ah" accept drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1599"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1599:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8884\" ip netns exec fwd-test-5618 firewall-cmd --permanent --add-rich-rule='rule protocol value=\"ah\" accept drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1599"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8884" ip netns exec fwd-test-5618 firewall-cmd --permanent --add-rich-rule='rule protocol value="ah" accept drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1599"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1600:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8884\" ip netns exec fwd-test-5618 firewall-cmd --add-rich-rule='rule service name=\"radius\" port port=\"4011\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:1600"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8884" ip netns exec fwd-test-5618 firewall-cmd --add-rich-rule='rule service name="radius" port port="4011" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1600"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1600:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8884\" ip netns exec fwd-test-5618 firewall-cmd --permanent --add-rich-rule='rule service name=\"radius\" port port=\"4011\" reject' "
at_fn_check_prepare_trace "firewall-cmd.at:1600"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8884" ip netns exec fwd-test-5618 firewall-cmd --permanent --add-rich-rule='rule service name="radius" port port="4011" reject'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1600"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1601:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8884\" ip netns exec fwd-test-5618 firewall-cmd --add-rich-rule='rule service bad_attribute=\"dns\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1601"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8884" ip netns exec fwd-test-5618 firewall-cmd --add-rich-rule='rule service bad_attribute="dns"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1601"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1601:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8884\" ip netns exec fwd-test-5618 firewall-cmd --permanent --add-rich-rule='rule service bad_attribute=\"dns\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1601"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8884" ip netns exec fwd-test-5618 firewall-cmd --permanent --add-rich-rule='rule service bad_attribute="dns"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1601"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1602:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8884\" ip netns exec fwd-test-5618 firewall-cmd --add-rich-rule='rule protocol value=\"igmp\" log level=\"eror\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1602"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8884" ip netns exec fwd-test-5618 firewall-cmd --add-rich-rule='rule protocol value="igmp" log level="eror"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 125 $at_status "$at_srcdir/firewall-cmd.at:1602"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1602:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8884\" ip netns exec fwd-test-5618 firewall-cmd --permanent --add-rich-rule='rule protocol value=\"igmp\" log level=\"eror\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1602"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8884" ip netns exec fwd-test-5618 firewall-cmd --permanent --add-rich-rule='rule protocol value="igmp" log level="eror"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 125 $at_status "$at_srcdir/firewall-cmd.at:1602"
$at_failed && at_fn_log_failure
$at_traceon; }














    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1608:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8884\" ip netns exec fwd-test-5618 firewall-cmd --add-rich-rule='rule protocol value=\"esp\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1608"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8884" ip netns exec fwd-test-5618 firewall-cmd --add-rich-rule='rule protocol value="esp"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1608"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1608:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8884\" ip netns exec fwd-test-5618 firewall-cmd --permanent --add-rich-rule='rule protocol value=\"esp\"' "
at_fn_check_prepare_trace "firewall-cmd.at:1608"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8884" ip netns exec fwd-test-5618 firewall-cmd --permanent --add-rich-rule='rule protocol value="esp"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1608"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1609:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8884\" ip netns exec fwd-test-5618 firewall-cmd --add-rich-rule='rule family=\"ipv4\" masquerade drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1609"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8884" ip netns exec fwd-test-5618 firewall-cmd --add-rich-rule='rule family="ipv4" masquerade drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1609"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1609:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8884\" ip netns exec fwd-test-5618 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" masquerade drop' "
at_fn_check_prepare_trace "firewall-cmd.at:1609"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8884" ip netns exec fwd-test-5618 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" masquerade drop'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1609"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1610:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8884\" ip netns exec fwd-test-5618 firewall-cmd --add-rich-rule='rule family=\"ipv4\" icmp-block name=\"redirect\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1610"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8884" ip netns exec fwd-test-5618 firewall-cmd --add-rich-rule='rule family="ipv4" icmp-block name="redirect" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1610"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1610:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8884\" ip netns exec fwd-test-5618 firewall-cmd --permanent --add-rich-rule='rule family=\"ipv4\" icmp-block name=\"redirect\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1610"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8884" ip netns exec fwd-test-5618 firewall-cmd --permanent --add-rich-rule='rule family="ipv4" icmp-block name="redirect" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1610"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1611:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8884\" ip netns exec fwd-test-5618 firewall-cmd --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" protocol=\"tcp\" family=\"ipv4\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1611"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8884" ip netns exec fwd-test-5618 firewall-cmd --add-rich-rule='rule forward-port port="2222" to-port="22" protocol="tcp" family="ipv4" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1611"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1611:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8884\" ip netns exec fwd-test-5618 firewall-cmd --permanent --add-rich-rule='rule forward-port port=\"2222\" to-port=\"22\" protocol=\"tcp\" family=\"ipv4\" accept' "
at_fn_check_prepare_trace "firewall-cmd.at:1611"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8884" ip netns exec fwd-test-5618 firewall-cmd --permanent --add-rich-rule='rule forward-port port="2222" to-port="22" protocol="tcp" family="ipv4" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/firewall-cmd.at:1611"
$at_failed && at_fn_log_failure
$at_traceon; }











            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/ERROR: INVALID_RULE:/d'               -e '/ERROR: INVALID_LOG_LEVEL: eror/d'               -e '/ERROR: MISSING_FAMILY/d'               -e '/ERROR: INVALID_LIMIT: 1\/2m/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_RULE:/d'               -e '/ERROR: INVALID_LOG_LEVEL: eror/d'               -e '/ERROR: MISSING_FAMILY/d'               -e '/ERROR: INVALID_LIMIT: 1\/2m/d'"; then
                sed -i -e '/ERROR: INVALID_RULE:/d'               -e '/ERROR: INVALID_LOG_LEVEL: eror/d'               -e '/ERROR: MISSING_FAMILY/d'               -e '/ERROR: INVALID_LIMIT: 1\/2m/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:1613" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1613"
            $as_echo "firewall-cmd.at:1613" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1613"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_111
#AT_START_112
at_fn_group_banner 112 'firewall-cmd.at:1618' \
  "config validation" "                              " 7
at_xfail=no
(
  $as_echo "112. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1618: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "firewall-cmd.at:1618"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1618"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1618: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "firewall-cmd.at:1618"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1618"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1618: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1618"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1618"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1618: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1618"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1618"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-28209" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1618: ip netns add fwd-test-28209"
at_fn_check_prepare_trace "firewall-cmd.at:1618"
( $at_check_trace; ip netns add fwd-test-28209
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1618"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3248" ip netns exec fwd-test-28209 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-3248" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "firewall-cmd.at:1618" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1618"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3248" ip netns exec fwd-test-28209 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "firewall-cmd.at:1618" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1618"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3248" ip netns exec fwd-test-28209 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "firewall-cmd.at:1618" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1618"








    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1622:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3248\" ip netns exec fwd-test-28209 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1622"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3248" ip netns exec fwd-test-28209 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1622"
$at_failed && at_fn_log_failure
$at_traceon; }






        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1627: cp ./firewalld.conf ./firewalld.conf.orig"
at_fn_check_prepare_trace "firewall-cmd.at:1627"
( $at_check_trace; cp ./firewalld.conf ./firewalld.conf.orig
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1627"
$at_failed && at_fn_log_failure
$at_traceon; }

    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1628: echo \"SomeBogusField=yes\" >> ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1628"
( $at_check_trace; echo "SomeBogusField=yes" >> ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1628"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1629:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3248\" ip netns exec fwd-test-28209 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1629"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3248" ip netns exec fwd-test-28209 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1629"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1634: cp ./firewalld.conf.orig ./firewalld.conf"
at_fn_check_prepare_trace "firewall-cmd.at:1634"
( $at_check_trace; cp ./firewalld.conf.orig ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1634"
$at_failed && at_fn_log_failure
$at_traceon; }


        cat >./direct.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<direct>
<chain table="filter" ipv="ipv7" chain="foobar"/>
</direct>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1643:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3248\" ip netns exec fwd-test-28209 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1643"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3248" ip netns exec fwd-test-28209 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1643"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./direct.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<direct>
<rule />
</direct>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1651:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3248\" ip netns exec fwd-test-28209 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1651"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3248" ip netns exec fwd-test-28209 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1651"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1652: rm ./direct.xml"
at_fn_check_prepare_trace "firewall-cmd.at:1652"
( $at_check_trace; rm ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1652"
$at_failed && at_fn_log_failure
$at_traceon; }


        cat >./lockdown-whitelist.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<whitelist>
    <user uid="666"/>
</whitelist>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1661:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3248\" ip netns exec fwd-test-28209 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1661"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3248" ip netns exec fwd-test-28209 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1661"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./lockdown-whitelist.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<whitelist>
    <uid id="666"/>
</whitelist>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1669:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3248\" ip netns exec fwd-test-28209 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1669"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3248" ip netns exec fwd-test-28209 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1669"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./lockdown-whitelist.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<whitelist>
    <group name="foobar" />
</whitelist>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1677:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3248\" ip netns exec fwd-test-28209 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1677"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3248" ip netns exec fwd-test-28209 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1677"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1678: rm ./lockdown-whitelist.xml"
at_fn_check_prepare_trace "firewall-cmd.at:1678"
( $at_check_trace; rm ./lockdown-whitelist.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1678"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1681: mkdir -p ./ipsets"
at_fn_check_prepare_trace "firewall-cmd.at:1681"
( $at_check_trace; mkdir -p ./ipsets
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1681"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./ipsets/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<ipset type="hash:mac">
  <entry>12:34:56:78:90</entry>
</ipset>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1688:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3248\" ip netns exec fwd-test-28209 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1688"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3248" ip netns exec fwd-test-28209 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1688"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./ipsets/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<ipset type="hash:mac">
  <entry bogus_attr="bogus">12:34:56:78:90:ab</entry>
</ipset>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1700:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3248\" ip netns exec fwd-test-28209 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1700"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3248" ip netns exec fwd-test-28209 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1700"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./ipsets/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<ipset type="hash:ip,bogus">
</ipset>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1707:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3248\" ip netns exec fwd-test-28209 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1707"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3248" ip netns exec fwd-test-28209 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 119 $at_status "$at_srcdir/firewall-cmd.at:1707"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1708: rm ./ipsets/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:1708"
( $at_check_trace; rm ./ipsets/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1708"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1711: mkdir -p ./helpers"
at_fn_check_prepare_trace "firewall-cmd.at:1711"
( $at_check_trace; mkdir -p ./helpers
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1711"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./helpers/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<helper>
</helper>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1717:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3248\" ip netns exec fwd-test-28209 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1717"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3248" ip netns exec fwd-test-28209 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1717"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./helpers/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<helper family="ipv7" module="nf_conntrack_ftp">
</helper>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1724:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3248\" ip netns exec fwd-test-28209 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1724"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3248" ip netns exec fwd-test-28209 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 111 $at_status "$at_srcdir/firewall-cmd.at:1724"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1735: rm ./helpers/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:1735"
( $at_check_trace; rm ./helpers/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1735"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1738: mkdir -p ./icmptypes"
at_fn_check_prepare_trace "firewall-cmd.at:1738"
( $at_check_trace; mkdir -p ./icmptypes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1738"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./icmptypes/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<bad_element />
<icmptype>
</icmptype>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1745:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3248\" ip netns exec fwd-test-28209 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1745"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3248" ip netns exec fwd-test-28209 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1745"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./icmptypes/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<icmptype>
<destination unexpected_attr="foobar" />
</icmptype>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1753:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3248\" ip netns exec fwd-test-28209 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1753"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3248" ip netns exec fwd-test-28209 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1753"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1754: rm ./icmptypes/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:1754"
( $at_check_trace; rm ./icmptypes/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1754"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1757: mkdir -p ./services"
at_fn_check_prepare_trace "firewall-cmd.at:1757"
( $at_check_trace; mkdir -p ./services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1757"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<protocol value="aoeui" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1764:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3248\" ip netns exec fwd-test-28209 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1764"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3248" ip netns exec fwd-test-28209 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:1764"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<protocol bad_attr="foo" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1772:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3248\" ip netns exec fwd-test-28209 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1772"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3248" ip netns exec fwd-test-28209 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1772"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<bad_element />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1780:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3248\" ip netns exec fwd-test-28209 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1780"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3248" ip netns exec fwd-test-28209 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1780"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<module module="bad_attr" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1788:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3248\" ip netns exec fwd-test-28209 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1788"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3248" ip netns exec fwd-test-28209 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1788"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<port protocol="aoeu" port="666" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1796:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3248\" ip netns exec fwd-test-28209 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1796"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3248" ip netns exec fwd-test-28209 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:1796"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<port protocol="tcp" port="ssssssh" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1804:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3248\" ip netns exec fwd-test-28209 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1804"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3248" ip netns exec fwd-test-28209 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:1804"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<port protocol="tcp" port="22" />
<source-port protocol="tcp" port="sssssh" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1813:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3248\" ip netns exec fwd-test-28209 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1813"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3248" ip netns exec fwd-test-28209 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 102 $at_status "$at_srcdir/firewall-cmd.at:1813"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./services/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<service>
<destination ipv4="224.0.0.1" ipv7="1234" />
</service>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1821:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3248\" ip netns exec fwd-test-28209 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1821"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3248" ip netns exec fwd-test-28209 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1821"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1822: rm ./services/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:1822"
( $at_check_trace; rm ./services/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1822"
$at_failed && at_fn_log_failure
$at_traceon; }


        { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1825: mkdir -p ./zones"
at_fn_check_prepare_trace "firewall-cmd.at:1825"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1825"
$at_failed && at_fn_log_failure
$at_traceon; }

    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1829:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3248\" ip netns exec fwd-test-28209 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1829"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3248" ip netns exec fwd-test-28209 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 112 $at_status "$at_srcdir/firewall-cmd.at:1829"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<service name="bogus_service_name" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1837:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3248\" ip netns exec fwd-test-28209 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1837"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3248" ip netns exec fwd-test-28209 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/firewall-cmd.at:1837"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<port protocol="ipv4" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1845:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3248\" ip netns exec fwd-test-28209 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1845"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3248" ip netns exec fwd-test-28209 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1845"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<protocol value="thisdoesnotexist" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1853:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3248\" ip netns exec fwd-test-28209 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1853"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3248" ip netns exec fwd-test-28209 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 103 $at_status "$at_srcdir/firewall-cmd.at:1853"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<icmp-block invalid_attr=""/>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1861:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3248\" ip netns exec fwd-test-28209 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1861"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3248" ip netns exec fwd-test-28209 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1861"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<icmp-type />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1869:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3248\" ip netns exec fwd-test-28209 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1869"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3248" ip netns exec fwd-test-28209 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1869"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<masquerade value="true" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1877:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3248\" ip netns exec fwd-test-28209 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1877"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3248" ip netns exec fwd-test-28209 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1877"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<forward-port port="666" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1885:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3248\" ip netns exec fwd-test-28209 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1885"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3248" ip netns exec fwd-test-28209 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1885"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<forward-port protocol="sctppp" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1893:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3248\" ip netns exec fwd-test-28209 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1893"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3248" ip netns exec fwd-test-28209 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1893"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<source-port port="-1" />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1901:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3248\" ip netns exec fwd-test-28209 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1901"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3248" ip netns exec fwd-test-28209 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1901"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<interface />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1909:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3248\" ip netns exec fwd-test-28209 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1909"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3248" ip netns exec fwd-test-28209 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1909"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<source />
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1917:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3248\" ip netns exec fwd-test-28209 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1917"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3248" ip netns exec fwd-test-28209 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1917"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule>
<source address="10.0.0.1/24" />
<limit />
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1932:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3248\" ip netns exec fwd-test-28209 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1932"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3248" ip netns exec fwd-test-28209 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1932"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule family="ipv4">
<source address="10.0.0.1/24" />
<accept>
<limit value="none" />
</accept>
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1945:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3248\" ip netns exec fwd-test-28209 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1945"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3248" ip netns exec fwd-test-28209 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1945"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule>
<source address="10.0.0.1/24" />
<log level="super_critical" />
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1960:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3248\" ip netns exec fwd-test-28209 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1960"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3248" ip netns exec fwd-test-28209 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1960"
$at_failed && at_fn_log_failure
$at_traceon; }





    cat >./zones/foobar.xml <<'_ATEOF'
<?xml version="1.0" encoding="utf-8"?>
<zone>
<rule family="ipv4">
<source address="10.0.0.1/24" />
<audit prefix="foobar" />
</rule>
</zone>
_ATEOF




