mirror of https://github.com/ansible/ansible.git
Iptables unit tests (#30762)
* Add some tests for iptables * Fix remove bug (calls 2 times check to remove a chain) * Add me as maintainer * Fix PEP8 * Doc: Give more information on issue #18988 * Fix #18988 and test it * Fix doc (thanks Pillou) * enable PEP8 check for iptablespull/32435/head
parent
1068aa3ce7
commit
bc4ba6b638
@ -0,0 +1,611 @@
|
||||
import json
|
||||
|
||||
from ansible.compat.tests import unittest
|
||||
from ansible.compat.tests.mock import patch
|
||||
from ansible.module_utils import basic
|
||||
from ansible.modules.system import iptables
|
||||
from ansible.module_utils._text import to_bytes
|
||||
|
||||
|
||||
def set_module_args(args):
|
||||
args = json.dumps({'ANSIBLE_MODULE_ARGS': args})
|
||||
basic._ANSIBLE_ARGS = to_bytes(args)
|
||||
|
||||
|
||||
class AnsibleExitJson(Exception):
|
||||
pass
|
||||
|
||||
|
||||
class AnsibleFailJson(Exception):
|
||||
pass
|
||||
|
||||
|
||||
def exit_json(*args, **kwargs):
|
||||
if 'changed' not in kwargs:
|
||||
kwargs['changed'] = False
|
||||
raise AnsibleExitJson(kwargs)
|
||||
|
||||
|
||||
def fail_json(*args, **kwargs):
|
||||
kwargs['failed'] = True
|
||||
raise AnsibleFailJson(kwargs)
|
||||
|
||||
|
||||
def get_bin_path(*args, **kwargs):
|
||||
return "/sbin/iptables"
|
||||
|
||||
|
||||
class TestIptables(unittest.TestCase):
|
||||
|
||||
def setUp(self):
|
||||
self.mock_basic = patch.multiple(basic.AnsibleModule,
|
||||
exit_json=exit_json,
|
||||
fail_json=fail_json,
|
||||
get_bin_path=get_bin_path)
|
||||
self.mock_basic.start()
|
||||
self.addCleanup(self.mock_basic.stop)
|
||||
|
||||
def tearDown(self):
|
||||
pass
|
||||
|
||||
def test_without_required_parameters(self):
|
||||
"""Failure must occurs when all parameters are missing"""
|
||||
with self.assertRaises(AnsibleFailJson):
|
||||
set_module_args({})
|
||||
iptables.main()
|
||||
|
||||
def test_flush_table_without_chain(self):
|
||||
"""Test flush without chain, flush the table"""
|
||||
set_module_args({
|
||||
'flush': True,
|
||||
})
|
||||
|
||||
with patch.object(basic.AnsibleModule, 'run_command') as run_command:
|
||||
run_command.return_value = 0, '', '' # successful execution, no output
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
iptables.main()
|
||||
self.assertTrue(result.exception.args[0]['changed'])
|
||||
|
||||
self.assertEqual(run_command.call_count, 1)
|
||||
self.assertEqual(run_command.call_args[0][0][0], '/sbin/iptables')
|
||||
self.assertEqual(run_command.call_args[0][0][1], '-t')
|
||||
self.assertEqual(run_command.call_args[0][0][2], 'filter')
|
||||
self.assertEqual(run_command.call_args[0][0][3], '-F')
|
||||
|
||||
def test_flush_table_check_true(self):
|
||||
"""Test flush without parameters and check == true"""
|
||||
set_module_args({
|
||||
'flush': True,
|
||||
'_ansible_check_mode': True,
|
||||
})
|
||||
|
||||
with patch.object(basic.AnsibleModule, 'run_command') as run_command:
|
||||
run_command.return_value = 0, '', '' # successful execution, no output
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
iptables.main()
|
||||
self.assertTrue(result.exception.args[0]['changed'])
|
||||
|
||||
self.assertEqual(run_command.call_count, 0)
|
||||
|
||||
# TODO ADD test flush table nat
|
||||
# TODO ADD test flush with chain
|
||||
# TODO ADD test flush with chain and table nat
|
||||
|
||||
def test_policy_table(self):
|
||||
"""Test change policy of a chain"""
|
||||
set_module_args({
|
||||
'policy': 'ACCEPT',
|
||||
'chain': 'INPUT',
|
||||
})
|
||||
commands_results = [
|
||||
(0, 'Chain INPUT (policy DROP)\n', ''),
|
||||
(0, '', '')
|
||||
]
|
||||
|
||||
with patch.object(basic.AnsibleModule, 'run_command') as run_command:
|
||||
run_command.side_effect = commands_results
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
iptables.main()
|
||||
self.assertTrue(result.exception.args[0]['changed'])
|
||||
|
||||
self.assertEqual(run_command.call_count, 2)
|
||||
# import pdb
|
||||
# pdb.set_trace()
|
||||
self.assertEqual(run_command.call_args_list[0][0][0], [
|
||||
'/sbin/iptables',
|
||||
'-t',
|
||||
'filter',
|
||||
'-L',
|
||||
'INPUT',
|
||||
])
|
||||
self.assertEqual(run_command.call_args_list[1][0][0], [
|
||||
'/sbin/iptables',
|
||||
'-t',
|
||||
'filter',
|
||||
'-P',
|
||||
'INPUT',
|
||||
'ACCEPT',
|
||||
])
|
||||
|
||||
def test_policy_table_no_change(self):
|
||||
"""Test don't change policy of a chain if the policy is right"""
|
||||
set_module_args({
|
||||
'policy': 'ACCEPT',
|
||||
'chain': 'INPUT',
|
||||
})
|
||||
commands_results = [
|
||||
(0, 'Chain INPUT (policy ACCEPT)\n', ''),
|
||||
(0, '', '')
|
||||
]
|
||||
|
||||
with patch.object(basic.AnsibleModule, 'run_command') as run_command:
|
||||
run_command.side_effect = commands_results
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
iptables.main()
|
||||
self.assertFalse(result.exception.args[0]['changed'])
|
||||
|
||||
self.assertEqual(run_command.call_count, 1)
|
||||
# import pdb
|
||||
# pdb.set_trace()
|
||||
self.assertEqual(run_command.call_args_list[0][0][0], [
|
||||
'/sbin/iptables',
|
||||
'-t',
|
||||
'filter',
|
||||
'-L',
|
||||
'INPUT',
|
||||
])
|
||||
|
||||
def test_policy_table_changed_false(self):
|
||||
"""Test flush without parameters and change == false"""
|
||||
set_module_args({
|
||||
'policy': 'ACCEPT',
|
||||
'chain': 'INPUT',
|
||||
'_ansible_check_mode': True,
|
||||
})
|
||||
commands_results = [
|
||||
(0, 'Chain INPUT (policy DROP)\n', ''),
|
||||
]
|
||||
|
||||
with patch.object(basic.AnsibleModule, 'run_command') as run_command:
|
||||
run_command.side_effect = commands_results
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
iptables.main()
|
||||
self.assertTrue(result.exception.args[0]['changed'])
|
||||
|
||||
self.assertEqual(run_command.call_count, 1)
|
||||
# import pdb
|
||||
# pdb.set_trace()
|
||||
self.assertEqual(run_command.call_args_list[0][0][0], [
|
||||
'/sbin/iptables',
|
||||
'-t',
|
||||
'filter',
|
||||
'-L',
|
||||
'INPUT',
|
||||
])
|
||||
|
||||
# TODO ADD test policy without chain fail
|
||||
# TODO ADD test policy with chain don't exists
|
||||
# TODO ADD test policy with wrong choice fail
|
||||
|
||||
def test_insert_rule_change_false(self):
|
||||
"""Test flush without parameters"""
|
||||
set_module_args({
|
||||
'chain': 'OUTPUT',
|
||||
'source': '1.2.3.4/32',
|
||||
'destination': '7.8.9.10/42',
|
||||
'jump': 'ACCEPT',
|
||||
'action': 'insert',
|
||||
'_ansible_check_mode': True,
|
||||
})
|
||||
|
||||
commands_results = [
|
||||
(1, '', ''),
|
||||
(0, '', '')
|
||||
]
|
||||
|
||||
with patch.object(basic.AnsibleModule, 'run_command') as run_command:
|
||||
