Added puppetlabs-firewall (required by puppetlabs-postgresql), updated the other modules.
This commit is contained in:
parent
5f4b7a3b72
commit
dee66abcdd
137 changed files with 11118 additions and 419 deletions
77
modules/firewall/spec/acceptance/change_source_spec.rb
Normal file
77
modules/firewall/spec/acceptance/change_source_spec.rb
Normal file
|
@ -0,0 +1,77 @@
|
|||
require 'spec_helper_acceptance'
|
||||
|
||||
describe 'firewall type', :unless => UNSUPPORTED_PLATFORMS.include?(fact('osfamily')) do
|
||||
describe 'reset' do
|
||||
it 'deletes all rules' do
|
||||
shell('iptables --flush; iptables -t nat --flush; iptables -t mangle --flush')
|
||||
end
|
||||
end
|
||||
|
||||
describe 'when unmanaged rules exist' do
|
||||
it 'applies with 8.0.0.1 first' do
|
||||
pp = <<-EOS
|
||||
class { '::firewall': }
|
||||
firewall { '101 test source changes':
|
||||
proto => tcp,
|
||||
port => '101',
|
||||
action => accept,
|
||||
source => '8.0.0.1',
|
||||
}
|
||||
firewall { '100 test source static':
|
||||
proto => tcp,
|
||||
port => '100',
|
||||
action => accept,
|
||||
source => '8.0.0.2',
|
||||
}
|
||||
EOS
|
||||
|
||||
apply_manifest(pp, :catch_failures => true)
|
||||
end
|
||||
|
||||
it 'adds a unmanaged rule without a comment' do
|
||||
shell('iptables -A INPUT -t filter -s 8.0.0.3/32 -p tcp -m multiport --ports 102 -j ACCEPT')
|
||||
expect(shell('iptables-save').stdout).to match(/-A INPUT -s 8\.0\.0\.3(\/32)? -p tcp -m multiport --ports 102 -j ACCEPT/)
|
||||
end
|
||||
|
||||
it 'contains the changable 8.0.0.1 rule' do
|
||||
shell('iptables-save') do |r|
|
||||
expect(r.stdout).to match(/-A INPUT -s 8\.0\.0\.1(\/32)? -p tcp -m multiport --ports 101 -m comment --comment "101 test source changes" -j ACCEPT/)
|
||||
end
|
||||
end
|
||||
it 'contains the static 8.0.0.2 rule' do
|
||||
shell('iptables-save') do |r|
|
||||
expect(r.stdout).to match(/-A INPUT -s 8\.0\.0\.2(\/32)? -p tcp -m multiport --ports 100 -m comment --comment "100 test source static" -j ACCEPT/)
|
||||
end
|
||||
end
|
||||
|
||||
it 'changes to 8.0.0.4 second' do
|
||||
pp = <<-EOS
|
||||
class { '::firewall': }
|
||||
firewall { '101 test source changes':
|
||||
proto => tcp,
|
||||
port => '101',
|
||||
action => accept,
|
||||
source => '8.0.0.4',
|
||||
}
|
||||
EOS
|
||||
|
||||
expect(apply_manifest(pp, :catch_failures => true).stdout).to match(/Notice: \/Stage\[main\]\/Main\/Firewall\[101 test source changes\]\/source: source changed '8\.0\.0\.1\/32' to '8\.0\.0\.4\/32'/)
|
||||
end
|
||||
|
||||
it 'does not contain the old changing 8.0.0.1 rule' do
|
||||
shell('iptables-save') do |r|
|
||||
expect(r.stdout).to_not match(/8\.0\.0\.1/)
|
||||
end
|
||||
end
|
||||
it 'contains the staic 8.0.0.2 rule' do
|
||||
shell('iptables-save') do |r|
|
||||
expect(r.stdout).to match(/-A INPUT -s 8\.0\.0\.2(\/32)? -p tcp -m multiport --ports 100 -m comment --comment "100 test source static" -j ACCEPT/)
|
||||
end
|
||||
end
|
||||
it 'contains the changing new 8.0.0.4 rule' do
|
||||
shell('iptables-save') do |r|
|
||||
expect(r.stdout).to match(/-A INPUT -s 8\.0\.0\.4(\/32)? -p tcp -m multiport --ports 101 -m comment --comment "101 test source changes" -j ACCEPT/)
|
||||
end
|
||||
end
|
||||
end
|
||||
end
|
Loading…
Add table
Add a link
Reference in a new issue