    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1975:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3248\" ip netns exec fwd-test-28209 firewall-cmd --check-config "
at_fn_check_prepare_trace "firewall-cmd.at:1975"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3248" ip netns exec fwd-test-28209 firewall-cmd --check-config
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 28 $at_status "$at_srcdir/firewall-cmd.at:1975"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/firewall-cmd.at:1993: rm ./zones/foobar.xml"
at_fn_check_prepare_trace "firewall-cmd.at:1993"
( $at_check_trace; rm ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/firewall-cmd.at:1993"
$at_failed && at_fn_log_failure
$at_traceon; }








            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/ERROR:/d'              -e '/WARNING:/d'" != x"ignore"; then
            if test -n "-e '/ERROR:/d'              -e '/WARNING:/d'"; then
                sed -i -e '/ERROR:/d'              -e '/WARNING:/d' ./firewalld.log
            fi
            $as_echo "firewall-cmd.at:1995" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1995"
            $as_echo "firewall-cmd.at:1995" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/firewall-cmd.at:1995"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_112
#AT_START_113
at_fn_group_banner 113 'rhbz1514043.at:1' \
  "--set-log-denied does not zero config" "          " 8
at_xfail=no
(
  $as_echo "113. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1514043.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1514043.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1514043.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1514043.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-21188" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rhbz1514043.at:1: ip netns add fwd-test-21188"
at_fn_check_prepare_trace "rhbz1514043.at:1"
( $at_check_trace; ip netns add fwd-test-21188
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17264" ip netns exec fwd-test-21188 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-17264" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rhbz1514043.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1514043.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17264" ip netns exec fwd-test-21188 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1514043.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1514043.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17264" ip netns exec fwd-test-21188 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1514043.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1514043.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17264\" ip netns exec fwd-test-21188 firewall-cmd -q --set-log-denied=all "
at_fn_check_prepare_trace "rhbz1514043.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17264" ip netns exec fwd-test-21188 firewall-cmd -q --set-log-denied=all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17264\" ip netns exec fwd-test-21188 firewall-cmd -q --permanent --zone=public --add-service=samba "
at_fn_check_prepare_trace "rhbz1514043.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17264" ip netns exec fwd-test-21188 firewall-cmd -q --permanent --zone=public --add-service=samba
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17264\" ip netns exec fwd-test-21188 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1514043.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17264" ip netns exec fwd-test-21188 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17264\" ip netns exec fwd-test-21188 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1514043.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17264" ip netns exec fwd-test-21188 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17264\" ip netns exec fwd-test-21188 firewall-cmd --zone=public --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^services "
at_fn_check_prepare_notrace 'a shell pipeline' "rhbz1514043.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17264" ip netns exec fwd-test-21188 firewall-cmd --zone=public --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "services: dhcpv6-client samba ssh
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:43:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17264\" ip netns exec fwd-test-21188     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L INPUT; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1514043.at:43"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17264" ip netns exec fwd-test-21188     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L INPUT; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED,DNAT
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
INPUT_direct all -- 0.0.0.0/0 0.0.0.0/0
INPUT_ZONES all -- 0.0.0.0/0 0.0.0.0/0
LOG all -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID LOG flags 0 level 4 prefix \"STATE_INVALID_DROP: \"
DROP all -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID
LOG all -- 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4 prefix \"FINAL_REJECT: \"
REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:43"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rhbz1514043.at:53:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-17264\" ip netns exec fwd-test-21188     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L FORWARD; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1514043.at:53"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-17264" ip netns exec fwd-test-21188     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L FORWARD; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED,DNAT
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
FORWARD_direct all -- 0.0.0.0/0 0.0.0.0/0
FORWARD_IN_ZONES all -- 0.0.0.0/0 0.0.0.0/0
FORWARD_OUT_ZONES all -- 0.0.0.0/0 0.0.0.0/0
LOG all -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID LOG flags 0 level 4 prefix \"STATE_INVALID_DROP: \"
DROP all -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID
LOG all -- 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4 prefix \"FINAL_REJECT: \"
REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1514043.at:53"
$at_failed && at_fn_log_failure
$at_traceon; }































            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "rhbz1514043.at:87" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1514043.at:87"
            $as_echo "rhbz1514043.at:87" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1514043.at:87"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_113
#AT_START_114
at_fn_group_banner 114 'rhbz1498923.at:1' \
  "invalid direct rule causes reload error" "        " 8
at_xfail=no
(
  $as_echo "114. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1498923.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1498923.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1498923.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1498923.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-24353" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rhbz1498923.at:1: ip netns add fwd-test-24353"
at_fn_check_prepare_trace "rhbz1498923.at:1"
( $at_check_trace; ip netns add fwd-test-24353
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22121" ip netns exec fwd-test-24353 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-22121" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rhbz1498923.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1498923.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22121" ip netns exec fwd-test-24353 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1498923.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1498923.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22121" ip netns exec fwd-test-24353 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1498923.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1498923.at:1"





{ set +x
$as_echo "$at_srcdir/rhbz1498923.at:5: sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1498923.at:5"
( $at_check_trace; sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22121\" ip netns exec fwd-test-24353 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1498923.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22121" ip netns exec fwd-test-24353 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22121\" ip netns exec fwd-test-24353 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1498923.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22121" ip netns exec fwd-test-24353 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22121\" ip netns exec fwd-test-24353 firewall-cmd -q --zone=public --add-interface=foobar0 "
at_fn_check_prepare_trace "rhbz1498923.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22121" ip netns exec fwd-test-24353 firewall-cmd -q --zone=public --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22121\" ip netns exec fwd-test-24353 firewall-cmd --get-zone-of-interface=foobar0 "
at_fn_check_prepare_trace "rhbz1498923.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22121" ip netns exec fwd-test-24353 firewall-cmd --get-zone-of-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22121\" ip netns exec fwd-test-24353 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1498923.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22121" ip netns exec fwd-test-24353 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22121\" ip netns exec fwd-test-24353 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1498923.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22121" ip netns exec fwd-test-24353 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22121\" ip netns exec fwd-test-24353 firewall-cmd --get-zone-of-interface=foobar0 "
at_fn_check_prepare_trace "rhbz1498923.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22121" ip netns exec fwd-test-24353 firewall-cmd --get-zone-of-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "no zone
" | \
  $at_diff - "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 2 $at_status "$at_srcdir/rhbz1498923.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }





{ set +x
$as_echo "$at_srcdir/rhbz1498923.at:17: sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1498923.at:17"
( $at_check_trace; sed -i 's/^FlushAllOnReload.*/FlushAllOnReload=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22121\" ip netns exec fwd-test-24353 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1498923.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22121" ip netns exec fwd-test-24353 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22121\" ip netns exec fwd-test-24353 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1498923.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22121" ip netns exec fwd-test-24353 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22121\" ip netns exec fwd-test-24353 firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 0 -p tcp --dport 8080 -j ACCEPT "
at_fn_check_prepare_trace "rhbz1498923.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22121" ip netns exec fwd-test-24353 firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 0 -p tcp --dport 8080 -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22121\" ip netns exec fwd-test-24353 firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 1 --a-bogus-flag "
at_fn_check_prepare_trace "rhbz1498923.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22121" ip netns exec fwd-test-24353 firewall-cmd -q --permanent --direct --add-rule ipv4 filter INPUT 1 --a-bogus-flag
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22121\" ip netns exec fwd-test-24353 firewall-cmd -q --zone=public --add-interface=foobar0 "
at_fn_check_prepare_trace "rhbz1498923.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22121" ip netns exec fwd-test-24353 firewall-cmd -q --zone=public --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22121\" ip netns exec fwd-test-24353 firewall-cmd -q --direct --direct --add-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT "
at_fn_check_prepare_trace "rhbz1498923.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22121" ip netns exec fwd-test-24353 firewall-cmd -q --direct --direct --add-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22121\" ip netns exec fwd-test-24353 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1498923.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22121" ip netns exec fwd-test-24353 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1498923.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22121\" ip netns exec fwd-test-24353 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1498923.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22121" ip netns exec fwd-test-24353 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 251 $at_status "$at_srcdir/rhbz1498923.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22121\" ip netns exec fwd-test-24353 firewall-cmd --state "
at_fn_check_prepare_trace "rhbz1498923.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22121" ip netns exec fwd-test-24353 firewall-cmd --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo >>"$at_stderr"; $as_echo "failed
" | \
  $at_diff - "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 251 $at_status "$at_srcdir/rhbz1498923.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22121\" ip netns exec fwd-test-24353 firewall-cmd --get-zone-of-interface=foobar0 "
at_fn_check_prepare_trace "rhbz1498923.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22121" ip netns exec fwd-test-24353 firewall-cmd --get-zone-of-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22121\" ip netns exec fwd-test-24353 firewall-cmd -q --direct --direct --query-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT "
at_fn_check_prepare_trace "rhbz1498923.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22121" ip netns exec fwd-test-24353 firewall-cmd -q --direct --direct --query-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22121\" ip netns exec fwd-test-24353 firewall-cmd -q --permanent --direct --remove-rule ipv4 filter INPUT 1 --a-bogus-flag "
at_fn_check_prepare_trace "rhbz1498923.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22121" ip netns exec fwd-test-24353 firewall-cmd -q --permanent --direct --remove-rule ipv4 filter INPUT 1 --a-bogus-flag
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22121\" ip netns exec fwd-test-24353 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1498923.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22121" ip netns exec fwd-test-24353 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:39:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22121\" ip netns exec fwd-test-24353 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1498923.at:39"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22121" ip netns exec fwd-test-24353 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:39"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22121\" ip netns exec fwd-test-24353 firewall-cmd --get-zone-of-interface=foobar0 "
at_fn_check_prepare_trace "rhbz1498923.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22121" ip netns exec fwd-test-24353 firewall-cmd --get-zone-of-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "public
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1498923.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22121\" ip netns exec fwd-test-24353 firewall-cmd -q --direct --direct --query-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT "
at_fn_check_prepare_trace "rhbz1498923.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22121" ip netns exec fwd-test-24353 firewall-cmd -q --direct --direct --query-rule ipv4 filter FORWARD 0 -p tcp -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1498923.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }










            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/.*a-bogus-flag.*/d'" != x"ignore"; then
            if test -n "-e '/.*a-bogus-flag.*/d'"; then
                sed -i -e '/.*a-bogus-flag.*/d' ./firewalld.log
            fi
            $as_echo "rhbz1498923.at:46" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1498923.at:46"
            $as_echo "rhbz1498923.at:46" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1498923.at:46"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_114
#AT_START_115
at_fn_group_banner 115 'pr181.at:1' \
  "combined zones name length check" "               " 8
at_xfail=no
(
  $as_echo "115. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/pr181.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr181.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/pr181.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "pr181.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/pr181.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "pr181.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/pr181.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "pr181.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-25597" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/pr181.at:1: ip netns add fwd-test-25597"
at_fn_check_prepare_trace "pr181.at:1"
( $at_check_trace; ip netns add fwd-test-25597
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20203" ip netns exec fwd-test-25597 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-20203" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "pr181.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/pr181.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20203" ip netns exec fwd-test-25597 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "pr181.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/pr181.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20203" ip netns exec fwd-test-25597 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "pr181.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/pr181.at:1"





{ set +x
$as_echo "$at_srcdir/pr181.at:4: mkdir -p ./zones/foobar"
at_fn_check_prepare_trace "pr181.at:4"
( $at_check_trace; mkdir -p ./zones/foobar
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/pr181.at:6: echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:6"
( $at_check_trace; echo '<?xml version="1.0" encoding="utf-8"?>' > ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:7: echo '<zone>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:7"
( $at_check_trace; echo '<zone>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:8: echo '<short>foobar</short>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:8"
( $at_check_trace; echo '<short>foobar</short>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:9: echo '<description>foobar desc</description>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:9"
( $at_check_trace; echo '<description>foobar desc</description>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:10: echo '<service name=\"ssh\"/>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:10"
( $at_check_trace; echo '<service name="ssh"/>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:11: echo '</zone>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:11"
( $at_check_trace; echo '</zone>' >> ./zones/foobar/a_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/pr181.at:13: echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:13"
( $at_check_trace; echo '<?xml version="1.0" encoding="utf-8"?>' > ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:14: echo '<zone>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:14"
( $at_check_trace; echo '<zone>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:15: echo '<short>foobar</short>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:15"
( $at_check_trace; echo '<short>foobar</short>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:16: echo '<description>foobar desc</description>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:16"
( $at_check_trace; echo '<description>foobar desc</description>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:17: echo '<service name=\"http\"/>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:17"
( $at_check_trace; echo '<service name="http"/>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/pr181.at:18: echo '</zone>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml"
at_fn_check_prepare_trace "pr181.at:18"
( $at_check_trace; echo '</zone>' >> ./zones/foobar/another_really_long_name_that_trigger_the_bug.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/pr181.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20203\" ip netns exec fwd-test-25597 firewall-cmd -q --reload "
at_fn_check_prepare_trace "pr181.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20203" ip netns exec fwd-test-25597 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/pr181.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20203\" ip netns exec fwd-test-25597 firewall-cmd -q --state "
at_fn_check_prepare_trace "pr181.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20203" ip netns exec fwd-test-25597 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/pr181.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-20203\" ip netns exec fwd-test-25597 firewall-cmd --zone=foobar --list-all | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | grep ^services "
at_fn_check_prepare_notrace 'a shell pipeline' "pr181.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-20203" ip netns exec fwd-test-25597 firewall-cmd --zone=foobar --list-all | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | grep ^services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "services: http ssh
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr181.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }










            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "pr181.at:24" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/pr181.at:24"
            $as_echo "pr181.at:24" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/pr181.at:24"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_115
#AT_START_116
at_fn_group_banner 116 'gh287.at:1' \
  "ICMP block inversion" "                           " 8
at_xfail=no
(
  $as_echo "116. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh287.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh287.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh287.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh287.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/gh287.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh287.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/gh287.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh287.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-3287" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/gh287.at:1: ip netns add fwd-test-3287"
at_fn_check_prepare_trace "gh287.at:1"
( $at_check_trace; ip netns add fwd-test-3287
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27210" ip netns exec fwd-test-3287 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-27210" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "gh287.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh287.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27210" ip netns exec fwd-test-3287 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh287.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh287.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27210" ip netns exec fwd-test-3287 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh287.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh287.at:1"





{ set +x
$as_echo "$at_srcdir/gh287.at:4: mkdir -p ./zones"
at_fn_check_prepare_trace "gh287.at:4"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:5: echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:5"
( $at_check_trace; echo '<?xml version="1.0" encoding="utf-8"?>' > ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:6: echo '<zone>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:6"
( $at_check_trace; echo '<zone>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:7: echo '<short>foobar</short>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:7"
( $at_check_trace; echo '<short>foobar</short>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:8: echo '<description>foobar desc</description>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:8"
( $at_check_trace; echo '<description>foobar desc</description>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:9: echo '<service name=\"http\"/>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:9"
( $at_check_trace; echo '<service name="http"/>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:10: echo '<source address=\"172.16.0.0/12\" />' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:10"
( $at_check_trace; echo '<source address="172.16.0.0/12" />' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:11: echo '<icmp-block-inversion />' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:11"
( $at_check_trace; echo '<icmp-block-inversion />' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh287.at:12: echo '</zone>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh287.at:12"
( $at_check_trace; echo '</zone>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh287.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27210\" ip netns exec fwd-test-3287 firewall-cmd -q --reload "
at_fn_check_prepare_trace "gh287.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27210" ip netns exec fwd-test-3287 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh287.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27210\" ip netns exec fwd-test-3287 firewall-cmd -q --state "
at_fn_check_prepare_trace "gh287.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27210" ip netns exec fwd-test-3287 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh287.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }











            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "gh287.at:15" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh287.at:15"
            $as_echo "gh287.at:15" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh287.at:15"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_116
#AT_START_117
at_fn_group_banner 117 'individual_calls.at:1' \
  "individual calls" "                               " 8
at_xfail=no
(
  $as_echo "117. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/individual_calls.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "individual_calls.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/individual_calls.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "individual_calls.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/individual_calls.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "individual_calls.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/individual_calls.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "individual_calls.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-22865" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/individual_calls.at:1: ip netns add fwd-test-22865"
at_fn_check_prepare_trace "individual_calls.at:1"
( $at_check_trace; ip netns add fwd-test-22865
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-597" ip netns exec fwd-test-22865 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-597" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "individual_calls.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/individual_calls.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-597" ip netns exec fwd-test-22865 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "individual_calls.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/individual_calls.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-597" ip netns exec fwd-test-22865 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "individual_calls.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/individual_calls.at:1"





{ set +x
$as_echo "$at_srcdir/individual_calls.at:4: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "individual_calls.at:4"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/individual_calls.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-597\" ip netns exec fwd-test-22865 firewall-cmd -q --reload "
at_fn_check_prepare_trace "individual_calls.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-597" ip netns exec fwd-test-22865 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/individual_calls.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-597\" ip netns exec fwd-test-22865 firewall-cmd -q --state "
at_fn_check_prepare_trace "individual_calls.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-597" ip netns exec fwd-test-22865 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/individual_calls.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }












            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "individual_calls.at:7" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/individual_calls.at:7"
            $as_echo "individual_calls.at:7" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/individual_calls.at:7"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_117
#AT_START_118
at_fn_group_banner 118 'rhbz1534571.at:3' \
  "rule deduplication" "                             " 8
at_xfail=no
(
  $as_echo "118. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1534571.at:3"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1534571.at:3"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1534571.at:3"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1534571.at:3"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-4391" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rhbz1534571.at:3: ip netns add fwd-test-4391"
at_fn_check_prepare_trace "rhbz1534571.at:3"
( $at_check_trace; ip netns add fwd-test-4391
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8927" ip netns exec fwd-test-4391 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-8927" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rhbz1534571.at:3" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1534571.at:3"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8927" ip netns exec fwd-test-4391 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1534571.at:3" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1534571.at:3"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8927" ip netns exec fwd-test-4391 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1534571.at:3" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1534571.at:3"








    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8927\" ip netns exec fwd-test-4391 firewall-cmd -q --add-service nfs --add-service nfs3 "
at_fn_check_prepare_trace "rhbz1534571.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8927" ip netns exec fwd-test-4391 firewall-cmd -q --add-service nfs --add-service nfs3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8927\" ip netns exec fwd-test-4391 firewall-cmd -q --remove-service nfs3 "
at_fn_check_prepare_trace "rhbz1534571.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8927" ip netns exec fwd-test-4391 firewall-cmd -q --remove-service nfs3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8927\" ip netns exec fwd-test-4391 firewall-cmd -q --remove-service nfs "
at_fn_check_prepare_trace "rhbz1534571.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8927" ip netns exec fwd-test-4391 firewall-cmd -q --remove-service nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8927\" ip netns exec fwd-test-4391 firewall-cmd -q --permanent --add-service nfs --add-service nfs3 "
at_fn_check_prepare_trace "rhbz1534571.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8927" ip netns exec fwd-test-4391 firewall-cmd -q --permanent --add-service nfs --add-service nfs3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8927\" ip netns exec fwd-test-4391 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1534571.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8927" ip netns exec fwd-test-4391 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8927\" ip netns exec fwd-test-4391 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1534571.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8927" ip netns exec fwd-test-4391 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8927\" ip netns exec fwd-test-4391 firewall-cmd -q --remove-service nfs3 "
at_fn_check_prepare_trace "rhbz1534571.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8927" ip netns exec fwd-test-4391 firewall-cmd -q --remove-service nfs3
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1534571.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-8927\" ip netns exec fwd-test-4391 firewall-cmd -q --remove-service nfs "
at_fn_check_prepare_trace "rhbz1534571.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-8927" ip netns exec fwd-test-4391 firewall-cmd -q --remove-service nfs
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1534571.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }











            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "rhbz1534571.at:17" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1534571.at:17"
            $as_echo "rhbz1534571.at:17" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1534571.at:17"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_118
#AT_START_119
at_fn_group_banner 119 'gh290.at:1' \
  "invalid syntax in xml files" "                    " 8
at_xfail=no
(
  $as_echo "119. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh290.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh290.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh290.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh290.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/gh290.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh290.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/gh290.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh290.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-205" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/gh290.at:1: ip netns add fwd-test-205"
at_fn_check_prepare_trace "gh290.at:1"
( $at_check_trace; ip netns add fwd-test-205
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27625" ip netns exec fwd-test-205 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-27625" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "gh290.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh290.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27625" ip netns exec fwd-test-205 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh290.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh290.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27625" ip netns exec fwd-test-205 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh290.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh290.at:1"





{ set +x
$as_echo "$at_srcdir/gh290.at:5: mkdir -p ./zones"
at_fn_check_prepare_trace "gh290.at:5"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:6: echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./direct.xml"
at_fn_check_prepare_trace "gh290.at:6"
( $at_check_trace; echo '<?xml version="1.0" encoding="utf-8"?>' > ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:7: echo '<direct>' >> ./direct.xml"
at_fn_check_prepare_trace "gh290.at:7"
( $at_check_trace; echo '<direct>' >> ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:8: echo '<chain table=\"filter\" chain=\"some_chain_name\" ipv=\"ipv4\"/>' >> ./direct.xml"
at_fn_check_prepare_trace "gh290.at:8"
( $at_check_trace; echo '<chain table="filter" chain="some_chain_name" ipv="ipv4"/>' >> ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:9: echo '<rule table=\"filter\" chain=\"some_chain_name\" ipv=\"ipv4\" priority=\"1\">--destination 127.0.0.1 --jump RETURN' >> ./direct.xml"
at_fn_check_prepare_trace "gh290.at:9"
( $at_check_trace; echo '<rule table="filter" chain="some_chain_name" ipv="ipv4" priority="1">--destination 127.0.0.1 --jump RETURN' >> ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:11: echo '</direct>' >> ./direct.xml"
at_fn_check_prepare_trace "gh290.at:11"
( $at_check_trace; echo '</direct>' >> ./direct.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/gh290.at:14: mkdir -p ./zones"
at_fn_check_prepare_trace "gh290.at:14"
( $at_check_trace; mkdir -p ./zones
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:15: echo '<?xml version=\"1.0\" encoding=\"utf-8\"?>' > ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:15"
( $at_check_trace; echo '<?xml version="1.0" encoding="utf-8"?>' > ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:16: echo '<zone>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:16"
( $at_check_trace; echo '<zone>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:17: echo '<short>foobar</short>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:17"
( $at_check_trace; echo '<short>foobar</short>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:19: echo '<port port=\"22\" />' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:19"
( $at_check_trace; echo '<port port="22" />' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:20: echo '<service name=\"http\"/>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:20"
( $at_check_trace; echo '<service name="http"/>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh290.at:21: echo '</zone>' >> ./zones/foobar.xml"
at_fn_check_prepare_trace "gh290.at:21"
( $at_check_trace; echo '</zone>' >> ./zones/foobar.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }




    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27625" ip netns exec fwd-test-205 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh290.at:23" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh290.at:23"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27625" ip netns exec fwd-test-205 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh290.at:23" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh290.at:23"



    { set +x
$as_echo "$at_srcdir/gh290.at:24: grep \"ERROR:.*mismatched tag\" ./firewalld.log"
at_fn_check_prepare_trace "gh290.at:24"
( $at_check_trace; grep "ERROR:.*mismatched tag" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh290.at:25: grep \"ERROR:.*Missing attribute protocol for port\" ./firewalld.log"
at_fn_check_prepare_trace "gh290.at:25"
( $at_check_trace; grep "ERROR:.*Missing attribute protocol for port" ./firewalld.log
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh290.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }








            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/ERROR:.*mismatched tag.*/d'               -e '/ERROR:.*Missing attribute protocol for port.*/d'" != x"ignore"; then
            if test -n "-e '/ERROR:.*mismatched tag.*/d'               -e '/ERROR:.*Missing attribute protocol for port.*/d'"; then
                sed -i -e '/ERROR:.*mismatched tag.*/d'               -e '/ERROR:.*Missing attribute protocol for port.*/d' ./firewalld.log
            fi
            $as_echo "gh290.at:26" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh290.at:26"
            $as_echo "gh290.at:26" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh290.at:26"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_119
#AT_START_120
at_fn_group_banner 120 'icmp_block_in_forward_chain.at:1' \
  "ICMP block present FORWARD chain" "               " 8
at_xfail=no
(
  $as_echo "120. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "icmp_block_in_forward_chain.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "icmp_block_in_forward_chain.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "icmp_block_in_forward_chain.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "icmp_block_in_forward_chain.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-22440" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:1: ip netns add fwd-test-22440"
at_fn_check_prepare_trace "icmp_block_in_forward_chain.at:1"
( $at_check_trace; ip netns add fwd-test-22440
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3556" ip netns exec fwd-test-22440 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-3556" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "icmp_block_in_forward_chain.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/icmp_block_in_forward_chain.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3556" ip netns exec fwd-test-22440 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "icmp_block_in_forward_chain.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/icmp_block_in_forward_chain.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3556" ip netns exec fwd-test-22440 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "icmp_block_in_forward_chain.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/icmp_block_in_forward_chain.at:1"








    { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3556\" ip netns exec fwd-test-22440 firewall-cmd -q --zone=public --add-icmp-block=host-prohibited "
at_fn_check_prepare_trace "icmp_block_in_forward_chain.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3556" ip netns exec fwd-test-22440 firewall-cmd -q --zone=public --add-icmp-block=host-prohibited
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }

















    { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3556\" ip netns exec fwd-test-22440     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "icmp_block_in_forward_chain.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3556" ip netns exec fwd-test-22440     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "REJECT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 3 code 10 reject-with icmp-host-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/icmp_block_in_forward_chain.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-3556\" ip netns exec fwd-test-22440     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L FWDI_public_deny; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "icmp_block_in_forward_chain.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-3556" ip netns exec fwd-test-22440     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L FWDI_public_deny; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "REJECT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 3 code 10 reject-with icmp-host-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/icmp_block_in_forward_chain.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }













            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "icmp_block_in_forward_chain.at:28" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/icmp_block_in_forward_chain.at:28"
            $as_echo "icmp_block_in_forward_chain.at:28" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/icmp_block_in_forward_chain.at:28"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_120
#AT_START_121
at_fn_group_banner 121 'pr323.at:1' \
  "GRE proto helper" "                               " 8
at_xfail=no
(
  $as_echo "121. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/pr323.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "pr323.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/pr323.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "pr323.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/pr323.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "pr323.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/pr323.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "pr323.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-26298" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/pr323.at:1: ip netns add fwd-test-26298"
at_fn_check_prepare_trace "pr323.at:1"
( $at_check_trace; ip netns add fwd-test-26298
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6836" ip netns exec fwd-test-26298 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-6836" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "pr323.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/pr323.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6836" ip netns exec fwd-test-26298 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "pr323.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/pr323.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6836" ip netns exec fwd-test-26298 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "pr323.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/pr323.at:1"






    $as_echo "pr323.at:4" >"$at_check_line_file"
(!     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6836" ip netns exec fwd-test-26298 modinfo nf_conntrack_proto_gre ) \
  && at_fn_check_skip 77 "$at_srcdir/pr323.at:4"





    { set +x
$as_echo "$at_srcdir/pr323.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6836\" ip netns exec fwd-test-26298 firewall-cmd -q --add-protocol=gre "
at_fn_check_prepare_trace "pr323.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6836" ip netns exec fwd-test-26298 firewall-cmd -q --add-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/pr323.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6836\" ip netns exec fwd-test-26298 firewall-cmd -q --remove-protocol=gre "
at_fn_check_prepare_trace "pr323.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6836" ip netns exec fwd-test-26298 firewall-cmd -q --remove-protocol=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/pr323.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-6836\" ip netns exec fwd-test-26298 firewall-cmd -q --add-service=gre "
at_fn_check_prepare_trace "pr323.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-6836" ip netns exec fwd-test-26298 firewall-cmd -q --add-service=gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/pr323.at:10: lsmod | grep nf_conntrack_proto_gre"
at_fn_check_prepare_notrace 'a shell pipeline' "pr323.at:10"
( $at_check_trace; lsmod | grep nf_conntrack_proto_gre
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/pr323.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }








            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "pr323.at:12" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/pr323.at:12"
            $as_echo "pr323.at:12" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/pr323.at:12"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_121
#AT_START_122
at_fn_group_banner 122 'rhbz1506742.at:1' \
  "ipset with timeout" "                             " 8
at_xfail=no
(
  $as_echo "122. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1506742.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1506742.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1506742.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1506742.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-10572" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rhbz1506742.at:1: ip netns add fwd-test-10572"
at_fn_check_prepare_trace "rhbz1506742.at:1"
( $at_check_trace; ip netns add fwd-test-10572
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13504" ip netns exec fwd-test-10572 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-13504" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rhbz1506742.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1506742.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13504" ip netns exec fwd-test-10572 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1506742.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1506742.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13504" ip netns exec fwd-test-10572 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1506742.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1506742.at:1"












    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13504\" ip netns exec fwd-test-10572 firewall-cmd -q --permanent --new-ipset=foobar --type=hash:ip --option=maxelem=1000000 --option=family=inet --option=hashsize=4096 --option=timeout=600 "
at_fn_check_prepare_trace "rhbz1506742.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13504" ip netns exec fwd-test-10572 firewall-cmd -q --permanent --new-ipset=foobar --type=hash:ip --option=maxelem=1000000 --option=family=inet --option=hashsize=4096 --option=timeout=600
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13504\" ip netns exec fwd-test-10572 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1506742.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13504" ip netns exec fwd-test-10572 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13504\" ip netns exec fwd-test-10572 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1506742.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13504" ip netns exec fwd-test-10572 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13504\" ip netns exec fwd-test-10572 firewall-cmd --permanent --ipset=foobar --add-entry=1.2.3.4 "
at_fn_check_prepare_trace "rhbz1506742.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13504" ip netns exec fwd-test-10572 firewall-cmd --permanent --ipset=foobar --add-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 32 $at_status "$at_srcdir/rhbz1506742.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13504\" ip netns exec fwd-test-10572 firewall-cmd -q --ipset=foobar --add-entry=1.2.3.4 "
at_fn_check_prepare_trace "rhbz1506742.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13504" ip netns exec fwd-test-10572 firewall-cmd -q --ipset=foobar --add-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13504\" ip netns exec fwd-test-10572 firewall-cmd -q --ipset=foobar --query-entry=1.2.3.4 "
at_fn_check_prepare_trace "rhbz1506742.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13504" ip netns exec fwd-test-10572 firewall-cmd -q --ipset=foobar --query-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 32 $at_status "$at_srcdir/rhbz1506742.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:11:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13504\" ip netns exec fwd-test-10572 firewall-cmd -q --ipset=foobar --remove-entry=1.2.3.4 "
at_fn_check_prepare_trace "rhbz1506742.at:11"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13504" ip netns exec fwd-test-10572 firewall-cmd -q --ipset=foobar --remove-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:11"
$at_failed && at_fn_log_failure
$at_traceon; }





cat >foobar_entries.txt <<'_ATEOF'