run_command.side_effect = commands_results
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
iptables.main()
|
||||
self.assertTrue(result.exception.args[0]['changed'])
|
||||
|
||||
self.assertEqual(run_command.call_count, 1)
|
||||
# import pdb
|
||||
# pdb.set_trace()
|
||||
self.assertEqual(run_command.call_args_list[0][0][0], [
|
||||
'/sbin/iptables',
|
||||
'-t',
|
||||
'filter',
|
||||
'-C',
|
||||
'OUTPUT',
|
||||
'-s',
|
||||
'1.2.3.4/32',
|
||||
'-d',
|
||||
'7.8.9.10/42',
|
||||
'-j',
|
||||
'ACCEPT'
|
||||
])
|
||||
|
||||
def test_insert_rule(self):
|
||||
"""Test flush without parameters"""
|
||||
set_module_args({
|
||||
'chain': 'OUTPUT',
|
||||
'source': '1.2.3.4/32',
|
||||
'destination': '7.8.9.10/42',
|
||||
'jump': 'ACCEPT',
|
||||
'action': 'insert'
|
||||
})
|
||||
|
||||
commands_results = [
|
||||
(1, '', ''),
|
||||
(0, '', '')
|
||||
]
|
||||
|
||||
with patch.object(basic.AnsibleModule, 'run_command') as run_command:
|
||||
run_command.side_effect = commands_results
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
iptables.main()
|
||||
self.assertTrue(result.exception.args[0]['changed'])
|
||||
|
||||
self.assertEqual(run_command.call_count, 2)
|
||||
# import pdb
|
||||
# pdb.set_trace()
|
||||
self.assertEqual(run_command.call_args_list[0][0][0], [
|
||||
'/sbin/iptables',
|
||||
'-t',
|
||||
'filter',
|
||||
'-C',
|
||||
'OUTPUT',
|
||||
'-s',
|
||||
'1.2.3.4/32',
|
||||
'-d',
|
||||
'7.8.9.10/42',
|
||||
'-j',
|
||||
'ACCEPT'
|
||||
])
|
||||
self.assertEqual(run_command.call_args_list[1][0][0], [
|
||||
'/sbin/iptables',
|
||||
'-t',
|
||||
'filter',
|
||||
'-I',
|
||||
'OUTPUT',
|
||||
'-s',
|
||||
'1.2.3.4/32',
|
||||
'-d',
|
||||
'7.8.9.10/42',
|
||||
'-j',
|
||||
'ACCEPT'
|
||||
])
|
||||
|
||||
def test_append_rule_check_mode(self):
|
||||
"""Test append a redirection rule in check mode"""
|
||||
set_module_args({
|
||||
'chain': 'PREROUTING',
|
||||
'source': '1.2.3.4/32',
|
||||
'destination': '7.8.9.10/42',
|
||||
'jump': 'REDIRECT',
|
||||
'table': 'nat',
|
||||
'to_destination': '5.5.5.5/32',
|
||||
'protocol': 'udp',
|
||||
'destination_port': '22',
|
||||
'to_ports': '8600',
|
||||
'_ansible_check_mode': True,
|
||||
})
|
||||
|
||||
commands_results = [
|
||||
(1, '', ''),
|
||||
]
|
||||
|
||||
with patch.object(basic.AnsibleModule, 'run_command') as run_command:
|
||||
run_command.side_effect = commands_results
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
iptables.main()
|
||||
self.assertTrue(result.exception.args[0]['changed'])
|
||||
|
||||
self.assertEqual(run_command.call_count, 1)
|
||||
self.assertEqual(run_command.call_args_list[0][0][0], [
|
||||
'/sbin/iptables',
|
||||
'-t',
|
||||
'nat',
|
||||
'-C',
|
||||
'PREROUTING',
|
||||
'-p',
|
||||
'udp',
|
||||
'-s',
|
||||
'1.2.3.4/32',
|
||||
'-d',
|
||||
'7.8.9.10/42',
|
||||
'-j',
|
||||
'REDIRECT',
|
||||
'--to-destination',
|
||||
'5.5.5.5/32',
|
||||
'--destination-port',
|
||||
'22',
|
||||
'--to-ports',
|
||||
'8600'
|
||||
])
|
||||
|
||||
def test_append_rule(self):
|
||||
"""Test append a redirection rule"""
|
||||
set_module_args({
|
||||
'chain': 'PREROUTING',
|
||||
'source': '1.2.3.4/32',
|
||||
'destination': '7.8.9.10/42',
|
||||
'jump': 'REDIRECT',
|
||||
'table': 'nat',
|
||||
'to_destination': '5.5.5.5/32',
|
||||
'protocol': 'udp',
|
||||
'destination_port': '22',
