root / spec / classes / router_spec.rb @ 7cc88e25
Historique | Voir | Annoter | Télécharger (8,94 ko)
1 |
require 'spec_helper'
|
---|---|
2 |
|
3 |
describe 'nftables' do |
4 |
let(:pre_condition) { 'Exec{path => "/bin"}' } |
5 |
|
6 |
on_supported_os.each do |os, os_facts|
|
7 |
context "on #{os}" do |
8 |
let(:facts) { os_facts }
|
9 |
|
10 |
context 'as router' do |
11 |
let(:pre_condition) do |
12 |
""" |
13 |
# inet-filter-chain-ingoing
|
14 |
nftables::chain{ 'ingoing':
|
15 |
inject => '20-default_fwd',
|
16 |
inject_iif => 'eth0',
|
17 |
inject_oif => 'eth1';
|
18 |
}
|
19 |
|
20 |
# inet-filter-chain-default_fwd
|
21 |
nftables::rules::dnat4{
|
22 |
'http':
|
23 |
order => '10',
|
24 |
chain => 'ingoing',
|
25 |
daddr => '192.0.2.2',
|
26 |
port => 'http';
|
27 |
'https':
|
28 |
order => '10',
|
29 |
chain => 'ingoing',
|
30 |
daddr => '192.0.2.2',
|
31 |
port => 'https';
|
32 |
'http_alt':
|
33 |
order => '10',
|
34 |
chain => 'ingoing',
|
35 |
iif => 'eth0',
|
36 |
daddr => '192.0.2.2',
|
37 |
proto => 'tcp',
|
38 |
port => 8080,
|
39 |
dport => 80;
|
40 |
'wireguard':
|
41 |
order => '10',
|
42 |
chain => 'ingoing',
|
43 |
iif => 'eth0',
|
44 |
daddr => '192.0.2.3',
|
45 |
proto => 'udp',
|
46 |
port => '51820';
|
47 |
}
|
48 |
|
49 |
# inet-filter-chain-default_fwd
|
50 |
nftables::rule{
|
51 |
'default_fwd-out':
|
52 |
order => '20',
|
53 |
content => 'iifname eth1 oifname eth0 accept';
|
54 |
'default_fwd-drop':
|
55 |
order => '90',
|
56 |
content => 'iifname eth0 drop';
|
57 |
|
58 |
'POSTROUTING-masquerade':
|
59 |
table => 'ip-nat',
|
60 |
order => '20',
|
61 |
content => 'oifname eth0 masquerade';
|
62 |
}
|
63 |
""" |
64 |
end
|
65 |
|
66 |
it { is_expected.to compile } |
67 |
|
68 |
it { is_expected.to contain_concat('nftables-inet-filter-chain-default_fwd').with(
|
69 |
:path => '/etc/nftables/puppet/inet-filter-chain-default_fwd.nft', |
70 |
:owner => 'root', |
71 |
:group => 'root', |
72 |
:mode => '0640', |
73 |
:ensure_newline => true, |
74 |
)} |
75 |
it { is_expected.to contain_concat__fragment('nftables-inet-filter-chain-default_fwd-header').with(
|
76 |
:target => 'nftables-inet-filter-chain-default_fwd', |
77 |
:content => /^chain default_fwd {$/, |
78 |
:order => '00', |
79 |
)} |
80 |
it { is_expected.to contain_concat__fragment('nftables-inet-filter-chain-default_fwd-rule-out').with(
|
81 |
:target => 'nftables-inet-filter-chain-default_fwd', |
82 |
:content => /^ iifname eth1 oifname eth0 accept$/, |
83 |
:order => '20', |
84 |
)} |
85 |
it { is_expected.to contain_concat__fragment('nftables-inet-filter-chain-default_fwd-rule-jump_ingoing').with(
|
86 |
:target => 'nftables-inet-filter-chain-default_fwd', |
87 |
:content => /^ iifname eth0 oifname eth1 jump ingoing$/, |
88 |
:order => '20', |
89 |
)} |
90 |
it { is_expected.to contain_concat__fragment('nftables-inet-filter-chain-default_fwd-rule-drop').with(
|
91 |
:target => 'nftables-inet-filter-chain-default_fwd', |
92 |
:content => /^ iifname eth0 drop$/, |
93 |
:order => '90', |
94 |
)} |
95 |
it { is_expected.to contain_concat__fragment('nftables-inet-filter-chain-default_fwd-footer').with(
|
96 |
:target => 'nftables-inet-filter-chain-default_fwd', |
97 |
:content => /^}$/, |
98 |
:order => '99', |
99 |
)} |
100 |
|
101 |
it { is_expected.to contain_concat__fragment('nftables-inet-filter-chain-ingoing-header').with(
|
102 |
:target => 'nftables-inet-filter-chain-ingoing', |
103 |
:content => /^chain ingoing {$/, |
104 |
:order => '00', |
105 |
)} |
106 |
it { is_expected.to contain_concat__fragment('nftables-inet-filter-chain-ingoing-rule-http').with(
|
107 |
:target => 'nftables-inet-filter-chain-ingoing', |
108 |
:content => /^ ip daddr 192.0.2.2 tcp dport http accept$/, |
109 |
:order => '10', |
110 |
)} |
111 |
it { is_expected.to contain_concat__fragment('nftables-inet-filter-chain-ingoing-rule-https').with(
|
112 |
:target => 'nftables-inet-filter-chain-ingoing', |
113 |
:content => /^ ip daddr 192.0.2.2 tcp dport https accept$/, |
114 |
:order => '10', |
115 |
)} |
116 |
it { is_expected.to contain_concat__fragment('nftables-inet-filter-chain-ingoing-rule-http_alt').with(
|
117 |
:target => 'nftables-inet-filter-chain-ingoing', |
118 |
:content => /^ iifname eth0 ip daddr 192.0.2.2 tcp dport 80 accept$/, |
119 |
:order => '10', |
120 |
)} |
121 |
it { is_expected.to contain_concat__fragment('nftables-inet-filter-chain-ingoing-rule-wireguard').with(
|
122 |
:target => 'nftables-inet-filter-chain-ingoing', |
123 |
:content => /^ iifname eth0 ip daddr 192.0.2.3 udp dport 51820 accept$/, |
124 |
:order => '10', |
125 |
)} |
126 |
it { is_expected.to contain_concat__fragment('nftables-inet-filter-chain-ingoing-footer').with(
|
127 |
:target => 'nftables-inet-filter-chain-ingoing', |
128 |
:content => /^}$/, |
129 |
:order => '99', |
130 |
)} |
131 |
|
132 |
it { is_expected.to contain_concat('nftables-ip-nat-chain-PREROUTING').with(
|
133 |
:path => '/etc/nftables/puppet/ip-nat-chain-PREROUTING.nft', |
134 |
:owner => 'root', |
135 |
:group => 'root', |
136 |
:mode => '0640', |
137 |
:ensure_newline => true, |
138 |
)} |
139 |
it { is_expected.to contain_concat__fragment('nftables-ip-nat-chain-PREROUTING-header').with(
|
140 |
:target => 'nftables-ip-nat-chain-PREROUTING', |
141 |
:content => /^chain PREROUTING {$/, |
142 |
:order => '00', |
143 |
)} |
144 |
it { is_expected.to contain_concat__fragment('nftables-ip-nat-chain-PREROUTING-rule-type').with(
|
145 |
:target => 'nftables-ip-nat-chain-PREROUTING', |
146 |
:content => /^ type nat hook prerouting priority -100$/, |
147 |
:order => '01', |
148 |
)} |
149 |
it { is_expected.to contain_concat__fragment('nftables-ip-nat-chain-PREROUTING-rule-policy').with(
|
150 |
:target => 'nftables-ip-nat-chain-PREROUTING', |
151 |