1.2.3.4
10.0.1.1
_ATEOF




    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13504\" ip netns exec fwd-test-10572 firewall-cmd --permanent --ipset=foobar --add-entries-from-file=foobar_entries.txt "
at_fn_check_prepare_trace "rhbz1506742.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13504" ip netns exec fwd-test-10572 firewall-cmd --permanent --ipset=foobar --add-entries-from-file=foobar_entries.txt
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 32 $at_status "$at_srcdir/rhbz1506742.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:18:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13504\" ip netns exec fwd-test-10572 firewall-cmd -q --ipset=foobar --add-entries-from-file=foobar_entries.txt "
at_fn_check_prepare_trace "rhbz1506742.at:18"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13504" ip netns exec fwd-test-10572 firewall-cmd -q --ipset=foobar --add-entries-from-file=foobar_entries.txt
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13504\" ip netns exec fwd-test-10572 firewall-cmd -q --ipset=foobar --query-entry=1.2.3.4 "
at_fn_check_prepare_trace "rhbz1506742.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13504" ip netns exec fwd-test-10572 firewall-cmd -q --ipset=foobar --query-entry=1.2.3.4
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 32 $at_status "$at_srcdir/rhbz1506742.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1506742.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-13504\" ip netns exec fwd-test-10572 firewall-cmd -q --ipset=foobar --remove-entries-from-file=foobar_entries.txt "
at_fn_check_prepare_trace "rhbz1506742.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-13504" ip netns exec fwd-test-10572 firewall-cmd -q --ipset=foobar --remove-entries-from-file=foobar_entries.txt
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1506742.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }










            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/Error: IPSET_WITH_TIMEOUT/d'               -e '/ERROR: IPSET_WITH_TIMEOUT/d' 			  -e '/WARNING: NOT_ENABLED/d'" != x"ignore"; then
            if test -n "-e '/Error: IPSET_WITH_TIMEOUT/d'               -e '/ERROR: IPSET_WITH_TIMEOUT/d' 			  -e '/WARNING: NOT_ENABLED/d'"; then
                sed -i -e '/Error: IPSET_WITH_TIMEOUT/d'               -e '/ERROR: IPSET_WITH_TIMEOUT/d' 			  -e '/WARNING: NOT_ENABLED/d' ./firewalld.log
            fi
            $as_echo "rhbz1506742.at:21" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1506742.at:21"
            $as_echo "rhbz1506742.at:21" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1506742.at:21"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_122
#AT_START_123
at_fn_group_banner 123 'rhbz1594657.at:1' \
  "no log untracked passthrough queries" "           " 8
at_xfail=no
(
  $as_echo "123. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1594657.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1594657.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1594657.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1594657.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-6520" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rhbz1594657.at:1: ip netns add fwd-test-6520"
at_fn_check_prepare_trace "rhbz1594657.at:1"
( $at_check_trace; ip netns add fwd-test-6520
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9360" ip netns exec fwd-test-6520 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-9360" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rhbz1594657.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1594657.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9360" ip netns exec fwd-test-6520 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1594657.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1594657.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9360" ip netns exec fwd-test-6520 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1594657.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1594657.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9360\" ip netns exec fwd-test-6520 firewall-cmd --direct --passthrough eb -t filter -L dummy_chain "
at_fn_check_prepare_trace "rhbz1594657.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9360" ip netns exec fwd-test-6520 firewall-cmd --direct --passthrough eb -t filter -L dummy_chain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1594657.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9360\" ip netns exec fwd-test-6520 firewall-cmd --direct --passthrough eb -t filter -L INPUT "
at_fn_check_prepare_trace "rhbz1594657.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9360" ip netns exec fwd-test-6520 firewall-cmd --direct --passthrough eb -t filter -L INPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9360\" ip netns exec fwd-test-6520 firewall-cmd --direct --passthrough ipv4 -t filter -C dummy_chain -j ACCEPT "
at_fn_check_prepare_trace "rhbz1594657.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9360" ip netns exec fwd-test-6520 firewall-cmd --direct --passthrough ipv4 -t filter -C dummy_chain -j ACCEPT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1594657.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9360\" ip netns exec fwd-test-6520 firewall-cmd --direct --passthrough ipv4 -t filter -L dummy_chain "
at_fn_check_prepare_trace "rhbz1594657.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9360" ip netns exec fwd-test-6520 firewall-cmd --direct --passthrough ipv4 -t filter -L dummy_chain
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1594657.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1594657.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9360\" ip netns exec fwd-test-6520 firewall-cmd --direct --passthrough ipv4 -t filter -L INPUT "
at_fn_check_prepare_trace "rhbz1594657.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9360" ip netns exec fwd-test-6520 firewall-cmd --direct --passthrough ipv4 -t filter -L INPUT
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1594657.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }












            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "rhbz1594657.at:16" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1594657.at:16"
            $as_echo "rhbz1594657.at:16" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1594657.at:16"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_123
#AT_START_124
at_fn_group_banner 124 'rhbz1571957.at:1' \
  "set-log-denied w/ ICMP block inversion" "         " 8
at_xfail=no
(
  $as_echo "124. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1571957.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1571957.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1571957.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1571957.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-29057" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rhbz1571957.at:1: ip netns add fwd-test-29057"
at_fn_check_prepare_trace "rhbz1571957.at:1"
( $at_check_trace; ip netns add fwd-test-29057
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21523" ip netns exec fwd-test-29057 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-21523" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rhbz1571957.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1571957.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21523" ip netns exec fwd-test-29057 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1571957.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1571957.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21523" ip netns exec fwd-test-29057 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1571957.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1571957.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21523\" ip netns exec fwd-test-29057 firewall-cmd -q --permanent --zone=public --add-icmp-block-inversion "
at_fn_check_prepare_trace "rhbz1571957.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21523" ip netns exec fwd-test-29057 firewall-cmd -q --permanent --zone=public --add-icmp-block-inversion
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21523\" ip netns exec fwd-test-29057 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1571957.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21523" ip netns exec fwd-test-29057 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21523\" ip netns exec fwd-test-29057 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1571957.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21523" ip netns exec fwd-test-29057 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21523\" ip netns exec fwd-test-29057 firewall-cmd -q --set-log-denied=all "
at_fn_check_prepare_trace "rhbz1571957.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21523" ip netns exec fwd-test-29057 firewall-cmd -q --set-log-denied=all
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/rhbz1571957.at:7: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1571957.at:7"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21523\" ip netns exec fwd-test-29057 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1571957.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21523" ip netns exec fwd-test-29057 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21523\" ip netns exec fwd-test-29057 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1571957.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21523" ip netns exec fwd-test-29057 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21523\" ip netns exec fwd-test-29057 firewall-cmd -q --set-log-denied=broadcast "
at_fn_check_prepare_trace "rhbz1571957.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21523" ip netns exec fwd-test-29057 firewall-cmd -q --set-log-denied=broadcast
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21523\" ip netns exec fwd-test-29057 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1571957.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21523" ip netns exec fwd-test-29057 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1571957.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-21523\" ip netns exec fwd-test-29057 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1571957.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-21523" ip netns exec fwd-test-29057 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1571957.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }












            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "rhbz1571957.at:12" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1571957.at:12"
            $as_echo "rhbz1571957.at:12" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1571957.at:12"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_124
#AT_START_125
at_fn_group_banner 125 'rhbz1404076.at:1' \
  "query single port added with range" "             " 8
at_xfail=no
(
  $as_echo "125. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1404076.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1404076.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1404076.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1404076.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-9945" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rhbz1404076.at:1: ip netns add fwd-test-9945"
at_fn_check_prepare_trace "rhbz1404076.at:1"
( $at_check_trace; ip netns add fwd-test-9945
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29370" ip netns exec fwd-test-9945 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-29370" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rhbz1404076.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1404076.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29370" ip netns exec fwd-test-9945 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1404076.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1404076.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29370" ip netns exec fwd-test-9945 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1404076.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1404076.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29370\" ip netns exec fwd-test-9945 firewall-cmd -q --add-port=8080-8090/tcp "
at_fn_check_prepare_trace "rhbz1404076.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29370" ip netns exec fwd-test-9945 firewall-cmd -q --add-port=8080-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29370\" ip netns exec fwd-test-9945 firewall-cmd -q --query-port=8085/tcp "
at_fn_check_prepare_trace "rhbz1404076.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29370" ip netns exec fwd-test-9945 firewall-cmd -q --query-port=8085/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29370\" ip netns exec fwd-test-9945 firewall-cmd -q --query-port=webcache/tcp "
at_fn_check_prepare_trace "rhbz1404076.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29370" ip netns exec fwd-test-9945 firewall-cmd -q --query-port=webcache/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29370\" ip netns exec fwd-test-9945 firewall-cmd -q --query-port=8091/tcp "
at_fn_check_prepare_trace "rhbz1404076.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29370" ip netns exec fwd-test-9945 firewall-cmd -q --query-port=8091/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29370\" ip netns exec fwd-test-9945 firewall-cmd -q --query-port=8085/udp "
at_fn_check_prepare_trace "rhbz1404076.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29370" ip netns exec fwd-test-9945 firewall-cmd -q --query-port=8085/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29370\" ip netns exec fwd-test-9945 firewall-cmd -q --permanent --add-port=8080-8090/tcp "
at_fn_check_prepare_trace "rhbz1404076.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29370" ip netns exec fwd-test-9945 firewall-cmd -q --permanent --add-port=8080-8090/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29370\" ip netns exec fwd-test-9945 firewall-cmd -q --permanent --query-port=8085/tcp "
at_fn_check_prepare_trace "rhbz1404076.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29370" ip netns exec fwd-test-9945 firewall-cmd -q --permanent --query-port=8085/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29370\" ip netns exec fwd-test-9945 firewall-cmd -q --permanent --query-port=webcache/tcp "
at_fn_check_prepare_trace "rhbz1404076.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29370" ip netns exec fwd-test-9945 firewall-cmd -q --permanent --query-port=webcache/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1404076.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29370\" ip netns exec fwd-test-9945 firewall-cmd -q --permanent --query-port=8091/tcp "
at_fn_check_prepare_trace "rhbz1404076.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29370" ip netns exec fwd-test-9945 firewall-cmd -q --permanent --query-port=8091/tcp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/rhbz1404076.at:16:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-29370\" ip netns exec fwd-test-9945 firewall-cmd -q --permanent --query-port=8085/udp "
at_fn_check_prepare_trace "rhbz1404076.at:16"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-29370" ip netns exec fwd-test-9945 firewall-cmd -q --permanent --query-port=8085/udp
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 1 $at_status "$at_srcdir/rhbz1404076.at:16"
$at_failed && at_fn_log_failure
$at_traceon; }










            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "rhbz1404076.at:18" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1404076.at:18"
            $as_echo "rhbz1404076.at:18" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1404076.at:18"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_125
#AT_START_126
at_fn_group_banner 126 'gh366.at:1' \
  "service destination multiple IP versions" "       " 8
at_xfail=no
(
  $as_echo "126. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh366.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh366.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh366.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh366.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/gh366.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh366.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/gh366.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh366.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-17377" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/gh366.at:1: ip netns add fwd-test-17377"
at_fn_check_prepare_trace "gh366.at:1"
( $at_check_trace; ip netns add fwd-test-17377
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15807" ip netns exec fwd-test-17377 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-15807" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "gh366.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh366.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15807" ip netns exec fwd-test-17377 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh366.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh366.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15807" ip netns exec fwd-test-17377 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh366.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh366.at:1"










    { set +x
$as_echo "$at_srcdir/gh366.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-15807\" ip netns exec fwd-test-17377 firewall-cmd -q --zone=public --add-service=mdns "
at_fn_check_prepare_trace "gh366.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15807" ip netns exec fwd-test-17377 firewall-cmd -q --zone=public --add-service=mdns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/gh366.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-15807\" ip netns exec fwd-test-17377     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh366.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15807" ip netns exec fwd-test-17377     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT udp -- 0.0.0.0/0 224.0.0.251 udp dpt:5353 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }


















    { set +x
$as_echo "$at_srcdir/gh366.at:27:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-15807\" ip netns exec fwd-test-17377 firewall-cmd -q --zone=public --remove-service=mdns "
at_fn_check_prepare_trace "gh366.at:27"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15807" ip netns exec fwd-test-17377 firewall-cmd -q --zone=public --remove-service=mdns
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:27"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh366.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-15807\" ip netns exec fwd-test-17377 firewall-cmd -q --zone=public --add-rich-rule=\"rule service name=\"mdns\" accept\" "
at_fn_check_prepare_trace "gh366.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15807" ip netns exec fwd-test-17377 firewall-cmd -q --zone=public --add-rich-rule="rule service name="mdns" accept"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/gh366.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-15807\" ip netns exec fwd-test-17377     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh366.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15807" ip netns exec fwd-test-17377     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT udp -- 0.0.0.0/0 224.0.0.251 udp dpt:5353 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh366.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }



















    { set +x
$as_echo "$at_srcdir/gh366.at:33:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-15807\" ip netns exec fwd-test-17377 firewall-cmd -q --zone=public --add-rich-rule='rule family=\"ipv4\" destination address=\"10.10.10.0/24\" service name=\"mdns\" accept' "
at_fn_check_prepare_trace "gh366.at:33"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-15807" ip netns exec fwd-test-17377 firewall-cmd -q --zone=public --add-rich-rule='rule family="ipv4" destination address="10.10.10.0/24" service name="mdns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 122 $at_status "$at_srcdir/gh366.at:33"
$at_failed && at_fn_log_failure
$at_traceon; }












            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/ERROR: INVALID_RULE: Destination conflict with service/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_RULE: Destination conflict with service/d'"; then
                sed -i -e '/ERROR: INVALID_RULE: Destination conflict with service/d' ./firewalld.log
            fi
            $as_echo "gh366.at:36" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh366.at:36"
            $as_echo "gh366.at:36" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh366.at:36"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_126
#AT_START_127
at_fn_group_banner 127 'rhbz1601610.at:1' \
  "ipset duplicate entries" "                        " 8
at_xfail=no
(
  $as_echo "127. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1601610.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1601610.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1601610.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1601610.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-25508" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rhbz1601610.at:1: ip netns add fwd-test-25508"
at_fn_check_prepare_trace "rhbz1601610.at:1"
( $at_check_trace; ip netns add fwd-test-25508
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10854" ip netns exec fwd-test-25508 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-10854" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rhbz1601610.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1601610.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10854" ip netns exec fwd-test-25508 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1601610.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1601610.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10854" ip netns exec fwd-test-25508 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1601610.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1601610.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10854\" ip netns exec fwd-test-25508 firewall-cmd -q --new-ipset=foobar --permanent --type=hash:net "
at_fn_check_prepare_trace "rhbz1601610.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10854" ip netns exec fwd-test-25508 firewall-cmd -q --new-ipset=foobar --permanent --type=hash:net
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10854\" ip netns exec fwd-test-25508 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1601610.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10854" ip netns exec fwd-test-25508 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10854\" ip netns exec fwd-test-25508 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1601610.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10854" ip netns exec fwd-test-25508 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10854\" ip netns exec fwd-test-25508 firewall-cmd -q --ipset=foobar --add-entry=10.1.1.0/22 "
at_fn_check_prepare_trace "rhbz1601610.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10854" ip netns exec fwd-test-25508 firewall-cmd -q --ipset=foobar --add-entry=10.1.1.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10854\" ip netns exec fwd-test-25508 firewall-cmd -q --ipset=foobar --add-entry=10.1.2.0/22 "
at_fn_check_prepare_trace "rhbz1601610.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10854" ip netns exec fwd-test-25508 firewall-cmd -q --ipset=foobar --add-entry=10.1.2.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 13 $at_status "$at_srcdir/rhbz1601610.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10854\" ip netns exec fwd-test-25508 firewall-cmd -q --ipset=foobar --add-entry=10.2.0.0/22 "
at_fn_check_prepare_trace "rhbz1601610.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10854" ip netns exec fwd-test-25508 firewall-cmd -q --ipset=foobar --add-entry=10.2.0.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10854\" ip netns exec fwd-test-25508 firewall-cmd --ipset=foobar --get-entries "
at_fn_check_prepare_trace "rhbz1601610.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10854" ip netns exec fwd-test-25508 firewall-cmd --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "10.1.1.0/22
10.2.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10854\" ip netns exec fwd-test-25508     sh <<-\"HERE\"
    { { { { ipset list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10854" ip netns exec fwd-test-25508     sh <<-"HERE"
    { { { { ipset list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:net
Members:
10.1.0.0/22
10.2.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:31:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10854\" ip netns exec fwd-test-25508 firewall-cmd -q --ipset=foobar --remove-entry=10.1.1.0/22 "
at_fn_check_prepare_trace "rhbz1601610.at:31"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10854" ip netns exec fwd-test-25508 firewall-cmd -q --ipset=foobar --remove-entry=10.1.1.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:31"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:32:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10854\" ip netns exec fwd-test-25508 firewall-cmd --ipset=foobar --get-entries "
at_fn_check_prepare_trace "rhbz1601610.at:32"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10854" ip netns exec fwd-test-25508 firewall-cmd --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "10.2.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:32"
$at_failed && at_fn_log_failure
$at_traceon; }