|
||||
'to_ports': '8600'
|
||||
})
|
||||
|
||||
commands_results = [
|
||||
(1, '', ''),
|
||||
(0, '', '')
|
||||
]
|
||||
|
||||
with patch.object(basic.AnsibleModule, 'run_command') as run_command:
|
||||
run_command.side_effect = commands_results
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
iptables.main()
|
||||
self.assertTrue(result.exception.args[0]['changed'])
|
||||
|
||||
self.assertEqual(run_command.call_count, 2)
|
||||
self.assertEqual(run_command.call_args_list[0][0][0], [
|
||||
'/sbin/iptables',
|
||||
'-t',
|
||||
'nat',
|
||||
'-C',
|
||||
'PREROUTING',
|
||||
'-p',
|
||||
'udp',
|
||||
'-s',
|
||||
'1.2.3.4/32',
|
||||
'-d',
|
||||
'7.8.9.10/42',
|
||||
'-j',
|
||||
'REDIRECT',
|
||||
'--to-destination',
|
||||
'5.5.5.5/32',
|
||||
'--destination-port',
|
||||
'22',
|
||||
'--to-ports',
|
||||
'8600'
|
||||
])
|
||||
self.assertEqual(run_command.call_args_list[1][0][0], [
|
||||
'/sbin/iptables',
|
||||
'-t',
|
||||
'nat',
|
||||
'-A',
|
||||
'PREROUTING',
|
||||
'-p',
|
||||
'udp',
|
||||
'-s',
|
||||
'1.2.3.4/32',
|
||||
'-d',
|
||||
'7.8.9.10/42',
|
||||
'-j',
|
||||
'REDIRECT',
|
||||
'--to-destination',
|
||||
'5.5.5.5/32',
|
||||
'--destination-port',
|
||||
'22',
|
||||
'--to-ports',
|
||||
'8600'
|
||||
])
|
||||
|
||||
def test_remove_rule(self):
|
||||
"""Test flush without parameters"""
|
||||
set_module_args({
|
||||
'chain': 'PREROUTING',
|
||||
'source': '1.2.3.4/32',
|
||||
'destination': '7.8.9.10/42',
|
||||
'jump': 'SNAT',
|
||||
'table': 'nat',
|
||||
'to_source': '5.5.5.5/32',
|
||||
'protocol': 'udp',
|
||||
'source_port': '22',
|
||||
'to_ports': '8600',
|
||||
'state': 'absent',
|
||||
'in_interface': 'eth0',
|
||||
'out_interface': 'eth1',
|
||||
'comment': 'this is a comment'
|
||||
})
|
||||
|
||||
commands_results = [
|
||||
(0, '', ''),
|
||||
(0, '', ''),
|
||||
]
|
||||
|
||||
with patch.object(basic.AnsibleModule, 'run_command') as run_command:
|
||||
run_command.side_effect = commands_results
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
iptables.main()
|
||||
self.assertTrue(result.exception.args[0]['changed'])
|
||||
|
||||
self.assertEqual(run_command.call_count, 2)
|
||||
self.assertEqual(run_command.call_args_list[0][0][0], [
|
||||
'/sbin/iptables',
|
||||
'-t',
|
||||
'nat',
|
||||
'-C',
|
||||
'PREROUTING',
|
||||
'-p',
|
||||
'udp',
|
||||
'-s',
|
||||
'1.2.3.4/32',
|
||||
'-d',
|
||||
'7.8.9.10/42',
|
||||
'-j',
|
||||
'SNAT',
|
||||
'--to-source',
|
||||
'5.5.5.5/32',
|
||||
'-i',
|
||||
'eth0',
|
||||
'-o',
|
||||
'eth1',
|
||||
'--source-port',
|
||||
'22',
|
||||
'--to-ports',
|
||||
'8600',
|
||||
'-m',
|
||||
'comment',
|
||||
'--comment',
|
||||
'this is a comment'
|
||||
])
|
||||
self.assertEqual(run_command.call_args_list[1][0][0], [
|
||||
'/sbin/iptables',
|
||||
'-t',
|
||||
'nat',
|
||||
'-D',
|
||||
'PREROUTING',
|
||||
'-p',
|
||||
'udp',
|
||||
'-s',
|
||||
'1.2.3.4/32',
|
||||
'-d',
|
||||
'7.8.9.10/42',
|
||||
'-j',
|
||||
'SNAT',
|
||||
'--to-source',
|
||||
'5.5.5.5/32',
|
||||
'-i',
|
||||
'eth0',
|
||||
'-o',
|
||||
'eth1',
|
||||
'--source-port',
|
||||
'22',
|
||||
'--to-ports',
|
||||
'8600',
|
||||
'-m',
|
||||
'comment',
|
||||
'--comment',
|
||||
'this is a comment'
|
||||
])
|
||||
|
||||
def test_remove_rule_check_mode(self):
|
||||
"""Test flush without parameters check mode"""
