|
27 | 27 | import com.cloud.network.element.FirewallServiceProvider; |
28 | 28 | import com.cloud.network.element.VirtualRouterElement; |
29 | 29 | import com.cloud.network.element.VpcVirtualRouterElement; |
30 | | -import com.cloud.network.rules.FirewallManager; |
31 | 30 | import com.cloud.network.rules.FirewallRule; |
32 | 31 | import com.cloud.network.rules.FirewallRule.Purpose; |
33 | 32 | import com.cloud.network.rules.FirewallRuleVO; |
34 | 33 | import com.cloud.network.vpc.VpcManager; |
35 | 34 | import com.cloud.user.AccountManager; |
36 | 35 | import com.cloud.user.DomainManager; |
37 | 36 | import com.cloud.utils.component.ComponentContext; |
38 | | -import junit.framework.Assert; |
39 | 37 | import org.apache.cloudstack.engine.orchestration.service.NetworkOrchestrationService; |
40 | 38 | import org.apache.log4j.Logger; |
| 39 | +import org.junit.Assert; |
41 | 40 | import org.junit.Before; |
42 | 41 | import org.junit.Ignore; |
43 | 42 | import org.junit.Test; |
44 | 43 | import org.junit.runner.RunWith; |
45 | 44 | import org.mockito.InjectMocks; |
46 | 45 | import org.mockito.Mock; |
47 | 46 | import org.mockito.MockitoAnnotations; |
48 | | -import org.mockito.runners.MockitoJUnitRunner; |
| 47 | +import org.mockito.Spy; |
| 48 | +import org.mockito.junit.MockitoJUnitRunner; |
49 | 49 |
|
50 | 50 | import java.util.ArrayList; |
51 | 51 | import java.util.Arrays; |
@@ -108,12 +108,35 @@ public void testInjected() { |
108 | 108 | @Mock |
109 | 109 | FirewallRulesDao _firewallDao; |
110 | 110 |
|
| 111 | + @Spy |
111 | 112 | @InjectMocks |
112 | | - FirewallManager _firewallMgr = new FirewallManagerImpl(); |
| 113 | + FirewallManagerImpl _firewallMgr; |
| 114 | + |
| 115 | + FirewallRule fwRule50to150; |
| 116 | + FirewallRule fwRule100to200; |
| 117 | + FirewallRule fwRule151to200; |
| 118 | + |
| 119 | + FirewallRule pfRule50to150; |
| 120 | + FirewallRule pfRule100to200; |
| 121 | + FirewallRule pfRule151to200; |
| 122 | + |
113 | 123 |
|
114 | 124 | @Before |
115 | 125 | public void initMocks() { |
116 | 126 | MockitoAnnotations.initMocks(this); |
| 127 | + |
| 128 | + fwRule50to150 = createFirewallRule(50, 150, Purpose.Firewall); |
| 129 | + fwRule100to200 = createFirewallRule(100, 150, Purpose.Firewall); |
| 130 | + fwRule151to200 = createFirewallRule(151, 200, Purpose.Firewall); |
| 131 | + |
| 132 | + pfRule50to150 = createFirewallRule(50, 150, Purpose.PortForwarding); |
| 133 | + pfRule100to200 = createFirewallRule(100, 150, Purpose.PortForwarding); |
| 134 | + pfRule151to200 = createFirewallRule(151, 200, Purpose.PortForwarding); |
| 135 | + } |
| 136 | + |
| 137 | + private FirewallRule createFirewallRule(int startPort, int endPort, Purpose purpose) { |
| 138 | + return new FirewallRuleVO("xid", 1L, startPort, endPort, "TCP", 2, 3, 4, purpose, new ArrayList<>(), |
| 139 | + new ArrayList<>(), 5, 6, null, FirewallRule.TrafficType.Ingress); |
117 | 140 | } |
118 | 141 |
|
119 | 142 | @Ignore("Requires database to be set up") |
@@ -210,6 +233,75 @@ public void testDetectRulesConflict() { |
210 | 233 | } |
211 | 234 | } |
212 | 235 |
|
| 236 | + @Test |
| 237 | + public void checkIfRulesHaveConflictingPortRangesTestOnlyOneRuleIsFirewallReturnsFalse() |
| 238 | + { |
| 239 | + boolean result = _firewallMgr.checkIfRulesHaveConflictingPortRanges(fwRule50to150, pfRule50to150, true, false, false, true); |
