[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#962724: iptables: autopkgtest regression: nft Unsupported command?

Source: iptables
Version: 1.8.5-1
X-Debbugs-CC: debian-ci@lists.debian.org
Severity: serious
User: debian-ci@lists.debian.org
Usertags: regression

Dear maintainer(s),

With a recent upload of iptables the autopkgtest of iptables fails in
testing when that autopkgtest is run with the binary packages of
iptables from unstable. It passes when run with only packages from
testing. In tabular form:

                       pass            fail
iptables               from testing    1.8.5-1
versioned deps [0]     from testing    from unstable
all others             from testing    from testing

I copied some of the output at the bottom of this report.

Currently this regression is blocking the migration to testing [1]. Can
you please investigate the situation and fix it? (your package also
FTBFS everywhere but amd64).

More information about this bug and the reason for filing it can be found on


[0] You can see what packages were added from the second line of the log
file quoted below. The migration software adds source package from
unstable to the list if they are needed to install packages from
iptables/1.8.5-1. I.e. due to versioned dependencies or breaks/conflicts.
[1] https://qa.debian.org/excuses.php?package=iptables


autopkgtest [04:50:24]: test command16: ip6tables-translate -h
autopkgtest [04:50:24]: test command16: [-----------------------
ip6tables-translate v1.8.5

Usage: ip6tables-translate -[ACD] chain rule-specification [options]
	ip6tables-translate -I chain [rulenum] rule-specification [options]
	ip6tables-translate -R chain rulenum rule-specification [options]
	ip6tables-translate -D chain rulenum [options]
	ip6tables-translate -[LS] [chain [rulenum]] [options]
	ip6tables-translate -[FZ] [chain] [options]
	ip6tables-translate -[NX] chain
	ip6tables-translate -E old-chain-name new-chain-name
	ip6tables-translate -P chain target [options]
	ip6tables-translate -h (print this help information)

Either long or short options are allowed.
  --append  -A chain		Append to chain
  --check   -C chain		Check for the existence of a rule
  --delete  -D chain		Delete matching rule from chain
  --delete  -D chain rulenum
				Delete rule rulenum (1 = first) from chain
  --insert  -I chain [rulenum]
				Insert in chain as rulenum (default 1=first)
  --replace -R chain rulenum
				Replace rule rulenum (1 = first) in chain
  --list    -L [chain [rulenum]]
				List the rules in a chain or all chains
  --list-rules -S [chain [rulenum]]
				Print the rules in a chain or all chains
  --flush   -F [chain]		Delete all rules in  chain or all chains
  --zero    -Z [chain [rulenum]]
				Zero counters in chain or all chains
  --new     -N chain		Create a new user-defined chain
	     -X [chain]		Delete a user-defined chain
  --policy  -P chain target
				Change policy on chain to target
	     -E old-chain new-chain
				Change chain name, (moving any references)
    --ipv4	-4		Nothing (line is ignored by ip6tables-restore)
    --ipv6	-6		Error (line is ignored by iptables-restore)
[!] --proto	-p proto	protocol: by number or name, eg. `tcp'
[!] --source	-s address[/mask][...]
				source specification
[!] --destination -d address[/mask][...]
				destination specification
[!] --in-interface -i input name[+]
				network interface name ([+] for wildcard)
 --jump	-j target
				target for rule (may load target extension)
  --goto      -g chain
			       jump to chain with no return
  --match	-m match
				extended match (may load extension)
  --numeric	-n		numeric output of addresses and ports
[!] --out-interface -o output name[+]
				network interface name ([+] for wildcard)
  --table	-t table	table to manipulate (default: `filter')
  --verbose	-v		verbose mode
  --wait	-w [seconds]	maximum wait to acquire xtables lock before give up
  --wait-interval -W [usecs]	wait time to try to acquire xtables lock
				default is 1 second
  --line-numbers		print line numbers when listing
  --exact	-x		expand numbers (display exact values)
[!] --fragment	-f		match second or further fragments only
  --modprobe=<command>		try to insert modules using this command
  --set-counters PKTS BYTES	set the counter during insert/append
[!] --version	-V		print package version.
nft Unsupported command?
autopkgtest [04:50:24]: test command16: -----------------------]

Attachment: signature.asc
Description: OpenPGP digital signature

Reply to: