|
32 | 32 | import com.cloud.network.rules.FirewallRule; |
33 | 33 | import com.cloud.network.rules.FirewallRule.Purpose; |
34 | 34 | import com.cloud.network.rules.FirewallRuleVO; |
| 35 | +import com.cloud.network.vpc.Vpc; |
35 | 36 | import com.cloud.network.vpc.VpcManager; |
| 37 | +import com.cloud.network.vpc.VpcOfferingVO; |
| 38 | +import com.cloud.network.vpc.dao.VpcOfferingDao; |
36 | 39 | import com.cloud.user.AccountManager; |
37 | 40 | import com.cloud.user.DomainManager; |
38 | 41 | import com.cloud.utils.component.ComponentContext; |
@@ -81,6 +84,8 @@ public class FirewallManagerTest { |
81 | 84 | FirewallRulesDao _firewallDao; |
82 | 85 | @Mock |
83 | 86 | NetworkDao _networkDao; |
| 87 | + @Mock |
| 88 | + VpcOfferingDao vpcOfferingDao; |
84 | 89 |
|
85 | 90 | @Spy |
86 | 91 | @InjectMocks |
@@ -168,54 +173,102 @@ public void testApplyFWRules() { |
168 | 173 | } |
169 | 174 | } |
170 | 175 |
|
171 | | - @Test |
172 | | - public void testDetectRulesConflict() { |
173 | | - List<FirewallRuleVO> ruleList = new ArrayList<FirewallRuleVO>(); |
174 | | - FirewallRuleVO rule1 = spy(new FirewallRuleVO("rule1", 3, 500, "UDP", 1, 2, 1, Purpose.Vpn, null, null, null, null)); |
175 | | - FirewallRuleVO rule2 = spy(new FirewallRuleVO("rule2", 3, 1701, "UDP", 1, 2, 1, Purpose.Vpn, null, null, null, null)); |
176 | | - FirewallRuleVO rule3 = spy(new FirewallRuleVO("rule3", 3, 4500, "UDP", 1, 2, 1, Purpose.Vpn, null, null, null, null)); |
| 176 | + private List<FirewallRuleVO> createExistingFirewallListRulesList(long existingNetworkId) { |
| 177 | + List<FirewallRuleVO> ruleList = new ArrayList<>(); |
| 178 | + FirewallRuleVO rule1 = spy(new FirewallRuleVO("rule1", 3, 500, "UDP", existingNetworkId, 2, 1, Purpose.Vpn, null, null, null, null)); |
| 179 | + FirewallRuleVO rule2 = spy(new FirewallRuleVO("rule2", 3, 1701, "UDP", existingNetworkId, 2, 1, Purpose.Vpn, null, null, null, null)); |
| 180 | + FirewallRuleVO rule3 = spy(new FirewallRuleVO("rule3", 3, 4500, "UDP", existingNetworkId, 2, 1, Purpose.Vpn, null, null, null, null)); |
177 | 181 |
|
178 | 182 | List<String> sString = Arrays.asList("10.1.1.1/24","192.168.1.1/24"); |
179 | 183 | List<String> dString1 = Arrays.asList("10.1.1.1/25"); |
180 | | - List<String> dString2 = Arrays.asList("10.1.1.128/25"); |
181 | 184 |
|
182 | | - FirewallRuleVO rule4 = spy(new FirewallRuleVO("rule4", 3L, 10, 20, "TCP", 1, 2, 1, Purpose.Firewall, sString, dString1, null, null, |
| 185 | + FirewallRuleVO rule4 = spy(new FirewallRuleVO("rule4", 3L, 10, 20, "TCP", existingNetworkId, 2, 1, Purpose.Firewall, sString, dString1, null, null, |
183 | 186 | null, FirewallRule.TrafficType.Egress)); |
184 | 187 |
|
| 188 | + when(rule1.getId()).thenReturn(1L); |
| 189 | + when(rule2.getId()).thenReturn(2L); |
| 190 | + when(rule3.getId()).thenReturn(3L); |
| 191 | + when(rule4.getId()).thenReturn(4L); |
| 192 | + |
185 | 193 | ruleList.add(rule1); |
186 | 194 | ruleList.add(rule2); |
187 | 195 | ruleList.add(rule3); |
188 | 196 | ruleList.add(rule4); |
189 | 197 |
|
190 | | - FirewallManagerImpl firewallMgr = (FirewallManagerImpl)_firewallMgr; |
| 198 | + return ruleList; |
| 199 | + } |
191 | 200 |
|
192 | | - when(firewallMgr._firewallDao.listByIpAndPurposeAndNotRevoked(3,null)).thenReturn(ruleList); |
193 | | - when(rule1.getId()).thenReturn(1L); |
194 | | - when(rule2.getId()).thenReturn(2L); |
195 | | - when(rule3.getId()).thenReturn(3L); |
196 | | - when(rule4.getId()).thenReturn(4L); |
| 201 | + private List<FirewallRule> createNewRuleList(long newNetworkId) { |
| 202 | + List<String> sString = Arrays.asList("10.1.1.1/24","192.168.1.1/24"); |
| 203 | + List<String> dString2 = Arrays.asList("10.1.1.128/25"); |
197 | 204 |
|
198 | | - FirewallRule newRule1 = new FirewallRuleVO("newRule1", 3, 500, "TCP", 1, 2, 1, Purpose.PortForwarding, null, null, null, null); |
199 | | - FirewallRule newRule2 = new FirewallRuleVO("newRule2", 3, 1701, "TCP", 1, 2, 1, Purpose.PortForwarding, null, null, null, null); |
200 | | - FirewallRule newRule3 = new FirewallRuleVO("newRule3", 3, 4500, "TCP", 1, 2, 1, Purpose.PortForwarding, null, null, null, null); |
