|
@@ -0,0 +1,218 @@
|
|
|
+# encoding=utf-8
|
|
|
+#
|
|
|
+# The Qubes OS Project, http://www.qubes-os.org
|
|
|
+#
|
|
|
+# Copyright (C) 2016 Marek Marczykowski-Górecki
|
|
|
+# <marmarek@invisiblethingslab.com>
|
|
|
+#
|
|
|
+# This program is free software; you can redistribute it and/or modify
|
|
|
+# it under the terms of the GNU General Public License as published by
|
|
|
+# the Free Software Foundation; either version 2 of the License, or
|
|
|
+# (at your option) any later version.
|
|
|
+#
|
|
|
+# This program is distributed in the hope that it will be useful,
|
|
|
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
+# GNU General Public License for more details.
|
|
|
+#
|
|
|
+# You should have received a copy of the GNU General Public License along
|
|
|
+# with this program; if not, write to the Free Software Foundation, Inc.,
|
|
|
+# 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
|
|
+#
|
|
|
+
|
|
|
+import argparse
|
|
|
+
|
|
|
+import qubesmgmt.firewall
|
|
|
+import qubesmgmt.tests
|
|
|
+import qubesmgmt.tests.tools
|
|
|
+import qubesmgmt.tools.qvm_firewall
|
|
|
+
|
|
|
+
|
|
|
+class TC_00_RuleAction(qubesmgmt.tests.QubesTestCase):
|
|
|
+ def setUp(self):
|
|
|
+ super(TC_00_RuleAction, self).setUp()
|
|
|
+ self.action = qubesmgmt.tools.qvm_firewall.RuleAction(
|
|
|
+ None, dest='rule')
|
|
|
+
|
|
|
+ def test_000_named_opts(self):
|
|
|
+ ns = argparse.Namespace()
|
|
|
+ self.action(None, ns, ['dsthost=127.0.0.1', 'action=accept'])
|
|
|
+ self.assertEqual(ns.rule,
|
|
|
+ qubesmgmt.firewall.Rule(
|
|
|
+ None, action='accept', dsthost='127.0.0.1/32'))
|
|
|
+
|
|
|
+ def test_001_unnamed_opts(self):
|
|
|
+ ns = argparse.Namespace()
|
|
|
+ self.action(None, ns, ['accept', '127.0.0.1', 'tcp', '80'])
|
|
|
+ self.assertEqual(ns.rule,
|
|
|
+ qubesmgmt.firewall.Rule(
|
|
|
+ None, action='accept', dsthost='127.0.0.1/32',
|
|
|
+ proto='tcp', dstports=80))
|
|
|
+
|
|
|
+ def test_002_unnamed_opts(self):
|
|
|
+ ns = argparse.Namespace()
|
|
|
+ self.action(None, ns, ['accept', '127.0.0.1', 'icmp', '8'])
|
|
|
+ self.assertEqual(ns.rule,
|
|
|
+ qubesmgmt.firewall.Rule(
|
|
|
+ None, action='accept', dsthost='127.0.0.1/32',
|
|
|
+ proto='icmp', icmptype=8))
|
|
|
+
|
|
|
+ def test_003_mixed_opts(self):
|
|
|
+ ns = argparse.Namespace()
|
|
|
+ self.action(None, ns, ['dsthost=127.0.0.1', 'accept',
|
|
|
+ 'dstports=443', 'tcp'])
|
|
|
+ self.assertEqual(ns.rule,
|
|
|
+ qubesmgmt.firewall.Rule(
|
|
|
+ None, action='accept', dsthost='127.0.0.1/32',
|
|
|
+ proto='tcp', dstports=443))
|
|
|
+
|
|
|
+
|
|
|
+class TC_10_qvm_firewall(qubesmgmt.tests.QubesTestCase):
|
|
|
+ def setUp(self):
|
|
|
+ super(TC_10_qvm_firewall, self).setUp()
|
|
|
+ self.app.expected_calls[('dom0', 'mgmt.vm.List', None, None)] = \
|
|
|
+ b'0\0test-vm class=AppVM state=Halted\n'
|
|
|