| 240 | + |
| 241 | + Assert.assertFalse(result); |
| 242 | + } |
| 243 | + |
| 244 | + @Test |
| 245 | + public void checkIfRulesHaveConflictingPortRangesTestBothRulesAreFirewallButNoDuplicateCidrsReturnsFalse() |
| 246 | + { |
| 247 | + boolean result = _firewallMgr.checkIfRulesHaveConflictingPortRanges(fwRule50to150, fwRule50to150, false, true, false, false); |
| 248 | + |
| 249 | + Assert.assertFalse(result); |
| 250 | + } |
| 251 | + |
| 252 | + @Test |
| 253 | + public void checkIfRulesHaveConflictingPortRangesTestBothRulesArePortForwardingButNoDuplicateCidrsReturnsFalse() |
| 254 | + { |
| 255 | + boolean result = _firewallMgr.checkIfRulesHaveConflictingPortRanges(pfRule50to150, pfRule50to150, false, false, true, false); |
| 256 | + |
| 257 | + Assert.assertFalse(result); |
| 258 | + } |
| 259 | + |
| 260 | + @Test |
| 261 | + public void checkIfRulesHaveConflictingPortRangesTestBothRulesAreFirewallAndDuplicatedCidrsAndNewRuleSourceStartPortIsInsideExistingRangeReturnsTrue() |
| 262 | + { |
| 263 | + boolean result = _firewallMgr.checkIfRulesHaveConflictingPortRanges(fwRule100to200, fwRule50to150, false, true, false, true); |
| 264 | + |
| 265 | + Assert.assertTrue(result); |
| 266 | + } |
| 267 | + |
| 268 | + @Test |
| 269 | + public void checkIfRulesHaveConflictingPortRangesTestBothRulesAreFirewallAndDuplicatedCidrsAndNewRuleSourceEndPortIsInsideExistingRangeReturnsTrue() |
| 270 | + { |
| 271 | + boolean result = _firewallMgr.checkIfRulesHaveConflictingPortRanges(fwRule50to150, fwRule100to200, false, true, false, true); |
| 272 | + |
| 273 | + Assert.assertTrue(result); |
| 274 | + } |
| 275 | + |
| 276 | + @Test |
| 277 | + public void checkIfRulesHaveConflictingPortRangesTestBothRulesArePortForwardingAndDuplicatedCidrsAndNewRuleSourceStartPortIsInsideExistingRangeReturnsTrue() |
| 278 | + { |
| 279 | + boolean result = _firewallMgr.checkIfRulesHaveConflictingPortRanges(pfRule50to150, pfRule100to200, false, false, true, true); |
| 280 | + |
| 281 | + Assert.assertTrue(result); |
| 282 | + } |
| 283 | + |
| 284 | + @Test |
| 285 | + public void checkIfRulesHaveConflictingPortRangesTestBothRulesArePortForwardingAndDuplicatedCidrsAndNewRuleSourceEndPortIsInsideExistingRangeReturnsTrue() |
| 286 | + { |
| 287 | + boolean result = _firewallMgr.checkIfRulesHaveConflictingPortRanges(pfRule50to150, pfRule100to200, false, false, true, true); |
| 288 | + |
| 289 | + Assert.assertTrue(result); |
| 290 | + } |
| 291 | + |
| 292 | + @Test |
| 293 | + public void checkIfRulesHaveConflictingPortRangesTestBothRulesAreFirewallAndDuplicatedCidrsAndNoRangeConflictReturnsFalse() |
| 294 | + { |
| 295 | + boolean result = _firewallMgr.checkIfRulesHaveConflictingPortRanges(fwRule50to150, fwRule151to200, false, true, false, true); |
213 | 296 |
|
| 297 | + Assert.assertFalse(result); |
| 298 | + } |
214 | 299 |
|
| 300 | + @Test |
| 301 | + public void checkIfRulesHaveConflictingPortRangesTestBothRulesArePortForwardingAndDuplicatedCidrsAndNoRangeConflictReturnsFalse() |
| 302 | + { |
| 303 | + boolean result = _firewallMgr.checkIfRulesHaveConflictingPortRanges(pfRule50to150, pfRule151to200, false, false, true, true); |
| 304 | + |
| 305 | + Assert.assertFalse(result); |
| 306 | + } |
215 | 307 | } |
0 commit comments