Eric Garver

Results 181 comments of Eric Garver

Hrm. I'm not seeing this on my Sid VM. root@debian-49155:~# uname -a Linux debian-49155 6.9.12-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.9.12-1 (2024-07-27) x86_64 GNU/Linux

What exact kernel version did you see this on?

Can't reproduce with 6.1.99 either. ``` # make check TESTSUITEFLAGS="-k rpfilter -j8" [..] ## --------------------------- ## ## firewalld 2.2.0 test suite. ## ## --------------------------- ## 58: rpfilter - strict ok...

🤷 ``` root@debian-49153:~# /usr/share/firewalld/testsuite/testsuite -j8 -k rpfilter ## --------------------------- ## ## firewalld 2.2.1 test suite. ## ## --------------------------- ## 58: rpfilter - strict ok 60: rpfilter - strict-forward ok 59:...

I don't understand why it's failing in your environment. ``` [..] /bin/bash './testsuite' -k RHEL-17002 \ AUTOTEST_PATH="src" \ PYTHONPATH="/root/firewalld/src:" \ FIREWALLD_DEFAULT_CONFIG="/root/firewalld/config" ## ----------------------------- ## ## firewalld 2.2.999 test suite. ##...

These errors are weird: ``` +/tmp/testsuite.dir/at-groups/224/test-source: line 408: printf: write error: Broken pipe +/tmp/testsuite.dir/at-groups/224/test-source: line 408: echo: write error: Broken pipe ``` That implies that the pipe to stdout is...

I saw this in CI for a new PR. So maybe I'll be able to debug it now. https://github.com/firewalld/firewalld/actions/runs/14803563908/job/41567608976?pr=1477

My only guess is that the `| head -n 2` means that `head` will terminate before all the data on the pipe is consumed. Thus the previous commands in the...

@mbiebl, I think I fixed it. You can try this patch to verify: https://github.com/firewalld/firewalld/pull/1477/commits/905151be21031ed3b198b7c47d597c8566f7a727 I will optimistically merge this patch given it passed CI that was previously failing. If you're...

Do you expect 80/443 to be exposed/allowed by default? Most firewalls, firewalld included, follow the "deny by default" policy. That means you have to explicitly allow things. You can allow...