+
|
|
|
+ def test_000_list(self):
|
|
|
+ self.app.expected_calls[('test-vm', 'mgmt.vm.firewall.Get',
|
|
|
+ None, None)] = \
|
|
|
+ b'0\0action=accept dsthost=qubes-os.org\n' \
|
|
|
+ b'action=drop proto=icmp\n'
|
|
|
+ with qubesmgmt.tests.tools.StdoutBuffer() as stdout:
|
|
|
+ qubesmgmt.tools.qvm_firewall.main(['test-vm', 'list'], app=self.app)
|
|
|
+ self.assertEqual(
|
|
|
+ [l.strip() for l in stdout.getvalue().splitlines()],
|
|
|
+ ['NO ACTION HOST PROTOCOL PORT(S) SPECIAL '
|
|
|
+ 'TARGET ICMP TYPE COMMENT',
|
|
|
+ '0 accept qubes-os.org - - - '
|
|
|
+ ' - -',
|
|
|
+ '1 drop - icmp - - '
|
|
|
+ ' - -',
|
|
|
+ ])
|
|
|
+
|
|
|
+ def test_001_list(self):
|
|
|
+ self.app.expected_calls[('test-vm', 'mgmt.vm.firewall.Get',
|
|
|
+ None, None)] = \
|
|
|
+ b'0\0action=accept dsthost=qubes-os.org proto=tcp ' \
|
|
|
+ b'dstports=443-443\n' \
|
|
|
+ b'action=drop proto=icmp icmptype=8\n' \
|
|
|
+ b'action=accept specialtarget=dns comment=Allow DNS\n'
|
|
|
+ with qubesmgmt.tests.tools.StdoutBuffer() as stdout:
|
|
|
+ qubesmgmt.tools.qvm_firewall.main(['test-vm', 'list'], app=self.app)
|
|
|
+ self.assertEqual(
|
|
|
+ [l.strip() for l in stdout.getvalue().splitlines()],
|
|
|
+ ['NO ACTION HOST PROTOCOL PORT(S) SPECIAL '
|
|
|
+ 'TARGET ICMP TYPE COMMENT',
|
|
|
+ '0 accept qubes-os.org tcp 443 - '
|
|
|
+ ' - -',
|
|
|
+ '1 drop - icmp - - '
|
|
|
+ ' 8 -',
|
|
|
+ '2 accept - - - dns '
|
|
|
+ ' - Allow DNS',
|
|
|
+ ])
|
|
|
+
|
|
|
+ def test_002_list_raw(self):
|
|
|
+ self.app.expected_calls[('test-vm', 'mgmt.vm.firewall.Get',
|
|
|
+ None, None)] = \
|
|
|
+ b'0\0action=accept dsthost=qubes-os.org\n' \
|
|
|
+ b'action=drop proto=icmp\n'
|
|
|
+ with qubesmgmt.tests.tools.StdoutBuffer() as stdout:
|
|
|
+ qubesmgmt.tools.qvm_firewall.main(['test-vm', '--raw', 'list'],
|
|
|
+ app=self.app)
|
|
|
+ self.assertEqual(
|
|
|
+ [l.strip() for l in stdout.getvalue().splitlines()],
|
|
|
+ ['action=accept dsthost=qubes-os.org',
|
|
|
+ 'action=drop proto=icmp',
|
|
|
+ ])
|
|
|
+
|
|
|
+ def test_003_list_raw_reload(self):
|
|
|
+ self.app.expected_calls[('test-vm', 'mgmt.vm.firewall.Get',
|
|
|
+ None, None)] = \
|
|
|
+ b'0\0action=accept dsthost=qubes-os.org\n' \
|
|
|
+ b'action=drop proto=icmp\n'
|
|
|
+ self.app.expected_calls[('test-vm', 'mgmt.vm.firewall.Reload',
|
|
|
+ None, None)] = b'0\0'
|
|
|
+ with qubesmgmt.tests.tools.StdoutBuffer() as stdout:
|
|
|
+ qubesmgmt.tools.qvm_firewall.main(
|
|
|
+ ['test-vm', '--raw', '--reload', 'list'],
|
|
|
+ app=self.app)
|
|
|
+ self.assertEqual(
|
|
|
+ [l.strip() for l in stdout.getvalue().splitlines()],
|
|
|
+ ['action=accept dsthost=qubes-os.org',
|
|
|
+ 'action=drop proto=icmp',
|
|
|
+ ])
|
|
|
+
|
|
|
+ def test_010_add_after(self):
|
|
|
+ self.app.expected_calls[('test-vm', 'mgmt.vm.firewall.Get',
|
|
|
+ None, None)] = \
|
