123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197 |
- # encoding=utf-8
- #
- # The Qubes OS Project, http://www.qubes-os.org
- #
- # Copyright (C) 2016 Marek Marczykowski-Górecki
- # <marmarek@invisiblethingslab.com>
- #
- # This program is free software; you can redistribute it and/or modify
- # it under the terms of the GNU Lesser General Public License as published by
- # the Free Software Foundation; either version 2.1 of the License, or
- # (at your option) any later version.
- #
- # This program is distributed in the hope that it will be useful,
- # but WITHOUT ANY WARRANTY; without even the implied warranty of
- # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- # GNU Lesser General Public License for more details.
- #
- # You should have received a copy of the GNU Lesser General Public License along
- # with this program; if not, write to the Free Software Foundation, Inc.,
- # 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
- #
- import argparse
- import qubesadmin.firewall
- import qubesadmin.tests
- import qubesadmin.tests.tools
- import qubesadmin.tools.qvm_firewall
- class TC_00_RuleAction(qubesadmin.tests.QubesTestCase):
- def setUp(self):
- super(TC_00_RuleAction, self).setUp()
- self.action = qubesadmin.tools.qvm_firewall.RuleAction(
- None, dest='rule')
- def test_000_named_opts(self):
- ns = argparse.Namespace()
- self.action(None, ns, ['dsthost=127.0.0.1', 'action=accept'])
- self.assertEqual(ns.rule,
- qubesadmin.firewall.Rule(
- None, action='accept', dsthost='127.0.0.1/32'))
- def test_001_unnamed_opts(self):
- ns = argparse.Namespace()
- self.action(None, ns, ['accept', '127.0.0.1', 'tcp', '80'])
- self.assertEqual(ns.rule,
- qubesadmin.firewall.Rule(
- None, action='accept', dsthost='127.0.0.1/32',
- proto='tcp', dstports=80))
- def test_002_unnamed_opts(self):
- ns = argparse.Namespace()
- self.action(None, ns, ['accept', '127.0.0.1', 'icmp', '8'])
- self.assertEqual(ns.rule,
- qubesadmin.firewall.Rule(
- None, action='accept', dsthost='127.0.0.1/32',
- proto='icmp', icmptype=8))
- def test_003_mixed_opts(self):
- ns = argparse.Namespace()
- self.action(None, ns, ['dsthost=127.0.0.1', 'accept',
- 'dstports=443', 'tcp'])
- self.assertEqual(ns.rule,
- qubesadmin.firewall.Rule(
- None, action='accept', dsthost='127.0.0.1/32',
- proto='tcp', dstports=443))
- class TC_10_qvm_firewall(qubesadmin.tests.QubesTestCase):
- def setUp(self):
- super(TC_10_qvm_firewall, self).setUp()
- self.app.expected_calls[('dom0', 'admin.vm.List', None, None)] = \
- b'0\0test-vm class=AppVM state=Halted\n'
- def test_000_list(self):
- self.app.expected_calls[('test-vm', 'admin.vm.firewall.Get',
- None, None)] = \
- b'0\0action=accept dsthost=qubes-os.org\n' \
- b'action=drop proto=icmp\n'
- with qubesadmin.tests.tools.StdoutBuffer() as stdout:
- qubesadmin.tools.qvm_firewall.main(['test-vm', 'list'], app=self.app)
- self.assertEqual(
- [l.strip() for l in stdout.getvalue().splitlines()],
- ['NO ACTION HOST PROTOCOL PORT(S) SPECIAL '
- 'TARGET ICMP TYPE COMMENT',
- '0 accept qubes-os.org - - - '
- ' - -',
- '1 drop - icmp - - '
- ' - -',
- ])
- def test_001_list(self):
- self.app.expected_calls[('test-vm', 'admin.vm.firewall.Get',
- None, None)] = \
- b'0\0action=accept dsthost=qubes-os.org proto=tcp ' \
- b'dstports=443-443\n' \
- b'action=drop proto=icmp icmptype=8\n' \
- b'action=accept specialtarget=dns comment=Allow DNS\n'