:content => /^ policy accept$/, |
152 |
:order => '02', |
153 |
)} |
154 |
it { is_expected.to contain_concat__fragment('nftables-ip-nat-chain-PREROUTING-rule-http').with(
|
155 |
:target => 'nftables-ip-nat-chain-PREROUTING', |
156 |
:content => /^ tcp dport http dnat to 192.0.2.2$/, |
157 |
:order => '10', |
158 |
)} |
159 |
it { is_expected.to contain_concat__fragment('nftables-ip-nat-chain-PREROUTING-rule-https').with(
|
160 |
:target => 'nftables-ip-nat-chain-PREROUTING', |
161 |
:content => /^ tcp dport https dnat to 192.0.2.2$/, |
162 |
:order => '10', |
163 |
)} |
164 |
it { is_expected.to contain_concat__fragment('nftables-ip-nat-chain-PREROUTING-rule-http_alt').with(
|
165 |
:target => 'nftables-ip-nat-chain-PREROUTING', |
166 |
:content => /^ iifname eth0 tcp dport 8080 dnat to 192.0.2.2:80$/, |
167 |
:order => '10', |
168 |
)} |
169 |
it { is_expected.to contain_concat__fragment('nftables-ip-nat-chain-PREROUTING-rule-wireguard').with(
|
170 |
:target => 'nftables-ip-nat-chain-PREROUTING', |
171 |
:content => /^ iifname eth0 udp dport 51820 dnat to 192.0.2.3$/, |
172 |
:order => '10', |
173 |
)} |
174 |
it { is_expected.to contain_concat__fragment('nftables-ip-nat-chain-PREROUTING-footer').with(
|
175 |
:target => 'nftables-ip-nat-chain-PREROUTING', |
176 |
:content => /^}$/, |
177 |
:order => '99', |
178 |
)} |
179 |
|
180 |
it { is_expected.to contain_concat('nftables-ip-nat-chain-POSTROUTING').with(
|
181 |
:path => '/etc/nftables/puppet/ip-nat-chain-POSTROUTING.nft', |
182 |
:owner => 'root', |
183 |
:group => 'root', |
184 |
:mode => '0640', |
185 |
:ensure_newline => true, |
186 |
)} |
187 |
it { is_expected.to contain_concat__fragment('nftables-ip-nat-chain-POSTROUTING-header').with(
|
188 |
:target => 'nftables-ip-nat-chain-POSTROUTING', |
189 |
:content => /^chain POSTROUTING {$/, |
190 |
:order => '00', |
191 |
)} |
192 |
it { is_expected.to contain_concat__fragment('nftables-ip-nat-chain-POSTROUTING-rule-type').with(
|
193 |
:target => 'nftables-ip-nat-chain-POSTROUTING', |
194 |
:content => /^ type nat hook postrouting priority 100$/, |
195 |
:order => '01', |
196 |
)} |
197 |
it { is_expected.to contain_concat__fragment('nftables-ip-nat-chain-POSTROUTING-rule-policy').with(
|
198 |
:target => 'nftables-ip-nat-chain-POSTROUTING', |
199 |
:content => /^ policy accept$/, |
200 |
:order => '02', |
201 |
)} |
202 |
it { is_expected.to contain_concat__fragment('nftables-ip-nat-chain-POSTROUTING-rule-masquerade').with(
|
203 |
:target => 'nftables-ip-nat-chain-POSTROUTING', |
204 |
:content => /^ oifname eth0 masquerade$/, |
205 |
:order => '20', |
206 |
)} |
207 |
it { is_expected.to contain_concat__fragment('nftables-ip-nat-chain-POSTROUTING-footer').with(
|
208 |
:target => 'nftables-ip-nat-chain-POSTROUTING', |
209 |
:content => /^}$/, |
210 |
:order => '99', |
211 |
)} |
212 |
end
|
213 |
end
|
214 |
end
|
215 |
end
|