    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10854\" ip netns exec fwd-test-25508     sh <<-\"HERE\"
    { { { { ipset list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10854" ip netns exec fwd-test-25508     sh <<-"HERE"
    { { { { ipset list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:net
Members:
10.2.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:51:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10854\" ip netns exec fwd-test-25508 firewall-cmd -q --permanent --ipset=foobar --add-entry=10.1.1.0/22 "
at_fn_check_prepare_trace "rhbz1601610.at:51"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10854" ip netns exec fwd-test-25508 firewall-cmd -q --permanent --ipset=foobar --add-entry=10.1.1.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:51"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:52:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10854\" ip netns exec fwd-test-25508 firewall-cmd --permanent --ipset=foobar --get-entries "
at_fn_check_prepare_trace "rhbz1601610.at:52"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10854" ip netns exec fwd-test-25508 firewall-cmd --permanent --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "10.1.1.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:52"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:55:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10854\" ip netns exec fwd-test-25508 firewall-cmd -q --permanent --ipset=foobar --remove-entry=10.1.1.0/22 "
at_fn_check_prepare_trace "rhbz1601610.at:55"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10854" ip netns exec fwd-test-25508 firewall-cmd -q --permanent --ipset=foobar --remove-entry=10.1.1.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:55"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:56:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10854\" ip netns exec fwd-test-25508 firewall-cmd --permanent --ipset=foobar --get-entries "
at_fn_check_prepare_trace "rhbz1601610.at:56"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10854" ip netns exec fwd-test-25508 firewall-cmd --permanent --ipset=foobar --get-entries
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:56"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:60:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10854\" ip netns exec fwd-test-25508 firewall-cmd -q --ipset=foobar --add-entry=10.3.0.0/22 "
at_fn_check_prepare_trace "rhbz1601610.at:60"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10854" ip netns exec fwd-test-25508 firewall-cmd -q --ipset=foobar --add-entry=10.3.0.0/22
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:60"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:61:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10854\" ip netns exec fwd-test-25508 firewall-cmd -q --runtime-to-permanent "
at_fn_check_prepare_trace "rhbz1601610.at:61"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10854" ip netns exec fwd-test-25508 firewall-cmd -q --runtime-to-permanent
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:61"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10854\" ip netns exec fwd-test-25508 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1601610.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10854" ip netns exec fwd-test-25508 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10854\" ip netns exec fwd-test-25508 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1601610.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10854" ip netns exec fwd-test-25508 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:72:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10854\" ip netns exec fwd-test-25508     sh <<-\"HERE\"
    { { { { ipset list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:72"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10854" ip netns exec fwd-test-25508     sh <<-"HERE"
    { { { { ipset list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:net
Members:
10.2.0.0/22
10.3.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:72"
$at_failed && at_fn_log_failure
$at_traceon; }





{ set +x
$as_echo "$at_srcdir/rhbz1601610.at:81: sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1601610.at:81"
( $at_check_trace; sed -i 's/^IndividualCalls.*/IndividualCalls=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:81"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10854\" ip netns exec fwd-test-25508 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1601610.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10854" ip netns exec fwd-test-25508 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:82:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10854\" ip netns exec fwd-test-25508 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1601610.at:82"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10854" ip netns exec fwd-test-25508 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:82"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/rhbz1601610.at:92:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10854\" ip netns exec fwd-test-25508     sh <<-\"HERE\"
    { { { { ipset list foobar; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |    grep -v \"^\\(Revision\\|Header\\|Size\\|References\\|Number\\)\" |    awk 'NR <= 3; NR > 3 {print | \"sort\"}'  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "rhbz1601610.at:92"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10854" ip netns exec fwd-test-25508     sh <<-"HERE"
    { { { { ipset list foobar; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |    grep -v "^\(Revision\|Header\|Size\|References\|Number\)" |    awk 'NR <= 3; NR > 3 {print | "sort"}'  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "Name: foobar
Type: hash:net
Members:
10.2.0.0/22
10.3.0.0/22
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1601610.at:92"
$at_failed && at_fn_log_failure
$at_traceon; }











            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/ERROR: COMMAND_FAILED:.*already added.*/d'              -e '/ERROR: COMMAND_FAILED:.*element.*exists/d'              -e '/Kernel support protocol versions/d'" != x"ignore"; then
            if test -n "-e '/ERROR: COMMAND_FAILED:.*already added.*/d'              -e '/ERROR: COMMAND_FAILED:.*element.*exists/d'              -e '/Kernel support protocol versions/d'"; then
                sed -i -e '/ERROR: COMMAND_FAILED:.*already added.*/d'              -e '/ERROR: COMMAND_FAILED:.*element.*exists/d'              -e '/Kernel support protocol versions/d' ./firewalld.log
            fi
            $as_echo "rhbz1601610.at:100" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1601610.at:100"
            $as_echo "rhbz1601610.at:100" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1601610.at:100"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_127
#AT_START_128
at_fn_group_banner 128 'gh303.at:1' \
  "unicode in XML" "                                 " 8
at_xfail=no
(
  $as_echo "128. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh303.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh303.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh303.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh303.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/gh303.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh303.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/gh303.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh303.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-12128" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/gh303.at:1: ip netns add fwd-test-12128"
at_fn_check_prepare_trace "gh303.at:1"
( $at_check_trace; ip netns add fwd-test-12128
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-431" ip netns exec fwd-test-12128 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-431" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "gh303.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh303.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-431" ip netns exec fwd-test-12128 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh303.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh303.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-431" ip netns exec fwd-test-12128 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh303.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh303.at:1"





{ set +x
$as_echo "$at_srcdir/gh303.at:4: mkdir -p ./services"
at_fn_check_prepare_trace "gh303.at:4"
( $at_check_trace; mkdir -p ./services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/gh303.at:5: cat <<HERE > ./services/unicode-service-test.xml
<?xml version=\"1.0\" encoding=\"utf-8\"?>
<service>
  <short>unicode-service-test</short>
  <description>A string with unicode characters; Ё ώ € ⇶ ▜ ◯ ★ ☠ ☯ ☺ ♻ </description>
  <port protocol=\"tcp\" port=\"12345\"/>
</service>
HERE
"
at_fn_check_prepare_notrace 'an embedded newline' "gh303.at:5"
( $at_check_trace; cat <<HERE > ./services/unicode-service-test.xml
<?xml version="1.0" encoding="utf-8"?>
<service>
  <short>unicode-service-test</short>
  <description>A string with unicode characters; Ё ώ € ⇶ ▜ ◯ ★ ☠ ☯ ☺ ♻ </description>
  <port protocol="tcp" port="12345"/>
</service>
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }


LC_ALL="C"
export LC_ALL


    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-431" ip netns exec fwd-test-12128 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh303.at:17" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh303.at:17"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-431" ip netns exec fwd-test-12128 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh303.at:17" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh303.at:17"






    { set +x
$as_echo "$at_srcdir/gh303.at:19:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-431\" ip netns exec fwd-test-12128 firewall-cmd -q --permanent --add-service=unicode-service-test "
at_fn_check_prepare_trace "gh303.at:19"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-431" ip netns exec fwd-test-12128 firewall-cmd -q --permanent --add-service=unicode-service-test
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:19"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh303.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-431\" ip netns exec fwd-test-12128 firewall-cmd -q --reload "
at_fn_check_prepare_trace "gh303.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-431" ip netns exec fwd-test-12128 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh303.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-431\" ip netns exec fwd-test-12128 firewall-cmd -q --state "
at_fn_check_prepare_trace "gh303.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-431" ip netns exec fwd-test-12128 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh303.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }












            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "gh303.at:22" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh303.at:22"
            $as_echo "gh303.at:22" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh303.at:22"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_128
#AT_START_129
at_fn_group_banner 129 'gh335.at:1' \
  "forward-port toaddr enables IP forwarding" "      " 8
at_xfail=no
(
  $as_echo "129. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh335.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh335.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh335.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh335.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/gh335.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh335.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/gh335.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh335.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-30166" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/gh335.at:1: ip netns add fwd-test-30166"
at_fn_check_prepare_trace "gh335.at:1"
( $at_check_trace; ip netns add fwd-test-30166
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22787" ip netns exec fwd-test-30166 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-22787" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "gh335.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh335.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22787" ip netns exec fwd-test-30166 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh335.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh335.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22787" ip netns exec fwd-test-30166 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh335.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh335.at:1"






    { set +x
$as_echo "$at_srcdir/gh335.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22787\" ip netns exec fwd-test-30166 sysctl -w net.ipv4.conf.all.forwarding=0 "
at_fn_check_prepare_trace "gh335.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22787" ip netns exec fwd-test-30166 sysctl -w net.ipv4.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22787\" ip netns exec fwd-test-30166 sysctl -w net.ipv6.conf.all.forwarding=0 "
at_fn_check_prepare_trace "gh335.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22787" ip netns exec fwd-test-30166 sysctl -w net.ipv6.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22787\" ip netns exec fwd-test-30166 firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toaddr=10.10.10.10 "
at_fn_check_prepare_trace "gh335.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22787" ip netns exec fwd-test-30166 firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toaddr=10.10.10.10
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22787\" ip netns exec fwd-test-30166 sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22787" ip netns exec fwd-test-30166 sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22787\" ip netns exec fwd-test-30166 sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22787" ip netns exec fwd-test-30166 sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh335.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22787\" ip netns exec fwd-test-30166 firewall-cmd -q --reload "
at_fn_check_prepare_trace "gh335.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22787" ip netns exec fwd-test-30166 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh335.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22787\" ip netns exec fwd-test-30166 firewall-cmd -q --state "
at_fn_check_prepare_trace "gh335.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22787" ip netns exec fwd-test-30166 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }














    { set +x
$as_echo "$at_srcdir/gh335.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22787\" ip netns exec fwd-test-30166 sysctl -w net.ipv4.conf.all.forwarding=0 "
at_fn_check_prepare_trace "gh335.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22787" ip netns exec fwd-test-30166 sysctl -w net.ipv4.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:21:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22787\" ip netns exec fwd-test-30166 sysctl -w net.ipv6.conf.all.forwarding=0 "
at_fn_check_prepare_trace "gh335.at:21"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22787" ip netns exec fwd-test-30166 sysctl -w net.ipv6.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:21"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:22:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22787\" ip netns exec fwd-test-30166 firewall-cmd -q --add-rich-rule='rule family=ipv4 forward-port port=\"12345\" protocol=\"tcp\" to-port=\"54321\" to-addr=\"10.10.10.10\"' "
at_fn_check_prepare_trace "gh335.at:22"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22787" ip netns exec fwd-test-30166 firewall-cmd -q --add-rich-rule='rule family=ipv4 forward-port port="12345" protocol="tcp" to-port="54321" to-addr="10.10.10.10"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:22"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:23:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22787\" ip netns exec fwd-test-30166 sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:23"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22787" ip netns exec fwd-test-30166 sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:23"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:24:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22787\" ip netns exec fwd-test-30166 sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:24"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22787" ip netns exec fwd-test-30166 sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:24"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh335.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22787\" ip netns exec fwd-test-30166 firewall-cmd -q --reload "
at_fn_check_prepare_trace "gh335.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22787" ip netns exec fwd-test-30166 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh335.at:25:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22787\" ip netns exec fwd-test-30166 firewall-cmd -q --state "
at_fn_check_prepare_trace "gh335.at:25"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22787" ip netns exec fwd-test-30166 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:25"
$at_failed && at_fn_log_failure
$at_traceon; }














    { set +x
$as_echo "$at_srcdir/gh335.at:37:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22787\" ip netns exec fwd-test-30166 sysctl -w net.ipv4.conf.all.forwarding=0 "
at_fn_check_prepare_trace "gh335.at:37"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22787" ip netns exec fwd-test-30166 sysctl -w net.ipv4.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:37"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:38:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22787\" ip netns exec fwd-test-30166 sysctl -w net.ipv6.conf.all.forwarding=0 "
at_fn_check_prepare_trace "gh335.at:38"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22787" ip netns exec fwd-test-30166 sysctl -w net.ipv6.conf.all.forwarding=0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:38"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh335.at:40:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22787\" ip netns exec fwd-test-30166 firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toport=54321 "
at_fn_check_prepare_trace "gh335.at:40"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22787" ip netns exec fwd-test-30166 firewall-cmd -q --add-forward-port=port=12345:proto=tcp:toport=54321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:40"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:41:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22787\" ip netns exec fwd-test-30166 sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:41"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22787" ip netns exec fwd-test-30166 sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:41"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:42:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22787\" ip netns exec fwd-test-30166 sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:42"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22787" ip netns exec fwd-test-30166 sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:42"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/gh335.at:44:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22787\" ip netns exec fwd-test-30166 firewall-cmd -q --add-rich-rule='rule family=ipv4 forward-port port=\"12345\" protocol=\"tcp\" to-port=\"54321\"' "
at_fn_check_prepare_trace "gh335.at:44"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22787" ip netns exec fwd-test-30166 firewall-cmd -q --add-rich-rule='rule family=ipv4 forward-port port="12345" protocol="tcp" to-port="54321"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh335.at:44"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/gh335.at:45:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22787\" ip netns exec fwd-test-30166 sysctl -a |grep \"net.ipv4.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:45"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22787" ip netns exec fwd-test-30166 sysctl -a |grep "net.ipv4.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:45"
$at_failed && at_fn_log_failure
$at_traceon; }



    { set +x
$as_echo "$at_srcdir/gh335.at:46:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-22787\" ip netns exec fwd-test-30166 sysctl -a |grep \"net.ipv6.conf.all.forwarding[ ]*=[ ]*1\" "
at_fn_check_prepare_notrace 'a shell pipeline' "gh335.at:46"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-22787" ip netns exec fwd-test-30166 sysctl -a |grep "net.ipv6.conf.all.forwarding[ ]*=[ ]*1"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/gh335.at:46"
$at_failed && at_fn_log_failure
$at_traceon; }
















            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "gh335.at:54" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh335.at:54"
            $as_echo "gh335.at:54" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh335.at:54"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_129
#AT_START_130
at_fn_group_banner 130 'gh482.at:1' \
  "remove forward-port after reload" "               " 8
at_xfail=no
(
  $as_echo "130. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh482.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh482.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh482.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh482.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/gh482.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh482.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/gh482.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh482.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-14193" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/gh482.at:1: ip netns add fwd-test-14193"
at_fn_check_prepare_trace "gh482.at:1"
( $at_check_trace; ip netns add fwd-test-14193
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31757" ip netns exec fwd-test-14193 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-31757" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "gh482.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh482.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31757" ip netns exec fwd-test-14193 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh482.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh482.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31757" ip netns exec fwd-test-14193 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh482.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh482.at:1"