|
||||
set_module_args({
|
||||
'chain': 'PREROUTING',
|
||||
'source': '1.2.3.4/32',
|
||||
'destination': '7.8.9.10/42',
|
||||
'jump': 'SNAT',
|
||||
'table': 'nat',
|
||||
'to_source': '5.5.5.5/32',
|
||||
'protocol': 'udp',
|
||||
'source_port': '22',
|
||||
'to_ports': '8600',
|
||||
'state': 'absent',
|
||||
'in_interface': 'eth0',
|
||||
'out_interface': 'eth1',
|
||||
'comment': 'this is a comment',
|
||||
'_ansible_check_mode': True,
|
||||
})
|
||||
|
||||
commands_results = [
|
||||
(0, '', ''),
|
||||
]
|
||||
|
||||
with patch.object(basic.AnsibleModule, 'run_command') as run_command:
|
||||
run_command.side_effect = commands_results
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
iptables.main()
|
||||
self.assertTrue(result.exception.args[0]['changed'])
|
||||
|
||||
self.assertEqual(run_command.call_count, 1)
|
||||
self.assertEqual(run_command.call_args_list[0][0][0], [
|
||||
'/sbin/iptables',
|
||||
'-t',
|
||||
'nat',
|
||||
'-C',
|
||||
'PREROUTING',
|
||||
'-p',
|
||||
'udp',
|
||||
'-s',
|
||||
'1.2.3.4/32',
|
||||
'-d',
|
||||
'7.8.9.10/42',
|
||||
'-j',
|
||||
'SNAT',
|
||||
'--to-source',
|
||||
'5.5.5.5/32',
|
||||
'-i',
|
||||
'eth0',
|
||||
'-o',
|
||||
'eth1',
|
||||
'--source-port',
|
||||
'22',
|
||||
'--to-ports',
|
||||
'8600',
|
||||
'-m',
|
||||
'comment',
|
||||
'--comment',
|
||||
'this is a comment'
|
||||
])
|
||||
|
||||
def test_insert_with_reject(self):
|
||||
""" Using reject_with with a previously defined jump: REJECT results in two Jump statements #18988 """
|
||||
set_module_args({
|
||||
'chain': 'INPUT',
|
||||
'protocol': 'tcp',
|
||||
'reject_with': 'tcp-reset',
|
||||
'ip_version': 'ipv4',
|
||||
})
|
||||
commands_results = [
|
||||
(0, '', ''),
|
||||
]
|
||||
|
||||
with patch.object(basic.AnsibleModule, 'run_command') as run_command:
|
||||
run_command.side_effect = commands_results
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
iptables.main()
|
||||
self.assertTrue(result.exception.args[0]['changed'])
|
||||
|
||||
self.assertEqual(run_command.call_count, 1)
|
||||
self.assertEqual(run_command.call_args_list[0][0][0], [
|
||||
'/sbin/iptables',
|
||||
'-t',
|
||||
'filter',
|
||||
'-C',
|
||||
'INPUT',
|
||||
'-p',
|
||||
'tcp',
|
||||
'-j',
|
||||
'REJECT',
|
||||
'--reject-with',
|
||||
'tcp-reset',
|
||||
])
|
||||
|
||||
def test_insert_jump_reject_with_reject(self):
|
||||
""" Using reject_with with a previously defined jump: REJECT results in two Jump statements #18988 """
|
||||
set_module_args({
|
||||
'chain': 'INPUT',
|
||||
'protocol': 'tcp',
|
||||
'jump': 'REJECT',
|
||||
'reject_with': 'tcp-reset',
|
||||
'ip_version': 'ipv4',
|
||||
})
|
||||
commands_results = [
|
||||
(0, '', ''),
|
||||
]
|
||||
|
||||
with patch.object(basic.AnsibleModule, 'run_command') as run_command:
|
||||
run_command.side_effect = commands_results
|
||||
with self.assertRaises(AnsibleExitJson) as result:
|
||||
iptables.main()
|
||||
self.assertTrue(result.exception.args[0]['changed'])
|
||||
|
||||
self.assertEqual(run_command.call_count, 1)
|
||||
self.assertEqual(run_command.call_args_list[0][0][0], [
|
||||
'/sbin/iptables',
|
||||
'-t',
|
||||
'filter',
|
||||
'-C',
|
||||
'INPUT',
|
||||
'-p',
|
||||
'tcp',
|
||||
'-j',
|
||||
'REJECT',
|
||||
'--reject-with',
|
||||
'tcp-reset',
|
||||
])
|
Loading…
Reference in New Issue