- with qubesadmin.tests.tools.StdoutBuffer() as stdout:
- qubesadmin.tools.qvm_firewall.main(['test-vm', 'list'], app=self.app)
- self.assertEqual(
- [l.strip() for l in stdout.getvalue().splitlines()],
- ['NO ACTION HOST PROTOCOL PORT(S) SPECIAL '
- 'TARGET ICMP TYPE COMMENT',
- '0 accept qubes-os.org tcp 443 - '
- ' - -',
- '1 drop - icmp - - '
- ' 8 -',
- '2 accept - - - dns '
- ' - Allow DNS',
- ])
- def test_002_list_raw(self):
- self.app.expected_calls[('test-vm', 'admin.vm.firewall.Get',
- None, None)] = \
- b'0\0action=accept dsthost=qubes-os.org\n' \
- b'action=drop proto=icmp\n'
- with qubesadmin.tests.tools.StdoutBuffer() as stdout:
- qubesadmin.tools.qvm_firewall.main(['test-vm', '--raw', 'list'],
- app=self.app)
- self.assertEqual(
- [l.strip() for l in stdout.getvalue().splitlines()],
- ['action=accept dsthost=qubes-os.org',
- 'action=drop proto=icmp',
- ])
- def test_003_list_raw_reload(self):
- self.app.expected_calls[('test-vm', 'admin.vm.firewall.Get',
- None, None)] = \
- b'0\0action=accept dsthost=qubes-os.org\n' \
- b'action=drop proto=icmp\n'
- self.app.expected_calls[('test-vm', 'admin.vm.firewall.Reload',
- None, None)] = b'0\0'
- with qubesadmin.tests.tools.StdoutBuffer() as stdout:
- qubesadmin.tools.qvm_firewall.main(
- ['test-vm', '--raw', '--reload', 'list'],
- app=self.app)
- self.assertEqual(
- [l.strip() for l in stdout.getvalue().splitlines()],
- ['action=accept dsthost=qubes-os.org',
- 'action=drop proto=icmp',
- ])
- def test_010_add_after(self):
- self.app.expected_calls[('test-vm', 'admin.vm.firewall.Get',
- None, None)] = \
- b'0\0action=accept dsthost=qubes-os.org\n' \
- b'action=drop proto=icmp\n'
- self.app.expected_calls[('test-vm', 'admin.vm.firewall.Set', None,
- b'action=accept dsthost=qubes-os.org\n'
- b'action=drop proto=icmp\n'
- b'action=accept dst4=192.168.0.0/24 comment=Allow LAN\n')] = \
- b'0\0'
- qubesadmin.tools.qvm_firewall.main(
- ['test-vm', 'add', 'accept', '192.168.0.0/24', 'comment=Allow LAN'],
- app=self.app
- )
- def test_011_add_before(self):
- self.app.expected_calls[('test-vm', 'admin.vm.firewall.Get',
- None, None)] = \
- b'0\0action=accept dsthost=qubes-os.org\n' \
- b'action=drop proto=icmp\n'
- self.app.expected_calls[('test-vm', 'admin.vm.firewall.Set', None,
- b'action=accept dsthost=qubes-os.org\n'
- b'action=accept dst4=192.168.0.0/24 comment=Allow LAN\n'
- b'action=drop proto=icmp\n')] = b'0\0'
- qubesadmin.tools.qvm_firewall.main(
- ['test-vm', 'add', '--before', '1', 'accept', '192.168.0.0/24',
- 'comment=Allow LAN'],
- app=self.app
- )
- def test_020_del_number(self):
- self.app.expected_calls[('test-vm', 'admin.vm.firewall.Get',
- None, None)] = \
- b'0\0action=accept dsthost=qubes-os.org\n' \
- b'action=drop proto=icmp\n'
- self.app.expected_calls[('test-vm', 'admin.vm.firewall.Set', None,
- b'action=accept dsthost=qubes-os.org\n')] = b'0\0'
- qubesadmin.tools.qvm_firewall.main(
- ['test-vm', 'del', '--rule-no', '1'],
- app=self.app
- )
- def test_021_del_rule(self):
- self.app.expected_calls[('test-vm', 'admin.vm.firewall.Get',
- None, None)] = \
- b'0\0action=accept dsthost=qubes-os.org\n' \
- b'action=drop proto=icmp\n'
- self.app.expected_calls[('test-vm', 'admin.vm.firewall.Set', None,
- b'action=accept dsthost=qubes-os.org\n')] = b'0\0'
- qubesadmin.tools.qvm_firewall.main(
- ['test-vm', 'del', 'drop', 'proto=icmp'],
- app=self.app
- )
|