201 | | - FirewallRule newRule4 = new FirewallRuleVO("newRule4", 3L, 15, 25, "TCP", 1, 2, 1, Purpose.Firewall, sString, dString2, null, null, |
| 205 | + FirewallRule newRule1 = new FirewallRuleVO("newRule1", 3, 500, "TCP", newNetworkId, 2, 1, Purpose.PortForwarding, null, null, null, null); |
| 206 | + FirewallRule newRule2 = new FirewallRuleVO("newRule2", 3, 1701, "TCP", newNetworkId, 2, 1, Purpose.PortForwarding, null, null, null, null); |
| 207 | + FirewallRule newRule3 = new FirewallRuleVO("newRule3", 3, 4500, "TCP", newNetworkId, 2, 1, Purpose.PortForwarding, null, null, null, null); |
| 208 | + FirewallRule newRule4 = new FirewallRuleVO("newRule4", 3L, 15, 25, "TCP", newNetworkId, 2, 1, Purpose.Firewall, sString, dString2, null, null, |
202 | 209 | null, FirewallRule.TrafficType.Egress); |
| 210 | + return Arrays.asList(newRule1, newRule2, newRule3, newRule4); |
| 211 | + } |
| 212 | + |
| 213 | + @Test |
| 214 | + public void testDetectRulesConflictIsolatedNetwork() { |
| 215 | + List<FirewallRuleVO> ruleList = createExistingFirewallListRulesList(1L); |
| 216 | + when(_firewallMgr._firewallDao.listByIpAndPurposeAndNotRevoked(3,null)).thenReturn(ruleList); |
| 217 | + |
| 218 | + List<FirewallRule> newRuleList = createNewRuleList(1L); |
203 | 219 |
|
204 | 220 | NetworkVO networkVO = Mockito.mock(NetworkVO.class); |
205 | | - when(firewallMgr._networkDao.findById(1L)).thenReturn(networkVO); |
| 221 | + when(_firewallMgr._networkDao.findById(1L)).thenReturn(networkVO); |
206 | 222 | when(networkVO.getVpcId()).thenReturn(null); |
207 | 223 |
|
208 | 224 | try { |
209 | | - firewallMgr.detectRulesConflict(newRule1); |
210 | | - firewallMgr.detectRulesConflict(newRule2); |
211 | | - firewallMgr.detectRulesConflict(newRule3); |
212 | | - firewallMgr.detectRulesConflict(newRule4); |
| 225 | + for (FirewallRule newRule : newRuleList) { |
| 226 | + _firewallMgr.detectRulesConflict(newRule); |
| 227 | + } |
213 | 228 | } |
214 | 229 | catch (NetworkRuleConflictException ex) { |
215 | 230 | Assert.fail(); |
216 | 231 | } |
217 | 232 | } |
218 | 233 |
|
| 234 | + private void testDetectRulesConflictVpcBase(boolean vpcConserveMode) throws NetworkRuleConflictException { |
| 235 | + long existingNetworkId = 1L; |
| 236 | + long newNetworkId = 2L; |
| 237 | + long vpcId = 10L; |
| 238 | + |
| 239 | + List<FirewallRuleVO> ruleList = createExistingFirewallListRulesList(existingNetworkId); |
| 240 | + when(_firewallMgr._firewallDao.listByIpAndPurposeAndNotRevoked(3,null)).thenReturn(ruleList); |
| 241 | + |
| 242 | + List<FirewallRule> newRuleList = createNewRuleList(newNetworkId); |
| 243 | + |
| 244 | + NetworkVO newNetworkVO = Mockito.mock(NetworkVO.class); |
| 245 | + Vpc vpc = Mockito.mock(Vpc.class); |
| 246 | + VpcOfferingVO vpcOffering = Mockito.mock(VpcOfferingVO.class); |
| 247 | + |
| 248 | + when(_firewallMgr._networkDao.findById(2L)).thenReturn(newNetworkVO); |
| 249 | + when(newNetworkVO.getVpcId()).thenReturn(vpcId); |
| 250 | + when(_vpcMgr.getActiveVpc(vpcId)).thenReturn(vpc); |
| 251 | + when(vpc.getVpcOfferingId()).thenReturn(1L); |
| 252 | + when(vpcOfferingDao.findById(1L)).thenReturn(vpcOffering); |
| 253 | + when(vpcOffering.isConserveMode()).thenReturn(vpcConserveMode); |
| 254 | + |
| 255 | + for (FirewallRule newRule : newRuleList) { |
| 256 | + _firewallMgr.detectRulesConflict(newRule); |
| 257 | + } |
| 258 | + } |
| 259 | + |
| 260 | + @Test |
| 261 | + public void testDetectRulesConflictVpcConserveMode() throws NetworkRuleConflictException { |
| 262 | + // When VPC conserve mode is enabled, rules can be created for multiple network tiers |
| 263 | + testDetectRulesConflictVpcBase(true); |
| 264 | + } |
| 265 | + |
| 266 | + @Test(expected = NetworkRuleConflictException.class) |
| 267 | + public void testDetectRulesConflictVpcConserveModeFalse() throws NetworkRuleConflictException { |
| 268 | + // When VPC conserve mode is disabled, an exception should be thrown when attempting to create rules on different network tiers |
| 269 | + testDetectRulesConflictVpcBase(false); |
| 270 | + } |
| 271 | + |
219 | 272 | @Test |
220 | 273 | public void checkIfRulesHaveConflictingPortRangesTestOnlyOneRuleIsFirewallReturnsFalse() |
221 | 274 | { |
|
0 commit comments