123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114 |
- # -*- coding: utf-8 -*-
- from __future__ import absolute_import
- import pytest
- import salt.utils.platform
- from tests.support.case import ModuleCase
- from tests.support.helpers import destructiveTest, slowTest
- from tests.support.unit import skipIf
- @skipIf(not salt.utils.platform.is_windows(), "Tests for only Windows")
- @pytest.mark.windows_whitelisted
- class FirewallTest(ModuleCase):
- """
- Validate windows firewall module
- """
- def _pre_firewall_status(self, pre_run):
- post_run = self.run_function("firewall.get_config")
- network = ["Domain", "Public", "Private"]
- # compare the status of the firewall before and after test
- # and re-enable or disable depending on status before test run
- for net in network:
- if post_run[net] != pre_run[net]:
- if pre_run[net]:
- self.assertTrue(self.run_function("firewall.enable", profile=net))
- else:
- self.assertTrue(self.run_function("firewall.disable", profile=net))
- @destructiveTest
- @slowTest
- def test_firewall_get_config(self):
- """
- test firewall.get_config
- """
- pre_run = self.run_function("firewall.get_config")
- # ensure all networks are enabled then test status
- self.assertTrue(self.run_function("firewall.enable", profile="allprofiles"))
- ret = self.run_function("firewall.get_config")
- network = ["Domain", "Public", "Private"]
- for net in network:
- self.assertTrue(ret[net])
- self._pre_firewall_status(pre_run)
- @destructiveTest
- @slowTest
- def test_firewall_disable(self):
- """
- test firewall.disable
- """
- pre_run = self.run_function("firewall.get_config")
- network = "Private"
- ret = self.run_function("firewall.get_config")[network]
- if not ret:
- self.assertTrue(self.run_function("firewall.enable", profile=network))
- self.assertTrue(self.run_function("firewall.disable", profile=network))
- ret = self.run_function("firewall.get_config")[network]
- self.assertFalse(ret)
- self._pre_firewall_status(pre_run)
- @destructiveTest
- @slowTest
- def test_firewall_enable(self):
- """
- test firewall.enable
- """
- pre_run = self.run_function("firewall.get_config")
- network = "Private"
- ret = self.run_function("firewall.get_config")[network]
- if ret:
- self.assertTrue(self.run_function("firewall.disable", profile=network))
- self.assertTrue(self.run_function("firewall.enable", profile=network))
- ret = self.run_function("firewall.get_config")[network]
- self.assertTrue(ret)
- self._pre_firewall_status(pre_run)
- @slowTest
- def test_firewall_get_rule(self):
- """
- test firewall.get_rule
- """
- rule = "Remote Event Log Management (NP-In)"
- ret = self.run_function("firewall.get_rule", [rule])
- checks = ["Private", "LocalPort", "RemotePort"]
- for check in checks:
- self.assertIn(check, ret[rule])
- @destructiveTest
- @slowTest
- def test_firewall_add_delete_rule(self):
- """
- test firewall.add_rule and delete_rule
- """
- rule = "test rule"
- port = "8080"
- # test adding firewall rule
- add_rule = self.run_function("firewall.add_rule", [rule, port])
- ret = self.run_function("firewall.get_rule", [rule])
- self.assertIn(rule, ret[rule])
- self.assertIn(port, ret[rule])
- # test deleting firewall rule
- self.assertTrue(self.run_function("firewall.delete_rule", [rule, port]))
- ret = self.run_function("firewall.get_rule", [rule])
- self.assertNotIn(rule, ret)
- self.assertNotIn(port, ret)
- self.assertIn("No rules match the specified criteria.", ret)
|