mirror of https://github.com/fail2ban/fail2ban
More beautifier tests
parent
d65e37e93d
commit
50e5a7e538
|
@ -26,6 +26,7 @@ import unittest
|
||||||
from ..client.beautifier import Beautifier
|
from ..client.beautifier import Beautifier
|
||||||
from ..version import version
|
from ..version import version
|
||||||
from ..server.ipdns import IPAddr
|
from ..server.ipdns import IPAddr
|
||||||
|
from ..exceptions import UnknownJailException, DuplicateJailException
|
||||||
|
|
||||||
class BeautifierTest(unittest.TestCase):
|
class BeautifierTest(unittest.TestCase):
|
||||||
|
|
||||||
|
@ -57,10 +58,6 @@ class BeautifierTest(unittest.TestCase):
|
||||||
self.b.setInputCmd(["start"])
|
self.b.setInputCmd(["start"])
|
||||||
self.assertEqual(self.b.beautify(None), "Jail started")
|
self.assertEqual(self.b.beautify(None), "Jail started")
|
||||||
|
|
||||||
def testFlushLogs(self):
|
|
||||||
self.b.setInputCmd(["flushlogs"])
|
|
||||||
self.assertEqual(self.b.beautify("rolled over"), "logs: rolled over")
|
|
||||||
|
|
||||||
def testStopJail(self):
|
def testStopJail(self):
|
||||||
self.b.setInputCmd(["stop", "ssh"])
|
self.b.setInputCmd(["stop", "ssh"])
|
||||||
self.assertEqual(self.b.beautify(None), "Jail stopped")
|
self.assertEqual(self.b.beautify(None), "Jail stopped")
|
||||||
|
@ -95,15 +92,168 @@ class BeautifierTest(unittest.TestCase):
|
||||||
]
|
]
|
||||||
)
|
)
|
||||||
)
|
)
|
||||||
output = """Status for the jail: ssh
|
output = "Status for the jail: ssh\n"
|
||||||
|- Filter
|
output += "|- Filter\n"
|
||||||
| |- Currently failed: 0
|
output += "| |- Currently failed: 0\n"
|
||||||
| |- Total failed: 0
|
output += "| |- Total failed: 0\n"
|
||||||
| `- File list: /var/log/auth.log
|
output += "| `- File list: /var/log/auth.log\n"
|
||||||
`- Actions
|
output += "`- Actions\n"
|
||||||
|- Currently banned: 3
|
output += " |- Currently banned: 3\n"
|
||||||
|- Total banned: 3
|
output += " |- Total banned: 3\n"
|
||||||
`- Banned IP list: 192.168.0.1 10.2.2.1 2001:db8::1"""
|
output += " `- Banned IP list: 192.168.0.1 10.2.2.1 2001:db8::1"
|
||||||
|
|
||||||
self.assertEqual(self.b.beautify(response), output)
|
self.assertEqual(self.b.beautify(response), output)
|
||||||
|
|
||||||
|
def testFlushLogs(self):
|
||||||
|
self.b.setInputCmd(["flushlogs"])
|
||||||
|
self.assertEqual(self.b.beautify("rolled over"), "logs: rolled over")
|
||||||
|
|
||||||
|
def testSyslogSocket(self):
|
||||||
|
self.b.setInputCmd(["get", "syslogsocket"])
|
||||||
|
output = "Current syslog socket is:\n`- auto"
|
||||||
|
self.assertEqual(self.b.beautify("auto"), output)
|
||||||
|
|
||||||
|
def testLogTarget(self):
|
||||||
|
self.b.setInputCmd(["get", "logtarget"])
|
||||||
|
output = "Current logging target is:\n`- /var/log/fail2ban.log"
|
||||||
|
self.assertEqual(self.b.beautify("/var/log/fail2ban.log"), output)
|
||||||
|
|
||||||
|
def testLogLevel(self):
|
||||||
|
self.b.setInputCmd(["get", "loglevel"])
|
||||||
|
output = "Current logging level is 'INFO'"
|
||||||
|
self.assertEqual(self.b.beautify("INFO"), output)
|
||||||
|
|
||||||
|
def testDbFile(self):
|
||||||
|
self.b.setInputCmd(["get", "dbfile"])
|
||||||
