123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160 |
- #
- # The Qubes OS Project, http://www.qubes-os.org
- #
- # Copyright (C) 2016 Marek Marczykowski-Górecki
- # <marmarek@invisiblethingslab.com>
- #
- # This program is free software; you can redistribute it and/or modify
- # it under the terms of the GNU General Public License as published by
- # the Free Software Foundation; either version 2 of the License, or
- # (at your option) any later version.
- #
- # This program is distributed in the hope that it will be useful,
- # but WITHOUT ANY WARRANTY; without even the implied warranty of
- # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- # GNU General Public License for more details.
- #
- # You should have received a copy of the GNU General Public License along
- # with this program; if not, write to the Free Software Foundation, Inc.,
- # 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
- #
- import qubes.firewall
- import qubes.tests
- import qubes.tests.tools
- import qubes.tools.qvm_firewall
- import qubes.vm.appvm
- class TC_10_ArgParser(qubes.tests.SystemTestsMixin, qubes.tests.QubesTestCase):
- list_header = ['NO', 'ACTION', 'HOST', 'PROTOCOL', 'PORT(S)',
- 'SPECIAL TARGET', 'ICMP TYPE']
- def setUp(self):
- super(TC_10_ArgParser, self).setUp()
- self.init_default_template()
- self.vm = self.app.add_new_vm(qubes.vm.appvm.AppVM, None,
- name=self.make_vm_name('vm'), label='red')
- self.vm.create_on_disk()
- self.app.save()
- def test_000_list(self):
- with qubes.tests.tools.StdoutBuffer() as stdout:
- qubes.tools.qvm_firewall.main([self.vm.name, 'list'])
- self.assertEqual(stdout.getvalue(),
- ' '.join(self.list_header) + '\n')
- def test_001_list(self):
- self.vm.firewall.rules.append(
- qubes.firewall.Rule(action='accept', dsthost='127.0.0.2',
- proto='tcp', dstports=80))
- self.vm.firewall.rules.append(
- qubes.firewall.Rule(action='accept', dsthost='127.0.0.3',
- proto='icmp', icmptype=8))
- self.vm.firewall.rules.append(
- qubes.firewall.Rule(action='accept', specialtarget='dns'))
- self.vm.firewall.save()
- expected_output = (
- 'NO ACTION HOST PROTOCOL PORT(S) SPECIAL TARGET ICMP '
- 'TYPE\n'
- '0 accept 127.0.0.2/32 tcp 80 '
- ' \n'
- '1 accept 127.0.0.3/32 icmp 8 '
- ' \n'
- '2 accept dns '
- ' \n'
- )
- with qubes.tests.tools.StdoutBuffer() as stdout:
- qubes.tools.qvm_firewall.main([self.vm.name, 'list'])
- self.assertEqual(
- '\n'.join(l.rstrip() for l in stdout.getvalue().splitlines()),
- '\n'.join(l.rstrip() for l in expected_output.splitlines()))
- def test_002_list_raw(self):
- self.vm.firewall.rules = [
- qubes.firewall.Rule(action='accept', dsthost='127.0.0.2',
- proto='tcp', dstports=80),
- qubes.firewall.Rule(action='accept', dsthost='127.0.0.3',
- proto='icmp', icmptype=8),
- qubes.firewall.Rule(action='accept', specialtarget='dns'),
- ]
- self.vm.firewall.save()
- expected_output = '\n'.join(rule.rule for rule in
- self.vm.firewall.rules) + '\n'
- with qubes.tests.tools.StdoutBuffer() as stdout:
- qubes.tools.qvm_firewall.main(['--raw', self.vm.name, 'list'])
- self.assertEqual(stdout.getvalue(), expected_output)
- def test_010_add(self):
- qubes.tools.qvm_firewall.main(
- [self.vm.name, 'add', 'accept', '1.2.3.0/24', 'tcp', '443'])
- self.assertEqual(self.vm.firewall.rules,
- [qubes.firewall.Rule(action='accept', dsthost='1.2.3.0/24',
- proto='tcp', dstports='443')])
- def test_011_add_before(self):
- self.vm.firewall.rules = [
- qubes.firewall.Rule(action='accept', dsthost='1.2.3.1'),
- qubes.firewall.Rule(action='accept', dsthost='1.2.3.2'),
- qubes.firewall.Rule(action='accept', dsthost='1.2.3.3'),
- ]
- self.vm.firewall.save()
- qubes.tools.qvm_firewall.main(
- [self.vm.name, 'add', '--before', '2',
- 'accept', '1.2.3.0/24', 'tcp', '443'])
- self.vm.firewall.load()
- self.assertEqual(self.vm.firewall.rules,
- [qubes.firewall.Rule(action='accept', dsthost='1.2.3.1'),
- qubes.firewall.Rule(action='accept', dsthost='1.2.3.2'),
- qubes.firewall.Rule(action='accept', dsthost='1.2.3.0/24',
- proto='tcp', dstports='443'),
- qubes.firewall.Rule(action='accept', dsthost='1.2.3.3'),
- ])
- def test_020_del(self):
- self.vm.firewall.rules = [
- qubes.firewall.Rule(action='accept', dsthost='1.2.3.1'),
- qubes.firewall.Rule(action='accept', dsthost='1.2.3.2'),
- qubes.firewall.Rule(action='accept', dsthost='1.2.3.3'),
- ]
- self.vm.firewall.save()
- qubes.tools.qvm_firewall.main(
- [self.vm.name, 'del', 'accept', '1.2.3.2'])
- self.vm.firewall.load()
- self.assertEqual(self.vm.firewall.rules,
- [qubes.firewall.Rule(action='accept', dsthost='1.2.3.1'),
- qubes.firewall.Rule(action='accept', dsthost='1.2.3.3'),
- ])
- def test_021_del_by_number(self):
- self.vm.firewall.rules = [
- qubes.firewall.Rule(action='accept', dsthost='1.2.3.1'),
- qubes.firewall.Rule(action='accept', dsthost='1.2.3.2'),
- qubes.firewall.Rule(action='accept', dsthost='1.2.3.3'),
- ]
- self.vm.firewall.save()
- qubes.tools.qvm_firewall.main(
- [self.vm.name, 'del', '--rule-no', '1'])
- self.vm.firewall.load()
- self.assertEqual(self.vm.firewall.rules,
- [qubes.firewall.Rule(action='accept', dsthost='1.2.3.1'),
- qubes.firewall.Rule(action='accept', dsthost='1.2.3.3'),
- ])
- def test_030_policy(self):
- with qubes.tests.tools.StdoutBuffer() as stdout:
- qubes.tools.qvm_firewall.main([self.vm.name, 'policy'])
- self.assertEqual(stdout.getvalue(), 'accept\n')
- self.vm.firewall.policy = 'drop'
- self.vm.firewall.save()
- with qubes.tests.tools.StdoutBuffer() as stdout:
- qubes.tools.qvm_firewall.main([self.vm.name, 'policy'])
- self.assertEqual(stdout.getvalue(), 'drop\n')
- def test_031_policy_set(self):
- qubes.tools.qvm_firewall.main([self.vm.name, 'policy', 'drop'])
- self.assertEqual(self.vm.firewall.policy, 'drop')
- qubes.tools.qvm_firewall.main([self.vm.name, 'policy', 'accept'])
- self.vm.firewall.load()
- self.assertEqual(self.vm.firewall.policy, 'accept')
|