    { set +x
$as_echo "$at_srcdir/gh482.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31757\" ip netns exec fwd-test-14193 firewall-cmd -q             --add-rich-rule='rule family=\"ipv4\" forward-port port=\"49152\" protocol=\"tcp\" to-port=\"49153\"' "
at_fn_check_prepare_trace "gh482.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31757" ip netns exec fwd-test-14193 firewall-cmd -q             --add-rich-rule='rule family="ipv4" forward-port port="49152" protocol="tcp" to-port="49153"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh482.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31757\" ip netns exec fwd-test-14193 firewall-cmd -q             --remove-rich-rule='rule family=\"ipv4\" forward-port port=\"49152\" protocol=\"tcp\" to-port=\"49153\"' "
at_fn_check_prepare_trace "gh482.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31757" ip netns exec fwd-test-14193 firewall-cmd -q             --remove-rich-rule='rule family="ipv4" forward-port port="49152" protocol="tcp" to-port="49153"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:7:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31757\" ip netns exec fwd-test-14193 firewall-cmd -q --permanent --add-rich-rule='rule family=\"ipv4\" forward-port port=\"49152\" protocol=\"tcp\" to-port=\"49153\"' "
at_fn_check_prepare_trace "gh482.at:7"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31757" ip netns exec fwd-test-14193 firewall-cmd -q --permanent --add-rich-rule='rule family="ipv4" forward-port port="49152" protocol="tcp" to-port="49153"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:7"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31757\" ip netns exec fwd-test-14193 firewall-cmd -q --reload "
at_fn_check_prepare_trace "gh482.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31757" ip netns exec fwd-test-14193 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh482.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31757\" ip netns exec fwd-test-14193 firewall-cmd -q --state "
at_fn_check_prepare_trace "gh482.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31757" ip netns exec fwd-test-14193 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31757\" ip netns exec fwd-test-14193 firewall-cmd -q             --remove-rich-rule='rule family=\"ipv4\" forward-port port=\"49152\" protocol=\"tcp\" to-port=\"49153\"' "
at_fn_check_prepare_trace "gh482.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31757" ip netns exec fwd-test-14193 firewall-cmd -q             --remove-rich-rule='rule family="ipv4" forward-port port="49152" protocol="tcp" to-port="49153"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh482.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31757\" ip netns exec fwd-test-14193 firewall-cmd -q --permanent --remove-rich-rule='rule family=\"ipv4\" forward-port port=\"49152\" protocol=\"tcp\" to-port=\"49153\"' "
at_fn_check_prepare_trace "gh482.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31757" ip netns exec fwd-test-14193 firewall-cmd -q --permanent --remove-rich-rule='rule family="ipv4" forward-port port="49152" protocol="tcp" to-port="49153"'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31757\" ip netns exec fwd-test-14193 firewall-cmd -q --permanent --add-forward-port=port=1234:proto=tcp:toport=4321 "
at_fn_check_prepare_trace "gh482.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31757" ip netns exec fwd-test-14193 firewall-cmd -q --permanent --add-forward-port=port=1234:proto=tcp:toport=4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31757\" ip netns exec fwd-test-14193 firewall-cmd -q --reload "
at_fn_check_prepare_trace "gh482.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31757" ip netns exec fwd-test-14193 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh482.at:13:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31757\" ip netns exec fwd-test-14193 firewall-cmd -q --state "
at_fn_check_prepare_trace "gh482.at:13"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31757" ip netns exec fwd-test-14193 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/gh482.at:14:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31757\" ip netns exec fwd-test-14193 firewall-cmd -q             --remove-forward-port=port=1234:proto=tcp:toport=4321 "
at_fn_check_prepare_trace "gh482.at:14"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31757" ip netns exec fwd-test-14193 firewall-cmd -q             --remove-forward-port=port=1234:proto=tcp:toport=4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:14"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh482.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-31757\" ip netns exec fwd-test-14193 firewall-cmd -q --permanent --remove-forward-port=port=1234:proto=tcp:toport=4321 "
at_fn_check_prepare_trace "gh482.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-31757" ip netns exec fwd-test-14193 firewall-cmd -q --permanent --remove-forward-port=port=1234:proto=tcp:toport=4321
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh482.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }











            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "gh482.at:17" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh482.at:17"
            $as_echo "gh482.at:17" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh482.at:17"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_130
#AT_START_131
at_fn_group_banner 131 'gh478.at:1' \
  "rich rule marks every packet" "                   " 8
at_xfail=no
(
  $as_echo "131. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh478.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh478.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh478.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh478.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/gh478.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh478.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/gh478.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh478.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-23176" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/gh478.at:1: ip netns add fwd-test-23176"
at_fn_check_prepare_trace "gh478.at:1"
( $at_check_trace; ip netns add fwd-test-23176
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9213" ip netns exec fwd-test-23176 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-9213" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "gh478.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh478.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9213" ip netns exec fwd-test-23176 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh478.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh478.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9213" ip netns exec fwd-test-23176 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh478.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh478.at:1"








    { set +x
$as_echo "$at_srcdir/gh478.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9213\" ip netns exec fwd-test-23176 firewall-cmd -q --add-rich-rule='rule port port=1234 protocol=tcp mark set=10' "
at_fn_check_prepare_trace "gh478.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9213" ip netns exec fwd-test-23176 firewall-cmd -q --add-rich-rule='rule port port=1234 protocol=tcp mark set=10'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh478.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9213\" ip netns exec fwd-test-23176 firewall-cmd -q --add-rich-rule='rule protocol value=icmp mark set=11' "
at_fn_check_prepare_trace "gh478.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9213" ip netns exec fwd-test-23176 firewall-cmd -q --add-rich-rule='rule protocol value=icmp mark set=11'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh478.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9213\" ip netns exec fwd-test-23176 firewall-cmd -q --add-rich-rule='rule source-port port=4321 protocol=tcp mark set=12' "
at_fn_check_prepare_trace "gh478.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9213" ip netns exec fwd-test-23176 firewall-cmd -q --add-rich-rule='rule source-port port=4321 protocol=tcp mark set=12'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/gh478.at:17:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9213\" ip netns exec fwd-test-23176     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t mangle -L PRE_public_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh478.at:17"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9213" ip netns exec fwd-test-23176     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t mangle -L PRE_public_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "MARK tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:1234 MARK set 0xa
MARK icmp -- 0.0.0.0/0 0.0.0.0/0 MARK set 0xb
MARK tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spt:4321 MARK set 0xc
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh478.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }






















            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "gh478.at:28" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh478.at:28"
            $as_echo "gh478.at:28" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh478.at:28"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_131
#AT_START_132
at_fn_group_banner 132 'gh258.at:1' \
  "zone dispatch layout" "                           " 8
at_xfail=no
(
  $as_echo "132. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/gh258.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "gh258.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/gh258.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "gh258.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/gh258.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "gh258.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/gh258.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "gh258.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-21916" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/gh258.at:1: ip netns add fwd-test-21916"
at_fn_check_prepare_trace "gh258.at:1"
( $at_check_trace; ip netns add fwd-test-21916
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19726" ip netns exec fwd-test-21916 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-19726" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "gh258.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh258.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19726" ip netns exec fwd-test-21916 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "gh258.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/gh258.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19726" ip netns exec fwd-test-21916 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "gh258.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/gh258.at:1"








    { set +x
$as_echo "$at_srcdir/gh258.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19726\" ip netns exec fwd-test-21916 firewall-cmd --zone=work --add-source=\"1.2.3.0/24\" "
at_fn_check_prepare_trace "gh258.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19726" ip netns exec fwd-test-21916 firewall-cmd --zone=work --add-source="1.2.3.0/24"
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/gh258.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19726\" ip netns exec fwd-test-21916 firewall-cmd --zone=work --add-interface=dummy0 "
at_fn_check_prepare_trace "gh258.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19726" ip netns exec fwd-test-21916 firewall-cmd --zone=work --add-interface=dummy0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/gh258.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19726\" ip netns exec fwd-test-21916 firewall-cmd --zone=public --add-interface=dummy1 "
at_fn_check_prepare_trace "gh258.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19726" ip netns exec fwd-test-21916 firewall-cmd --zone=public --add-interface=dummy1
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }












    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19726\" ip netns exec fwd-test-21916     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L INPUT; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19726" ip netns exec fwd-test-21916     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L INPUT; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED,DNAT
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
INPUT_direct all -- 0.0.0.0/0 0.0.0.0/0
INPUT_ZONES all -- 0.0.0.0/0 0.0.0.0/0
DROP all -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID
REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19726\" ip netns exec fwd-test-21916     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L INPUT_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19726" ip netns exec fwd-test-21916     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L INPUT_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_work all -- 1.2.3.0/24 0.0.0.0/0 [goto]
INPUT_ZONES_IFACES all -- 0.0.0.0/0 0.0.0.0/0 [goto]
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19726\" ip netns exec fwd-test-21916     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L INPUT_ZONES_IFACES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19726" ip netns exec fwd-test-21916     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L INPUT_ZONES_IFACES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "IN_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
IN_work all -- 0.0.0.0/0 0.0.0.0/0 [goto]
IN_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19726\" ip netns exec fwd-test-21916     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L FORWARD; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19726" ip netns exec fwd-test-21916     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L FORWARD; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED,DNAT
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
FORWARD_direct all -- 0.0.0.0/0 0.0.0.0/0
FORWARD_IN_ZONES all -- 0.0.0.0/0 0.0.0.0/0
FORWARD_OUT_ZONES all -- 0.0.0.0/0 0.0.0.0/0
DROP all -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID
REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19726\" ip netns exec fwd-test-21916     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L FORWARD_IN_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19726" ip netns exec fwd-test-21916     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L FORWARD_IN_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWDI_work all -- 1.2.3.0/24 0.0.0.0/0 [goto]
FORWARD_IN_ZONES_IFACES all -- 0.0.0.0/0 0.0.0.0/0 [goto]
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19726\" ip netns exec fwd-test-21916     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L FORWARD_IN_ZONES_IFACES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19726" ip netns exec fwd-test-21916     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L FORWARD_IN_ZONES_IFACES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWDI_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
FWDI_work all -- 0.0.0.0/0 0.0.0.0/0 [goto]
FWDI_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19726\" ip netns exec fwd-test-21916     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L FORWARD_OUT_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19726" ip netns exec fwd-test-21916     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L FORWARD_OUT_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWDO_work all -- 0.0.0.0/0 1.2.3.0/24 [goto]
FORWARD_OUT_ZONES_IFACES all -- 0.0.0.0/0 0.0.0.0/0 [goto]
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19726\" ip netns exec fwd-test-21916     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L FORWARD_OUT_ZONES_IFACES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19726" ip netns exec fwd-test-21916     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L FORWARD_OUT_ZONES_IFACES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "FWDO_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
FWDO_work all -- 0.0.0.0/0 0.0.0.0/0 [goto]
FWDO_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19726\" ip netns exec fwd-test-21916     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t raw -L PREROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19726" ip netns exec fwd-test-21916     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t raw -L PREROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PREROUTING_direct all -- 0.0.0.0/0 0.0.0.0/0
PREROUTING_ZONES all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19726\" ip netns exec fwd-test-21916     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t raw -L PREROUTING_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19726" ip netns exec fwd-test-21916     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t raw -L PREROUTING_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_work all -- 1.2.3.0/24 0.0.0.0/0 [goto]
PREROUTING_ZONES_IFACES all -- 0.0.0.0/0 0.0.0.0/0 [goto]
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19726\" ip netns exec fwd-test-21916     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t raw -L PREROUTING_ZONES_IFACES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19726" ip netns exec fwd-test-21916     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t raw -L PREROUTING_ZONES_IFACES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
PRE_work all -- 0.0.0.0/0 0.0.0.0/0 [goto]
PRE_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19726\" ip netns exec fwd-test-21916     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t mangle -L PREROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19726" ip netns exec fwd-test-21916     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t mangle -L PREROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PREROUTING_direct all -- 0.0.0.0/0 0.0.0.0/0
PREROUTING_ZONES all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19726\" ip netns exec fwd-test-21916     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t mangle -L PREROUTING_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19726" ip netns exec fwd-test-21916     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t mangle -L PREROUTING_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_work all -- 1.2.3.0/24 0.0.0.0/0 [goto]
PREROUTING_ZONES_IFACES all -- 0.0.0.0/0 0.0.0.0/0 [goto]
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19726\" ip netns exec fwd-test-21916     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t mangle -L PREROUTING_ZONES_IFACES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19726" ip netns exec fwd-test-21916     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t mangle -L PREROUTING_ZONES_IFACES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
PRE_work all -- 0.0.0.0/0 0.0.0.0/0 [goto]
PRE_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19726\" ip netns exec fwd-test-21916     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t nat -L PREROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19726" ip netns exec fwd-test-21916     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t nat -L PREROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PREROUTING_direct all -- 0.0.0.0/0 0.0.0.0/0
PREROUTING_ZONES all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19726\" ip netns exec fwd-test-21916     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t nat -L PREROUTING_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19726" ip netns exec fwd-test-21916     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t nat -L PREROUTING_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_work all -- 1.2.3.0/24 0.0.0.0/0 [goto]
PREROUTING_ZONES_IFACES all -- 0.0.0.0/0 0.0.0.0/0 [goto]
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19726\" ip netns exec fwd-test-21916     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t nat -L PREROUTING_ZONES_IFACES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19726" ip netns exec fwd-test-21916     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t nat -L PREROUTING_ZONES_IFACES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "PRE_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
PRE_work all -- 0.0.0.0/0 0.0.0.0/0 [goto]
PRE_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19726\" ip netns exec fwd-test-21916     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t nat -L POSTROUTING; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19726" ip netns exec fwd-test-21916     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t nat -L POSTROUTING; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POSTROUTING_direct all -- 0.0.0.0/0 0.0.0.0/0
POSTROUTING_ZONES all -- 0.0.0.0/0 0.0.0.0/0
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19726\" ip netns exec fwd-test-21916     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t nat -L POSTROUTING_ZONES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19726" ip netns exec fwd-test-21916     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t nat -L POSTROUTING_ZONES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_work all -- 0.0.0.0/0 1.2.3.0/24 [goto]
POSTROUTING_ZONES_IFACES all -- 0.0.0.0/0 0.0.0.0/0 [goto]
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }











    { set +x
$as_echo "$at_srcdir/gh258.at:12:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-19726\" ip netns exec fwd-test-21916     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t nat -L POSTROUTING_ZONES_IFACES; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "gh258.at:12"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-19726" ip netns exec fwd-test-21916     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t nat -L POSTROUTING_ZONES_IFACES; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "POST_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
POST_work all -- 0.0.0.0/0 0.0.0.0/0 [goto]
POST_public all -- 0.0.0.0/0 0.0.0.0/0 [goto]
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/gh258.at:12"
$at_failed && at_fn_log_failure
$at_traceon; }




































































































































































































            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "gh258.at:445" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh258.at:445"
            $as_echo "gh258.at:445" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/gh258.at:445"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_132
#AT_START_133
at_fn_group_banner 133 'rhbz1715977.at:1' \
  "rich rule destination with service destination" " " 8
at_xfail=no
(
  $as_echo "133. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rhbz1715977.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rhbz1715977.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1715977.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rhbz1715977.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-5825" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rhbz1715977.at:1: ip netns add fwd-test-5825"
at_fn_check_prepare_trace "rhbz1715977.at:1"
( $at_check_trace; ip netns add fwd-test-5825
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10051" ip netns exec fwd-test-5825 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-10051" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rhbz1715977.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1715977.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10051" ip netns exec fwd-test-5825 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rhbz1715977.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rhbz1715977.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10051" ip netns exec fwd-test-5825 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rhbz1715977.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1715977.at:1"








