diff options
author | 2017-09-15 14:03:14 +0000 | |
---|---|---|
committer | 2017-09-15 14:03:14 +0000 | |
commit | 0b163fd1b40786977e5c2b45dba814b2de343a19 (patch) | |
tree | e23aca4b1a370d91c3d270a534f40bb55dc2f19e /regress/sys/netinet6 | |
parent | move the envelope handling code to its own function to clarify the (diff) | |
download | wireguard-openbsd-0b163fd1b40786977e5c2b45dba814b2de343a19.tar.xz wireguard-openbsd-0b163fd1b40786977e5c2b45dba814b2de343a19.zip |
Clean up pf rules and states on remote machine so that they do not
interfere with later tests.
Diffstat (limited to 'regress/sys/netinet6')
-rw-r--r-- | regress/sys/netinet6/frag6/Makefile | 10 | ||||
-rw-r--r-- | regress/sys/netinet6/frag6/pf.conf | 4 |
2 files changed, 10 insertions, 4 deletions
diff --git a/regress/sys/netinet6/frag6/Makefile b/regress/sys/netinet6/frag6/Makefile index f382e4a9d41..48dbd06d20e 100644 --- a/regress/sys/netinet6/frag6/Makefile +++ b/regress/sys/netinet6/frag6/Makefile @@ -1,4 +1,4 @@ -# $OpenBSD: Makefile,v 1.21 2017/09/07 19:04:23 bluhm Exp $ +# $OpenBSD: Makefile,v 1.22 2017/09/15 14:03:14 bluhm Exp $ # The following ports must be installed: # @@ -133,7 +133,13 @@ REGRESS_TARGETS += run-regress-${sp}-ping6 run-regress-${sp}-fragping6 \ # After running the tests, turn on pf on remote machine. # This is the expected default configuration. -REGRESS_TARGETS += stamp-pf + +cleanup-pf: + rm -f stamp-stack stamp-pf + ssh ${IPS_SSH} ${SUDO} pfctl -a regress -Fa + -ssh ${REMOTE_SSH} ${SUDO} pfctl -e || true + +REGRESS_TARGETS += cleanup-pf CLEANFILES += addr.py *.pyc *.log stamp-* diff --git a/regress/sys/netinet6/frag6/pf.conf b/regress/sys/netinet6/frag6/pf.conf index fc5dbec04f1..b74406f274a 100644 --- a/regress/sys/netinet6/frag6/pf.conf +++ b/regress/sys/netinet6/frag6/pf.conf @@ -2,5 +2,5 @@ pass inet6 allow-opts # turning on and off pf via ssh connection does not work with states -pass proto tcp from port ssh no state -pass proto tcp to port ssh no state +pass proto tcp from port ssh flags A/SA no state +pass proto tcp to port ssh flags A/SA no state |