|
response = "/var/lib/fail2ban/fail2ban.sqlite3"
|
||||||
|
output = "Current database file is:\n`- " + response
|
||||||
|
self.assertEqual(self.b.beautify(response), output)
|
||||||
|
self.assertEqual(self.b.beautify(None), "Database currently disabled")
|
||||||
|
|
||||||
|
def testDbPurgeAge(self):
|
||||||
|
self.b.setInputCmd(["get", "dbpurgeage"])
|
||||||
|
output = "Current database purge age is:\n`- 86400seconds"
|
||||||
|
self.assertEqual(self.b.beautify(86400), output)
|
||||||
|
self.assertEqual(self.b.beautify(None), "Database currently disabled")
|
||||||
|
|
||||||
|
def testLogPath(self):
|
||||||
|
self.b.setInputCmd(["get", "sshd", "logpath"])
|
||||||
|
response = []
|
||||||
|
output = "No file is currently monitored"
|
||||||
|
self.assertEqual(self.b.beautify(response), output)
|
||||||
|
response = ["/var/log/auth.log"]
|
||||||
|
output = "Current monitored log file(s):\n`- /var/log/auth.log"
|
||||||
|
self.assertEqual(self.b.beautify(response), output)
|
||||||
|
|
||||||
|
self.b.setInputCmd(["set", "sshd", "addlogpath", "/var/log/messages"])
|
||||||
|
response = ["/var/log/messages", "/var/log/auth.log"]
|
||||||
|
outputadd = "Current monitored log file(s):\n"
|
||||||
|
outputadd += "|- /var/log/messages\n`- /var/log/auth.log"
|
||||||
|
self.assertEqual(self.b.beautify(response), outputadd)
|
||||||
|
|
||||||
|
self.b.setInputCmd(["set", "sshd", "dellogpath", "/var/log/messages"])
|
||||||
|
response = ["/var/log/auth.log"]
|
||||||
|
self.assertEqual(self.b.beautify(response), output)
|
||||||
|
|
||||||
|
def testLogEncoding(self):
|
||||||
|
self.b.setInputCmd(["get", "sshd", "logencoding"])
|
||||||
|
output = "Current log encoding is set to:\nUTF-8"
|
||||||
|
self.assertEqual(self.b.beautify("UTF-8"), output)
|
||||||
|
|
||||||
|
def testJournalMatch(self):
|
||||||
|
self.b.setInputCmd(["get", "sshd", "journalmatch"])
|
||||||
|
self.assertEqual(self.b.beautify([]), "No journal match filter set")
|
||||||
|
|
||||||
|
self.b.setInputCmd(["set", "sshd", "addjournalmatch"])
|
||||||
|
response = [["_SYSTEMD_UNIT", "sshd.service"]]
|
||||||
|
output = "Current match filter:\n"
|
||||||
|
output += "_SYSTEMD_UNIT sshd.service"
|
||||||
|
self.assertEqual(self.b.beautify(response), output)
|
||||||
|
|
||||||
|
response.append(["_COMM", "sshd"])
|
||||||
|
output += " + _COMM sshd"
|
||||||
|
self.assertEqual(self.b.beautify(response), output)
|
||||||
|
|
||||||
|
self.b.setInputCmd(["set", "sshd", "deljournalmatch"])
|
||||||
|
response.remove(response[1])
|
||||||
|
self.assertEqual(self.b.beautify(response), output.split(" + ")[0])
|
||||||
|
|
||||||
|
def testDatePattern(self):
|
||||||
|
self.b.setInputCmd(["get", "sshd", "datepattern"])
|
||||||
|
output = "Current date pattern set to: "
|
||||||
|
response = (None, "Default Detectors")
|
||||||
|
self.assertEqual(self.b.beautify(None),
|
||||||
|
output + "Not set/required")
|
||||||
|
self.assertEqual(self.b.beautify(response),
|
||||||
|
output + "Default Detectors")
|
||||||
|
self.assertEqual(self.b.beautify(("test", "test")),
|
||||||
|
output + "test (test)")
|
||||||
|
|
||||||
|
def testIgnoreIP(self):
|
||||||