    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:4:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10051\" ip netns exec fwd-test-5825 firewall-cmd -q --permanent --zone=internal --add-interface=foobar0 "
at_fn_check_prepare_trace "rhbz1715977.at:4"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10051" ip netns exec fwd-test-5825 firewall-cmd -q --permanent --zone=internal --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10051\" ip netns exec fwd-test-5825 firewall-cmd -q --permanent --zone=internal --add-rich-rule='rule family=ipv4 destination address=\"192.168.122.235/32\" service name=\"ssh\" accept' "
at_fn_check_prepare_trace "rhbz1715977.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10051" ip netns exec fwd-test-5825 firewall-cmd -q --permanent --zone=internal --add-rich-rule='rule family=ipv4 destination address="192.168.122.235/32" service name="ssh" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10051\" ip netns exec fwd-test-5825 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1715977.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10051" ip netns exec fwd-test-5825 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10051\" ip netns exec fwd-test-5825 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1715977.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10051" ip netns exec fwd-test-5825 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:8:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10051\" ip netns exec fwd-test-5825 firewall-cmd -q --zone=internal --add-rich-rule='rule family=ipv4 destination address=\"192.168.122.235/32\" service name=\"mdns\" accept' "
at_fn_check_prepare_trace "rhbz1715977.at:8"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10051" ip netns exec fwd-test-5825 firewall-cmd -q --zone=internal --add-rich-rule='rule family=ipv4 destination address="192.168.122.235/32" service name="mdns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rhbz1715977.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:9:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10051\" ip netns exec fwd-test-5825 firewall-cmd -q --permanent --zone=internal --add-rich-rule='rule family=ipv4 destination address=\"192.168.122.235/32\" service name=\"mdns\" accept' "
at_fn_check_prepare_trace "rhbz1715977.at:9"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10051" ip netns exec fwd-test-5825 firewall-cmd -q --permanent --zone=internal --add-rich-rule='rule family=ipv4 destination address="192.168.122.235/32" service name="mdns" accept'
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rhbz1715977.at:9"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10051\" ip netns exec fwd-test-5825 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rhbz1715977.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10051" ip netns exec fwd-test-5825 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 122 $at_status "$at_srcdir/rhbz1715977.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rhbz1715977.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-10051\" ip netns exec fwd-test-5825 firewall-cmd -q --state "
at_fn_check_prepare_trace "rhbz1715977.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-10051" ip netns exec fwd-test-5825 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 251 $at_status "$at_srcdir/rhbz1715977.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }












            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/ERROR: INVALID_RULE: Destination conflict with service/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_RULE: Destination conflict with service/d'"; then
                sed -i -e '/ERROR: INVALID_RULE: Destination conflict with service/d' ./firewalld.log
            fi
            $as_echo "rhbz1715977.at:12" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1715977.at:12"
            $as_echo "rhbz1715977.at:12" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rhbz1715977.at:12"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_133
#AT_START_134
at_fn_group_banner 134 'python.at:3' \
  "firewalld_test.py" "                              " 9
at_xfail=no
(
  $as_echo "134. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/python.at:3: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:3"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/python.at:3: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "python.at:3"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/python.at:3: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:3"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/python.at:3: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:3"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-7808" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/python.at:3: ip netns add fwd-test-7808"
at_fn_check_prepare_trace "python.at:3"
( $at_check_trace; ip netns add fwd-test-7808
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:3"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5773" ip netns exec fwd-test-7808 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-5773" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "python.at:3" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:3"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5773" ip netns exec fwd-test-7808 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "python.at:3" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:3"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5773" ip netns exec fwd-test-7808 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "python.at:3" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:3"





    { set +x
$as_echo "$at_srcdir/python.at:5:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-5773\" ip netns exec fwd-test-7808 \$PYTHON \${srcdir}/python/firewalld_test.py "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:5"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-5773" ip netns exec fwd-test-7808 $PYTHON ${srcdir}/python/firewalld_test.py
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/python.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }








            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"ignore" != x"ignore"; then
            if test -n "ignore"; then
                sed -i ignore ./firewalld.log
            fi
            $as_echo "python.at:6" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:6"
            $as_echo "python.at:6" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:6"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_134
#AT_START_135
at_fn_group_banner 135 'python.at:8' \
  "firewalld_config.py" "                            " 9
at_xfail=no
(
  $as_echo "135. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/python.at:8: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:8"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/python.at:8: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "python.at:8"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/python.at:8: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:8"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/python.at:8: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:8"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-4787" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/python.at:8: ip netns add fwd-test-4787"
at_fn_check_prepare_trace "python.at:8"
( $at_check_trace; ip netns add fwd-test-4787
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:8"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27571" ip netns exec fwd-test-4787 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-27571" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "python.at:8" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:8"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27571" ip netns exec fwd-test-4787 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "python.at:8" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:8"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27571" ip netns exec fwd-test-4787 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "python.at:8" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:8"





    { set +x
$as_echo "$at_srcdir/python.at:10:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27571\" ip netns exec fwd-test-4787 \$PYTHON \${srcdir}/python/firewalld_config.py "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:10"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27571" ip netns exec fwd-test-4787 $PYTHON ${srcdir}/python/firewalld_config.py
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/python.at:10"
$at_failed && at_fn_log_failure
$at_traceon; }








            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"ignore" != x"ignore"; then
            if test -n "ignore"; then
                sed -i ignore ./firewalld.log
            fi
            $as_echo "python.at:11" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:11"
            $as_echo "python.at:11" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:11"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_135
#AT_START_136
at_fn_group_banner 136 'python.at:13' \
  "firewalld_rich.py" "                              " 9
at_xfail=no
(
  $as_echo "136. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/python.at:13: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:13"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/python.at:13: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "python.at:13"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/python.at:13: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:13"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/python.at:13: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:13"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-1896" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/python.at:13: ip netns add fwd-test-1896"
at_fn_check_prepare_trace "python.at:13"
( $at_check_trace; ip netns add fwd-test-1896
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:13"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-778" ip netns exec fwd-test-1896 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-778" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "python.at:13" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:13"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-778" ip netns exec fwd-test-1896 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "python.at:13" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:13"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-778" ip netns exec fwd-test-1896 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "python.at:13" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:13"





    { set +x
$as_echo "$at_srcdir/python.at:15:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-778\" ip netns exec fwd-test-1896 \$PYTHON \${srcdir}/python/firewalld_rich.py "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:15"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-778" ip netns exec fwd-test-1896 $PYTHON ${srcdir}/python/firewalld_rich.py
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/python.at:15"
$at_failed && at_fn_log_failure
$at_traceon; }








            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"ignore" != x"ignore"; then
            if test -n "ignore"; then
                sed -i ignore ./firewalld.log
            fi
            $as_echo "python.at:16" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:16"
            $as_echo "python.at:16" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:16"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_136
#AT_START_137
at_fn_group_banner 137 'python.at:18' \
  "firewalld_direct.py" "                            " 9
at_xfail=no
(
  $as_echo "137. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/python.at:18: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:18"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/python.at:18: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "python.at:18"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/python.at:18: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:18"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/python.at:18: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "python.at:18"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-26849" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/python.at:18: ip netns add fwd-test-26849"
at_fn_check_prepare_trace "python.at:18"
( $at_check_trace; ip netns add fwd-test-26849
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/python.at:18"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9241" ip netns exec fwd-test-26849 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-9241" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "python.at:18" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:18"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9241" ip netns exec fwd-test-26849 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "python.at:18" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/python.at:18"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9241" ip netns exec fwd-test-26849 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "python.at:18" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:18"





    { set +x
$as_echo "$at_srcdir/python.at:20:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-9241\" ip netns exec fwd-test-26849 \$PYTHON \${srcdir}/python/firewalld_direct.py "
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "python.at:20"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-9241" ip netns exec fwd-test-26849 $PYTHON ${srcdir}/python/firewalld_direct.py
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/python.at:20"
$at_failed && at_fn_log_failure
$at_traceon; }








            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"ignore" != x"ignore"; then
            if test -n "ignore"; then
                sed -i ignore ./firewalld.log
            fi
            $as_echo "python.at:21" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:21"
            $as_echo "python.at:21" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/python.at:21"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_137
#AT_START_138
at_fn_group_banner 138 'rfc3964_ipv4.at:1' \
  "RFC3964_IPv4" "                                   " 10
at_xfail=no
(
  $as_echo "138. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "rfc3964_ipv4.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "rfc3964_ipv4.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-13823" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:1: ip netns add fwd-test-13823"
at_fn_check_prepare_trace "rfc3964_ipv4.at:1"
( $at_check_trace; ip netns add fwd-test-13823
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26589" ip netns exec fwd-test-13823 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-26589" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "rfc3964_ipv4.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rfc3964_ipv4.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26589" ip netns exec fwd-test-13823 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "rfc3964_ipv4.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/rfc3964_ipv4.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26589" ip netns exec fwd-test-13823 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "rfc3964_ipv4.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/rfc3964_ipv4.at:1"





{ set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:4: sed -i 's/^LogDenied.*/LogDenied=all/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:4"
( $at_check_trace; sed -i 's/^LogDenied.*/LogDenied=all/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:5: sed -i 's/^RFC3964_IPv4.*/RFC3964_IPv4=yes/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:5"
( $at_check_trace; sed -i 's/^RFC3964_IPv4.*/RFC3964_IPv4=yes/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26589\" ip netns exec fwd-test-13823 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rfc3964_ipv4.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26589" ip netns exec fwd-test-13823 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:6:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26589\" ip netns exec fwd-test-13823 firewall-cmd -q --state "
at_fn_check_prepare_trace "rfc3964_ipv4.at:6"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26589" ip netns exec fwd-test-13823 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:6"
$at_failed && at_fn_log_failure
$at_traceon; }








































{ set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:70: sed -i 's/^RFC3964_IPv4.*/RFC3964_IPv4=no/' ./firewalld.conf"
at_fn_check_prepare_trace "rfc3964_ipv4.at:70"
( $at_check_trace; sed -i 's/^RFC3964_IPv4.*/RFC3964_IPv4=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:70"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26589\" ip netns exec fwd-test-13823 firewall-cmd -q --reload "
at_fn_check_prepare_trace "rfc3964_ipv4.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26589" ip netns exec fwd-test-13823 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/rfc3964_ipv4.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-26589\" ip netns exec fwd-test-13823 firewall-cmd -q --state "
at_fn_check_prepare_trace "rfc3964_ipv4.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-26589" ip netns exec fwd-test-13823 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/rfc3964_ipv4.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }















































            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"" != x"ignore"; then
            if test -n ""; then
                sed -i  ./firewalld.log
            fi
            $as_echo "rfc3964_ipv4.at:113" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rfc3964_ipv4.at:113"
            $as_echo "rfc3964_ipv4.at:113" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/rfc3964_ipv4.at:113"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_138
#AT_START_139
at_fn_group_banner 139 'service_include.at:1' \
  "service include" "                                " 10
at_xfail=no
(
  $as_echo "139. $at_setup_line: testing $at_desc ..."
  $at_traceon


            LC_ALL="C.UTF-8"
    export LC_ALL
    LANGUAGE="C.UTF-8"
    export LANGUAGE

        if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        { set +x
$as_echo "$at_srcdir/service_include.at:1: if ! cp \"\${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf\" ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_notrace 'a ${...} parameter expansion' "service_include.at:1"
( $at_check_trace; if ! cp "${FIREWALLD_DEFAULT_CONFIG}/firewalld.conf" ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    else
        { set +x
$as_echo "$at_srcdir/service_include.at:1: if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi"
at_fn_check_prepare_trace "service_include.at:1"
( $at_check_trace; if ! cp /etc/firewalld/firewalld.conf ./firewalld.conf; then exit 77; fi
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

    fi






                { set +x
$as_echo "$at_srcdir/service_include.at:1: sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf"
at_fn_check_prepare_trace "service_include.at:1"
( $at_check_trace; sed -i 's/^CleanupOnExit.*/CleanupOnExit=no/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }


                { set +x
$as_echo "$at_srcdir/service_include.at:1: sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf"
at_fn_check_prepare_trace "service_include.at:1"
( $at_check_trace; sed -i 's/^FirewallBackend.*/FirewallBackend=iptables/' ./firewalld.conf
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }




                function kill_firewalld() {

    pid=$(< firewalld.pid)
    kill $pid
    for I in 1 2 3 4 5 6 7 8 9 0; do
        ps --pid $pid >/dev/null || { pid=0; break; }
        sleep 1
    done
    test $pid -eq 0 || { kill -9 $pid; sleep 3; }

        }

                echo "" > cleanup
        trap ". ./cleanup; kill_firewalld" EXIT



        echo "ip netns delete fwd-test-6240" >> ./cleanup
        { set +x
$as_echo "$at_srcdir/service_include.at:1: ip netns add fwd-test-6240"
at_fn_check_prepare_trace "service_include.at:1"
( $at_check_trace; ip netns add fwd-test-6240
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:1"
$at_failed && at_fn_log_failure
$at_traceon; }

        cat >./dbus.conf <<'_ATEOF'

            <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN"
            "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
            <busconfig>
            <fork />
            <auth>EXTERNAL</auth>
            <listen>unix:path=/tmp/dummy</listen>
            <policy context="default">
                <allow user="*"/>
                <allow send_type="signal"/>
                <allow send_requested_reply="true" send_type="method_return"/>
                <allow send_requested_reply="true" send_type="error"/>
                <allow receive_type="method_call"/>
                <allow receive_type="method_return"/>
                <allow receive_type="error"/>
                <allow receive_type="signal"/>
                <allow send_destination="org.freedesktop.DBus"/>
            </policy>
            <!-- from .../config/FirewallD.conf -->
            <policy user="root">
                <allow own="org.fedoraproject.FirewallD1"/>
                <allow own="org.fedoraproject.FirewallD1.config"/>
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            <policy context="default">
                <allow send_destination="org.fedoraproject.FirewallD1"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Introspectable"/>
                <allow send_destination="org.fedoraproject.FirewallD1"
                       send_interface="org.freedesktop.DBus.Properties"/>
                <allow send_destination="org.fedoraproject.FirewallD1.config"/>
            </policy>
            </busconfig>
_ATEOF

        DBUS_PID=`    env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27977" ip netns exec fwd-test-6240 dbus-daemon --address="unix:abstract=firewalld-testsuite-dbus-system-socket-27977" --print-pid --config-file="./dbus.conf" `
        if test $? -ne 0; then
            $as_echo "service_include.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/service_include.at:1"
        fi
        echo "kill $DBUS_PID" >> ./cleanup


    FIREWALLD_ARGS="--nofork --nopid --log-file ./firewalld.log --system-config ./"
        case "${TESTSUITEFLAGS}" in
        *-d*|*--debug*) FIREWALLD_ARGS="--debug=3 ${FIREWALLD_ARGS}";;
        *) :;;
    esac
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALLD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

        env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27977" ip netns exec fwd-test-6240 firewalld $FIREWALLD_ARGS &
    if test $? -ne 0; then
        $as_echo "service_include.at:1" >"$at_check_line_file"
at_fn_check_skip 99 "$at_srcdir/service_include.at:1"
    fi
    echo "$!" > firewalld.pid

        up=0
    for I in 1 2 3 4 5 6 7 8 9 0; do
        if     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27977" ip netns exec fwd-test-6240 firewall-cmd --state ; then
            up=1
            break
        fi
        sleep 1
    done
    $as_echo "service_include.at:1" >"$at_check_line_file"
(test $up -ne 1) \
  && at_fn_check_skip 99 "$at_srcdir/service_include.at:1"





{ set +x
$as_echo "$at_srcdir/service_include.at:4: mkdir -p ./services"
at_fn_check_prepare_trace "service_include.at:4"
( $at_check_trace; mkdir -p ./services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:4"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/service_include.at:5: cat <<HERE > ./services/my-service-with-include.xml
<?xml version=\"1.0\" encoding=\"utf-8\"?>
<service>
  <short>my-service-with-include</short>
  <description>This service includes other services</description>
  <port protocol=\"tcp\" port=\"12345\"/>
  <include service=\"ssdp\"/>
  <include service=\"mdns\"/>
  <include service=\"recursive-service\"/>
</service>
HERE
"
at_fn_check_prepare_notrace 'an embedded newline' "service_include.at:5"
( $at_check_trace; cat <<HERE > ./services/my-service-with-include.xml
<?xml version="1.0" encoding="utf-8"?>
<service>
  <short>my-service-with-include</short>
  <description>This service includes other services</description>
  <port protocol="tcp" port="12345"/>
  <include service="ssdp"/>
  <include service="mdns"/>
  <include service="recursive-service"/>
</service>
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:5"
$at_failed && at_fn_log_failure
$at_traceon; }