|
|
+ b'0\0action=accept dsthost=qubes-os.org\n' \
|
|
|
+ b'action=drop proto=icmp\n'
|
|
|
+ self.app.expected_calls[('test-vm', 'mgmt.vm.firewall.Set', None,
|
|
|
+ b'action=accept dsthost=qubes-os.org\n'
|
|
|
+ b'action=drop proto=icmp\n'
|
|
|
+ b'action=accept dst4=192.168.0.0/24 comment=Allow LAN\n')] = \
|
|
|
+ b'0\0'
|
|
|
+ qubesmgmt.tools.qvm_firewall.main(
|
|
|
+ ['test-vm', 'add', 'accept', '192.168.0.0/24', 'comment=Allow LAN'],
|
|
|
+ app=self.app
|
|
|
+ )
|
|
|
+
|
|
|
+ def test_011_add_before(self):
|
|
|
+ self.app.expected_calls[('test-vm', 'mgmt.vm.firewall.Get',
|
|
|
+ None, None)] = \
|
|
|
+ b'0\0action=accept dsthost=qubes-os.org\n' \
|
|
|
+ b'action=drop proto=icmp\n'
|
|
|
+ self.app.expected_calls[('test-vm', 'mgmt.vm.firewall.Set', None,
|
|
|
+ b'action=accept dsthost=qubes-os.org\n'
|
|
|
+ b'action=accept dst4=192.168.0.0/24 comment=Allow LAN\n'
|
|
|
+ b'action=drop proto=icmp\n')] = b'0\0'
|
|
|
+ qubesmgmt.tools.qvm_firewall.main(
|
|
|
+ ['test-vm', 'add', '--before', '1', 'accept', '192.168.0.0/24',
|
|
|
+ 'comment=Allow LAN'],
|
|
|
+ app=self.app
|
|
|
+ )
|
|
|
+
|
|
|
+ def test_020_del_number(self):
|
|
|
+ self.app.expected_calls[('test-vm', 'mgmt.vm.firewall.Get',
|
|
|
+ None, None)] = \
|
|
|
+ b'0\0action=accept dsthost=qubes-os.org\n' \
|
|
|
+ b'action=drop proto=icmp\n'
|
|
|
+ self.app.expected_calls[('test-vm', 'mgmt.vm.firewall.Set', None,
|
|
|
+ b'action=accept dsthost=qubes-os.org\n')] = b'0\0'
|
|
|
+ qubesmgmt.tools.qvm_firewall.main(
|
|
|
+ ['test-vm', 'del', '--rule-no', '1'],
|
|
|
+ app=self.app
|
|
|
+ )
|
|
|
+
|
|
|
+ def test_021_del_rule(self):
|
|
|
+ self.app.expected_calls[('test-vm', 'mgmt.vm.firewall.Get',
|
|
|
+ None, None)] = \
|
|
|
+ b'0\0action=accept dsthost=qubes-os.org\n' \
|
|
|
+ b'action=drop proto=icmp\n'
|
|
|
+ self.app.expected_calls[('test-vm', 'mgmt.vm.firewall.Set', None,
|
|
|
+ b'action=accept dsthost=qubes-os.org\n')] = b'0\0'
|
|
|
+ qubesmgmt.tools.qvm_firewall.main(
|
|
|
+ ['test-vm', 'del', 'drop', 'proto=icmp'],
|
|
|
+ app=self.app
|
|
|
+ )
|
|
|
+
|
|
|
+ def test_030_policy_get(self):
|
|
|
+ self.app.expected_calls[('test-vm', 'mgmt.vm.firewall.GetPolicy',
|
|
|
+ None, None)] = b'0\0accept'
|
|
|
+ with qubesmgmt.tests.tools.StdoutBuffer() as stdout:
|
|
|
+ qubesmgmt.tools.qvm_firewall.main(
|
|
|
+ ['test-vm', 'policy'],
|
|
|
+ app=self.app
|
|
|
+ )
|
|
|
+ self.assertEqual(stdout.getvalue(), 'accept\n')
|
|
|
+
|
|
|
+ def test_031_policy_set(self):
|
|
|
+ self.app.expected_calls[('test-vm', 'mgmt.vm.firewall.SetPolicy',
|
|
|
+ None, b'accept')] = b'0\0'
|
|
|
+ with qubesmgmt.tests.tools.StdoutBuffer() as stdout:
|
|
|
+ qubesmgmt.tools.qvm_firewall.main(
|
|
|
+ ['test-vm', 'policy', 'accept'],
|
|
|
+ app=self.app
|
|
|
+ )
|
|
|
+ self.assertEqual(stdout.getvalue(), '')
|
|
|
+
|