|
self.b.setInputCmd(["get", "sshd", "ignoreip"])
|
||||||
|
output = "No IP address/network is ignored"
|
||||||
|
self.assertEqual(self.b.beautify([]), output)
|
||||||
|
|
||||||
|
self.b.setInputCmd(["set", "sshd", "addignoreip"])
|
||||||
|
response = [
|
||||||
|
IPAddr("127.0.0.0", 8),
|
||||||
|
IPAddr("::1"),
|
||||||
|
IPAddr("2001:db8::", 32),
|
||||||
|
IPAddr("::ffff:10.0.2.1")
|
||||||
|
]
|
||||||
|
output = "These IP addresses/networks are ignored:\n"
|
||||||
|
output += "|- 127.0.0.0/8\n|- ::1\n"
|
||||||
|
output += "|- 2001:db8::/32\n`- 10.0.2.1"
|
||||||
|
self.assertEqual(self.b.beautify(response), output)
|
||||||
|
|
||||||
|
def testFailRegex(self):
|
||||||
|
self.b.setInputCmd(["get", "sshd", "failregex"])
|
||||||
|
output = "No regular expression is defined"
|
||||||
|
self.assertEqual(self.b.beautify([]), output)
|
||||||
|
|
||||||
|
output = "The following regular expression are defined:\n"
|
||||||
|
output += "|- [0]: ^$\n`- [1]: .*"
|
||||||
|
self.assertEqual(self.b.beautify(["^$", ".*"]), output)
|
||||||
|
|
||||||
|
def testActions(self):
|
||||||
|
self.b.setInputCmd(["get", "sshd", "actions"])
|
||||||
|
output = "No actions for jail sshd"
|
||||||
|
self.assertEqual(self.b.beautify([]), output)
|
||||||
|
|
||||||
|
output = "The jail sshd has the following actions:\n"
|
||||||
|
output += "iptables-multiport"
|
||||||
|
self.assertEqual(self.b.beautify(["iptables-multiport"]), output)
|
||||||
|
|
||||||
|
def testActionProperties(self):
|
||||||
|
self.b.setInputCmd(["get", "sshd", "actionproperties", "iptables"])
|
||||||
|
output = "No properties for jail sshd action iptables"
|
||||||
|
self.assertEqual(self.b.beautify([]), output)
|
||||||
|
|
||||||
|
output = "The jail sshd action iptables has the following properties:"
|
||||||
|
output += "\nactionban, actionunban"
|
||||||
|
response = ("actionban", "actionunban")
|
||||||
|
self.assertEqual(self.b.beautify(response), output)
|
||||||
|
|
||||||
|
def testActionMethods(self):
|
||||||
|
self.b.setInputCmd(["get", "sshd", "actionmethods", "iptables"])
|
||||||
|
output = "No methods for jail sshd action iptables"
|
||||||
|
self.assertEqual(self.b.beautify([]), output)
|
||||||
|
|
||||||
|
output = "The jail sshd action iptables has the following methods:\n"
|
||||||
|
output += "ban, unban"
|
||||||
|
self.assertEqual(self.b.beautify(["ban", "unban"]), output)
|
||||||
|
|
||||||
|
# def testException(self):
|
||||||
|
# self.b.setInputCmd(["get", "sshd", "logpath"])
|
||||||
|
# self.assertRaises(self.b.beautify(1), TypeError)
|
||||||
|
|
||||||
|
def testBeautifyError(self):
|
||||||
|
response = UnknownJailException("sshd")
|
||||||
|
output = "Sorry but the jail 'sshd' does not exist"
|
||||||
|
self.assertEqual(self.b.beautifyError(response), output)
|
||||||
|
|
||||||
|
response = DuplicateJailException("sshd")
|
||||||
|
output = "The jail 'sshd' already exists"
|
||||||
|
self.assertEqual(self.b.beautifyError(response), output)
|
||||||
|
|
||||||
|
output = "Sorry but the command is invalid"
|
||||||
|
self.assertEqual(self.b.beautifyError(IndexError()), output)
|
||||||
|
|
Loading…
Reference in New Issue