minix/tests/ipf/expected/ip1
Lionel Sambuc 11be35a165 Importing NetBSD "Kyua" test framework
To do so, a few dependencies have been imported:

 * external/bsd/lutok
 * external/mit/lua
 * external/public-domain/sqlite
 * external/public-domain/xz

The Kyua framework is the new generation of ATF (Automated Test
Framework), it is composed of:

 * external/bsd/atf
 * external/bsd/kyua-atf-compat
 * external/bsd/kyua-cli
 * external/bsd/kyua-tester
 * tests

Kyua/ATF being written in C++, it depends on libstdc++ which is
provided by GCC. As this is not part of the sources, Kyua is only
compiled when the native GCC utils are installed.

To install Kyua do the following:

 * In a cross-build enviromnent, add the following to the build.sh
   commandline: -V MKBINUTILS=yes -V MKGCCCMDS=yes

WARNING:
  At this point the import is still experimental, and not supported
  on native builds (a.k.a make build).

Change-Id: I26aee23c5bbd2d64adcb7c1beb98fe0d479d7ada
2013-07-23 20:43:41 +02:00

69 lines
2.8 KiB
Plaintext

table role=ipf type=tree number=1
{; };
table role=ipf type=tree number=100
{ 1.2.3.4/32; ! 2.2.0.0/16; 2.2.2.0/24; };
table role=nat type=tree number=110
{ 1.2.3.4/32; ! 2.2.0.0/16; 2.2.2.0/24; };
table role=auth type=tree number=120
{ 1.2.3.4/32; ! 2.2.0.0/16; 2.2.2.0/24; };
table role=count type=tree number=130
{ 1.2.3.4/32; ! 2.2.0.0/16; 2.2.2.0/24; };
table role=ipf type=hash number=2 size=1
{; };
table role=ipf type=hash number=200 size=5
{ 0/0; 1/32; 1.2.3.4/32; };
table role=nat type=hash number=210 size=5
{ 0/0; 2/32; 1.2.3.4/32; };
table role=auth type=hash number=220 size=5
{ 0/0; 3/32; 1.2.3.4/32; };
table role=count type=hash number=230 size=5
{ 0/0; 4/32; 1.2.3.4/32; };
table role=ipf type=hash number=240 size=5 seed=101
{ 0/0; 1/32; 1.2.3.4/32; };
table role=nat type=hash number=250 size=5 seed=101
{ 0/0; 2/32; 1.2.3.4/32; };
table role=auth type=hash number=260 size=5 seed=101
{ 0/0; 3/32; 1.2.3.4/32; };
table role=count type=hash number=270 size=5 seed=101
{ 0/0; 4/32; 1.2.3.4/32; };
table role=ipf type=hash number=2000 size=1001
{ 0/0; 1/32; 1.2.3.4/32; };
table role=nat type=hash number=2000 size=1001
{ 0/0; 2/32; 1.2.3.4/32; };
table role=auth type=hash number=2000 size=1001
{ 0/0; 3/32; 1.2.3.4/32; };
table role=count type=hash number=2000 size=1001
{ 0/0; 4/32; 1.2.3.4/32; };
table role=ipf type=hash number=100 size=1001 seed=101
{ 0/0; 1/32; 1.2.3.4/32; };
table role=nat type=hash number=100 size=1001 seed=101
{ 0/0; 2/32; 1.2.3.4/32; };
table role=auth type=hash number=100 size=1001 seed=101
{ 0/0; 3/32; 1.2.3.4/32; };
table role=count type=hash number=100 size=1001 seed=101
{ 0/0; 4/32; 1.2.3.4/32; };
group-map in role=ipf number=300 size=5
{ 0/0, group=303; 5/32, group=303; 1.2.3.4/32, group=303; };
group-map in role=nat number=300 size=5
{ 0/0, group=303; 6/32, group=303; 1.2.3.4/32, group=303; };
group-map in role=auth number=300 size=5
{ 0/0, group=303; 7/32, group=303; 1.2.3.4/32, group=303; };
group-map in role=count number=300 size=5
{ 0/0, group=303; 8/32, group=303; 1.2.3.4/32, group=303; };
group-map out role=ipf number=400 size=5
{ 0/0, group=303; 5/32, group=303; 1.2.3.4/32, group=606; };
group-map out role=nat number=400 size=5
{ 0/0, group=303; 6/32, group=303; 1.2.3.4/32, group=606; };
group-map out role=auth number=400 size=5
{ 0/0, group=303; 7/32, group=303; 1.2.3.4/32, group=606; };
group-map out role=count number=400 size=5
{ 0/0, group=303; 8/32, group=303; 1.2.3.4/32, group=606; };
group-map in role=ipf number=500 size=5
{ 0/0, group=10; 5/32, group=800; 1.2.3.4/32, group=606; };
group-map in role=nat number=500 size=5
{ 0/0, group=10; 6/32, group=800; 1.2.3.4/32, group=606; };
group-map in role=auth number=500 size=5
{ 0/0, group=10; 7/32, group=800; 1.2.3.4/32, group=606; };
group-map in role=count number=500 size=5
{ 0/0, group=10; 8/32, group=800; 1.2.3.4/32, group=606; };