{ set +x
$as_echo "$at_srcdir/service_include.at:17: cat <<HERE > ./services/recursive-service.xml
<?xml version=\"1.0\" encoding=\"utf-8\"?>
<service>
  <short>recursive-service</short>
  <description>Include a service that included us</description>
  <include service=\"my-service-with-include\"/>
</service>
HERE
"
at_fn_check_prepare_notrace 'an embedded newline' "service_include.at:17"
( $at_check_trace; cat <<HERE > ./services/recursive-service.xml
<?xml version="1.0" encoding="utf-8"?>
<service>
  <short>recursive-service</short>
  <description>Include a service that included us</description>
  <include service="my-service-with-include"/>
</service>
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:17"
$at_failed && at_fn_log_failure
$at_traceon; }





    { set +x
$as_echo "$at_srcdir/service_include.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27977\" ip netns exec fwd-test-6240 firewall-cmd -q --reload "
at_fn_check_prepare_trace "service_include.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27977" ip netns exec fwd-test-6240 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:26:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27977\" ip netns exec fwd-test-6240 firewall-cmd -q --state "
at_fn_check_prepare_trace "service_include.at:26"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27977" ip netns exec fwd-test-6240 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:26"
$at_failed && at_fn_log_failure
$at_traceon; }









    { set +x
$as_echo "$at_srcdir/service_include.at:28:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27977\" ip netns exec fwd-test-6240 firewall-cmd -q --zone=drop --add-interface=foobar0 "
at_fn_check_prepare_trace "service_include.at:28"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27977" ip netns exec fwd-test-6240 firewall-cmd -q --zone=drop --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:28"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:29:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27977\" ip netns exec fwd-test-6240 firewall-cmd -q --zone=drop --add-service=my-service-with-include "
at_fn_check_prepare_trace "service_include.at:29"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27977" ip netns exec fwd-test-6240 firewall-cmd -q --zone=drop --add-service=my-service-with-include
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:29"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:30:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27977\" ip netns exec fwd-test-6240 firewall-cmd --zone=drop --list-services "
at_fn_check_prepare_trace "service_include.at:30"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27977" ip netns exec fwd-test-6240 firewall-cmd --zone=drop --list-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "my-service-with-include
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:30"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/service_include.at:35:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27977\" ip netns exec fwd-test-6240 firewall-cmd -q --zone=drop --add-service=recursive-service "
at_fn_check_prepare_trace "service_include.at:35"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27977" ip netns exec fwd-test-6240 firewall-cmd -q --zone=drop --add-service=recursive-service
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:35"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:36:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27977\" ip netns exec fwd-test-6240 firewall-cmd -q --zone=drop --remove-service=recursive-service "
at_fn_check_prepare_trace "service_include.at:36"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27977" ip netns exec fwd-test-6240 firewall-cmd -q --zone=drop --remove-service=recursive-service
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:36"
$at_failed && at_fn_log_failure
$at_traceon; }













    { set +x
$as_echo "$at_srcdir/service_include.at:49:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27977\" ip netns exec fwd-test-6240     sh <<-\"HERE\"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_drop_allow; echo \$? >&3; } |     sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit \$RC; } } 4>&1
HERE
 "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_include.at:49"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27977" ip netns exec fwd-test-6240     sh <<-"HERE"
    { { { { /usr/sbin/iptables -w -n -t filter -L IN_drop_allow; echo $? >&3; } |     sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; } |     tail -n +3  >&4; } 3>&1; } | { read RC; exit $RC; } } 4>&1
HERE

) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "ACCEPT udp -- 0.0.0.0/0 239.255.255.250 udp dpt:1900 ctstate NEW,UNTRACKED
ACCEPT udp -- 0.0.0.0/0 224.0.0.251 udp dpt:5353 ctstate NEW,UNTRACKED
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:12345 ctstate NEW,UNTRACKED
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:49"
$at_failed && at_fn_log_failure
$at_traceon; }



















    { set +x
$as_echo "$at_srcdir/service_include.at:61:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27977\" ip netns exec fwd-test-6240 firewall-cmd --permanent --service=my-service-with-include --query-include=recursive-service "
at_fn_check_prepare_trace "service_include.at:61"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27977" ip netns exec fwd-test-6240 firewall-cmd --permanent --service=my-service-with-include --query-include=recursive-service
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:61"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:62:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27977\" ip netns exec fwd-test-6240 firewall-cmd -q --permanent --service=my-service-with-include --add-include=ssh "
at_fn_check_prepare_trace "service_include.at:62"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27977" ip netns exec fwd-test-6240 firewall-cmd -q --permanent --service=my-service-with-include --add-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:62"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:63:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27977\" ip netns exec fwd-test-6240 firewall-cmd --permanent --service=my-service-with-include --query-include=ssh "
at_fn_check_prepare_trace "service_include.at:63"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27977" ip netns exec fwd-test-6240 firewall-cmd --permanent --service=my-service-with-include --query-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:63"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/service_include.at:64: grep '<include service=\"ssh\"/>' ./services/my-service-with-include.xml "
at_fn_check_prepare_trace "service_include.at:64"
( $at_check_trace; grep '<include service="ssh"/>' ./services/my-service-with-include.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:64"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/service_include.at:65:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27977\" ip netns exec fwd-test-6240 firewall-cmd -q --permanent --service=my-service-with-include --remove-include=ssh "
at_fn_check_prepare_trace "service_include.at:65"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27977" ip netns exec fwd-test-6240 firewall-cmd -q --permanent --service=my-service-with-include --remove-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:65"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:66:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27977\" ip netns exec fwd-test-6240 firewall-cmd --permanent --service=my-service-with-include --query-include=ssh "
at_fn_check_prepare_trace "service_include.at:66"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27977" ip netns exec fwd-test-6240 firewall-cmd --permanent --service=my-service-with-include --query-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service_include.at:66"
$at_failed && at_fn_log_failure
$at_traceon; }




{ set +x
$as_echo "$at_srcdir/service_include.at:67: grep '<include service=\"ssh\"/>' ./services/my-service-with-include.xml "
at_fn_check_prepare_trace "service_include.at:67"
( $at_check_trace; grep '<include service="ssh"/>' ./services/my-service-with-include.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service_include.at:67"
$at_failed && at_fn_log_failure
$at_traceon; }




    { set +x
$as_echo "$at_srcdir/service_include.at:68:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27977\" ip netns exec fwd-test-6240 firewall-cmd --permanent --service=my-service-with-include --get-includes "
at_fn_check_prepare_trace "service_include.at:68"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27977" ip netns exec fwd-test-6240 firewall-cmd --permanent --service=my-service-with-include --get-includes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "mdns recursive-service ssdp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:68"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:71:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27977\" ip netns exec fwd-test-6240 firewall-cmd --permanent --info-service=my-service-with-include | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_include.at:71"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27977" ip netns exec fwd-test-6240 firewall-cmd --permanent --info-service=my-service-with-include | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "my-service-with-include
ports: 12345/tcp
protocols:
source-ports:
modules:
destination:
includes: mdns recursive-service ssdp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:71"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:80:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27977\" ip netns exec fwd-test-6240 firewall-cmd --info-service=my-service-with-include | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; } "
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_include.at:80"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27977" ip netns exec fwd-test-6240 firewall-cmd --info-service=my-service-with-include | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "my-service-with-include
ports: 12345/tcp
protocols:
source-ports:
modules:
destination:
includes: mdns recursive-service ssdp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:80"
$at_failed && at_fn_log_failure
$at_traceon; }






    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:91: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=recursive-service"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=recursive-service" "service_include.at:91"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=recursive-service
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:91"
$at_failed && at_fn_log_failure
$at_traceon; }



    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:92: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --add-include=ssh"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --add-include=ssh" "service_include.at:92"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --add-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:92"
$at_failed && at_fn_log_failure
$at_traceon; }



    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:93: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh" "service_include.at:93"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:93"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/service_include.at:94: grep '<include service=\"ssh\"/>' ./services/my-service-with-include.xml "
at_fn_check_prepare_trace "service_include.at:94"
( $at_check_trace; grep '<include service="ssh"/>' ./services/my-service-with-include.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:94"
$at_failed && at_fn_log_failure
$at_traceon; }


    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:95: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --remove-include=ssh"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --remove-include=ssh" "service_include.at:95"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS -q --service=my-service-with-include --remove-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:95"
$at_failed && at_fn_log_failure
$at_traceon; }



    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:96: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh" "service_include.at:96"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --query-include=ssh
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service_include.at:96"
$at_failed && at_fn_log_failure
$at_traceon; }


{ set +x
$as_echo "$at_srcdir/service_include.at:97: grep '<include service=\"ssh\"/>' ./services/my-service-with-include.xml "
at_fn_check_prepare_trace "service_include.at:97"
( $at_check_trace; grep '<include service="ssh"/>' ./services/my-service-with-include.xml
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 1 $at_status "$at_srcdir/service_include.at:97"
$at_failed && at_fn_log_failure
$at_traceon; }


    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:98: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --get-includes"
at_fn_check_prepare_dynamic "firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --get-includes" "service_include.at:98"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --service=my-service-with-include --get-includes
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "mdns recursive-service ssdp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:98"
$at_failed && at_fn_log_failure
$at_traceon; }



    FIREWALL_OFFLINE_CMD_ARGS="--system-config ./"
    if test "x${FIREWALLD_DEFAULT_CONFIG}" != x ; then
        FIREWALL_OFFLINE_CMD_ARGS+=" --default-config ${FIREWALLD_DEFAULT_CONFIG}"
    fi

    { set +x
$as_echo "$at_srcdir/service_include.at:101: firewall-offline-cmd \$FIREWALL_OFFLINE_CMD_ARGS --info-service=my-service-with-include | sed -e 's/^[ \\t]*//' -e 's/[ \\t]*\$//' | sed -e '/^[ \\t]*\$/d' | sed -e 's/[ \\t]\\+/ /g' | { printf \"%s\" \"\$(cat /dev/stdin)\"; echo; }"
at_fn_check_prepare_notrace 'a $(...) command substitution' "service_include.at:101"
( $at_check_trace; firewall-offline-cmd $FIREWALL_OFFLINE_CMD_ARGS --info-service=my-service-with-include | sed -e 's/^[ \t]*//' -e 's/[ \t]*$//' | sed -e '/^[ \t]*$/d' | sed -e 's/[ \t]\+/ /g' | { printf "%s" "$(cat /dev/stdin)"; echo; }
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "my-service-with-include
ports: 12345/tcp
protocols:
source-ports:
modules:
destination:
includes: mdns recursive-service ssdp
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:101"
$at_failed && at_fn_log_failure
$at_traceon; }






    { set +x
$as_echo "$at_srcdir/service_include.at:112:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27977\" ip netns exec fwd-test-6240 firewall-cmd -q --permanent --zone=drop --add-interface=foobar0 "
at_fn_check_prepare_trace "service_include.at:112"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27977" ip netns exec fwd-test-6240 firewall-cmd -q --permanent --zone=drop --add-interface=foobar0
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:112"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:113:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27977\" ip netns exec fwd-test-6240 firewall-cmd -q --permanent --zone=drop --add-service=my-service-with-include "
at_fn_check_prepare_trace "service_include.at:113"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27977" ip netns exec fwd-test-6240 firewall-cmd -q --permanent --zone=drop --add-service=my-service-with-include
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:113"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:114:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27977\" ip netns exec fwd-test-6240 firewall-cmd -q --permanent --service=my-service-with-include --add-include=does-not-exist "
at_fn_check_prepare_trace "service_include.at:114"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27977" ip netns exec fwd-test-6240 firewall-cmd -q --permanent --service=my-service-with-include --add-include=does-not-exist
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:114"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/service_include.at:115:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27977\" ip netns exec fwd-test-6240 firewall-cmd -q --reload "
at_fn_check_prepare_trace "service_include.at:115"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27977" ip netns exec fwd-test-6240 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
echo stderr:; cat "$at_stderr"
echo stdout:; cat "$at_stdout"
at_fn_check_status 101 $at_status "$at_srcdir/service_include.at:115"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:115:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27977\" ip netns exec fwd-test-6240 firewall-cmd -q --state "
at_fn_check_prepare_trace "service_include.at:115"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27977" ip netns exec fwd-test-6240 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 251 $at_status "$at_srcdir/service_include.at:115"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/service_include.at:116:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27977\" ip netns exec fwd-test-6240 firewall-cmd --zone=drop --list-services "
at_fn_check_prepare_trace "service_include.at:116"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27977" ip netns exec fwd-test-6240 firewall-cmd --zone=drop --list-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:116"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:119:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27977\" ip netns exec fwd-test-6240 firewall-cmd --zone=public --list-services "
at_fn_check_prepare_trace "service_include.at:119"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27977" ip netns exec fwd-test-6240 firewall-cmd --zone=public --list-services
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
echo >>"$at_stdout"; $as_echo "dhcpv6-client ssh
" | \
  $at_diff - "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:119"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:122:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27977\" ip netns exec fwd-test-6240 firewall-cmd -q --permanent --service=my-service-with-include --remove-include=does-not-exist "
at_fn_check_prepare_trace "service_include.at:122"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27977" ip netns exec fwd-test-6240 firewall-cmd -q --permanent --service=my-service-with-include --remove-include=does-not-exist
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:122"
$at_failed && at_fn_log_failure
$at_traceon; }








    { set +x
$as_echo "$at_srcdir/service_include.at:123:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27977\" ip netns exec fwd-test-6240 firewall-cmd -q --reload "
at_fn_check_prepare_trace "service_include.at:123"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27977" ip netns exec fwd-test-6240 firewall-cmd -q --reload
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:123"
$at_failed && at_fn_log_failure
$at_traceon; }







    { set +x
$as_echo "$at_srcdir/service_include.at:123:     env DBUS_SYSTEM_BUS_ADDRESS=\"unix:abstract=firewalld-testsuite-dbus-system-socket-27977\" ip netns exec fwd-test-6240 firewall-cmd -q --state "
at_fn_check_prepare_trace "service_include.at:123"
( $at_check_trace;     env DBUS_SYSTEM_BUS_ADDRESS="unix:abstract=firewalld-testsuite-dbus-system-socket-27977" ip netns exec fwd-test-6240 firewall-cmd -q --state
) >>"$at_stdout" 2>>"$at_stderr" 5>&-
at_status=$? at_failed=false
$at_check_filter
at_fn_diff_devnull "$at_stderr" || at_failed=:
at_fn_diff_devnull "$at_stdout" || at_failed=:
at_fn_check_status 0 $at_status "$at_srcdir/service_include.at:123"
$at_failed && at_fn_log_failure
$at_traceon; }












            sed -i "/WARNING: ip6tables not usable, disabling IPv6 firewall/d" ./firewalld.log



        if test x"-e '/ERROR: INVALID_SERVICE: does-not-exist/d'" != x"ignore"; then
            if test -n "-e '/ERROR: INVALID_SERVICE: does-not-exist/d'"; then
                sed -i -e '/ERROR: INVALID_SERVICE: does-not-exist/d' ./firewalld.log
            fi
            $as_echo "service_include.at:125" >"$at_check_line_file"
(grep ERROR ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/service_include.at:125"
            $as_echo "service_include.at:125" >"$at_check_line_file"
(grep WARNING ./firewalld.log) \
  && at_fn_check_skip 99 "$at_srcdir/service_include.at:125"
        fi



      set +x
  $at_times_p && times >"$at_times_file"
) 5>&1 2>&1 7>&- | eval $at_tee_pipe
read at_status <"$at_status_file"
#AT_STOP_139
