1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85
|
package netceptor
import (
"testing"
)
func TestFirewallRules(t *testing.T) {
var frd FirewallRuleData
// Rule #1
frd = FirewallRuleData{}
frd["action"] = "accept"
rule, err := frd.ParseFirewallRule()
if err != nil {
t.Fatal(err)
}
if rule(&MessageData{}) != FirewallResultAccept {
t.Fatal("rule #1 did not return Accept")
}
// // Rule #2
frd = FirewallRuleData{}
frd["Action"] = "drop"
frd["FromNode"] = "foo"
frd["ToNode"] = "bar"
frd["ToService"] = "control"
rule, err = frd.ParseFirewallRule()
if err != nil {
t.Fatal(err)
}
if rule(&MessageData{}) != FirewallResultContinue {
t.Fatal("rule #2 did not return Continue")
}
if rule(&MessageData{
FromNode: "foo",
ToNode: "bar",
ToService: "control",
}) != FirewallResultDrop {
t.Fatal("rule #2 did not return Drop")
}
// Rule #3
frd = FirewallRuleData{}
frd["fromnode"] = "/a.*b/"
frd["action"] = "reject"
rule, err = frd.ParseFirewallRule()
if err != nil {
t.Fatal(err)
}
if rule(&MessageData{}) != FirewallResultContinue {
t.Fatal("rule #3 did not return Continue")
}
if rule(&MessageData{
FromNode: "appleb",
}) != FirewallResultReject {
t.Fatal("rule #3 did not return Reject")
}
if rule(&MessageData{
FromNode: "Appleb",
}) != FirewallResultContinue {
t.Fatal("rule #3 did not return Continue")
}
// Rule #4
frd = FirewallRuleData{}
frd["TONODE"] = "/(?i)a.*b/"
frd["ACTION"] = "reject"
rule, err = frd.ParseFirewallRule()
if err != nil {
t.Fatal(err)
}
if rule(&MessageData{}) != FirewallResultContinue {
t.Fatal("rule #4 did not return Continue")
}
if rule(&MessageData{
ToNode: "appleb",
}) != FirewallResultReject {
t.Fatal("rule #4 did not return Reject")
}
if rule(&MessageData{
ToNode: "Appleb",
}) != FirewallResultReject {
t.Fatal("rule #4 did not return Reject")
}
}
|