2016-10-11 04:14:39 +00:00
|
|
|
from textwrap import dedent
|
2018-07-12 05:03:10 +00:00
|
|
|
import re
|
2020-03-03 07:30:44 +00:00
|
|
|
from .conftest import (
|
2018-07-06 00:10:43 +00:00
|
|
|
SETUPVARS,
|
|
|
|
tick_box,
|
|
|
|
info_box,
|
|
|
|
cross_box,
|
|
|
|
mock_command,
|
|
|
|
mock_command_2,
|
|
|
|
run_script
|
|
|
|
)
|
2017-06-21 11:49:05 +00:00
|
|
|
|
2018-07-02 20:54:19 +00:00
|
|
|
|
2018-07-06 16:07:43 +00:00
|
|
|
def test_supported_operating_system(Pihole):
|
|
|
|
'''
|
|
|
|
confirm installer exists on unsupported distribution
|
|
|
|
'''
|
|
|
|
# break supported package managers to emulate an unsupported distribution
|
|
|
|
Pihole.run('rm -rf /usr/bin/apt-get')
|
|
|
|
Pihole.run('rm -rf /usr/bin/rpm')
|
|
|
|
distro_check = Pihole.run('''
|
|
|
|
source /opt/pihole/basic-install.sh
|
|
|
|
distro_check
|
|
|
|
''')
|
|
|
|
expected_stdout = cross_box + ' OS distribution not supported'
|
|
|
|
assert expected_stdout in distro_check.stdout
|
|
|
|
# assert distro_check.rc == 1
|
|
|
|
|
|
|
|
|
2016-10-11 04:14:39 +00:00
|
|
|
def test_setupVars_are_sourced_to_global_scope(Pihole):
|
2018-07-03 06:05:24 +00:00
|
|
|
'''
|
|
|
|
currently update_dialogs sources setupVars with a dot,
|
2016-11-03 04:25:13 +00:00
|
|
|
then various other functions use the variables.
|
2018-07-03 06:05:24 +00:00
|
|
|
This confirms the sourced variables are in scope between functions
|
|
|
|
'''
|
2016-10-11 04:14:39 +00:00
|
|
|
setup_var_file = 'cat <<EOF> /etc/pihole/setupVars.conf\n'
|
2020-03-03 07:30:44 +00:00
|
|
|
for k, v in SETUPVARS.items():
|
2016-10-11 04:14:39 +00:00
|
|
|
setup_var_file += "{}={}\n".format(k, v)
|
|
|
|
setup_var_file += "EOF\n"
|
|
|
|
Pihole.run(setup_var_file)
|
|
|
|
|
|
|
|
script = dedent('''\
|
2016-11-03 05:02:28 +00:00
|
|
|
set -e
|
2016-10-11 04:14:39 +00:00
|
|
|
printSetupVars() {
|
|
|
|
# Currently debug test function only
|
|
|
|
echo "Outputting sourced variables"
|
2016-11-03 05:02:28 +00:00
|
|
|
echo "PIHOLE_INTERFACE=${PIHOLE_INTERFACE}"
|
|
|
|
echo "IPV4_ADDRESS=${IPV4_ADDRESS}"
|
|
|
|
echo "IPV6_ADDRESS=${IPV6_ADDRESS}"
|
|
|
|
echo "PIHOLE_DNS_1=${PIHOLE_DNS_1}"
|
|
|
|
echo "PIHOLE_DNS_2=${PIHOLE_DNS_2}"
|
2016-10-11 04:14:39 +00:00
|
|
|
}
|
|
|
|
update_dialogs() {
|
|
|
|
. /etc/pihole/setupVars.conf
|
|
|
|
}
|
|
|
|
update_dialogs
|
|
|
|
printSetupVars
|
|
|
|
''')
|
|
|
|
|
|
|
|
output = run_script(Pihole, script).stdout
|
|
|
|
|
2020-03-03 07:30:44 +00:00
|
|
|
for k, v in SETUPVARS.items():
|
2016-10-11 04:14:39 +00:00
|
|
|
assert "{}={}".format(k, v) in output
|
|
|
|
|
2018-07-02 20:54:19 +00:00
|
|
|
|
2016-10-11 04:14:39 +00:00
|
|
|
def test_setupVars_saved_to_file(Pihole):
|
2018-07-03 06:05:24 +00:00
|
|
|
'''
|
|
|
|
confirm saved settings are written to a file for future updates to re-use
|
|
|
|
'''
|
|
|
|
# dedent works better with this and padding matching script below
|
|
|
|
set_setup_vars = '\n'
|
2020-03-03 07:30:44 +00:00
|
|
|
for k, v in SETUPVARS.items():
|
2016-10-11 04:14:39 +00:00
|
|
|
set_setup_vars += " {}={}\n".format(k, v)
|
|
|
|
Pihole.run(set_setup_vars).stdout
|
|
|
|
|
|
|
|
script = dedent('''\
|
2016-11-03 05:02:28 +00:00
|
|
|
set -e
|
2016-10-11 04:14:39 +00:00
|
|
|
echo start
|
|
|
|
TERM=xterm
|
|
|
|
source /opt/pihole/basic-install.sh
|
|
|
|
{}
|
2017-07-26 16:15:23 +00:00
|
|
|
mkdir -p /etc/dnsmasq.d
|
|
|
|
version_check_dnsmasq
|
2018-08-20 23:33:15 +00:00
|
|
|
echo "" > /etc/pihole/pihole-FTL.conf
|
2016-10-11 04:14:39 +00:00
|
|
|
finalExports
|
|
|
|
cat /etc/pihole/setupVars.conf
|
|
|
|
'''.format(set_setup_vars))
|
|
|
|
|
|
|
|
output = run_script(Pihole, script).stdout
|
|
|
|
|
2020-03-03 07:30:44 +00:00
|
|
|
for k, v in SETUPVARS.items():
|
2016-10-11 04:14:39 +00:00
|
|
|
assert "{}={}".format(k, v) in output
|
|
|
|
|
2018-07-02 20:54:19 +00:00
|
|
|
|
2020-04-03 10:06:59 +00:00
|
|
|
def test_pihole_user_group_creation(Pihole):
|
|
|
|
'''
|
|
|
|
check user creation works if user or group already exist
|
|
|
|
'''
|
2020-04-03 17:22:30 +00:00
|
|
|
sudo_cmd = 'su --shell /bin/bash --command "{0}" -p root'
|
2020-04-03 10:06:59 +00:00
|
|
|
# normal situation where neither user or group exist
|
|
|
|
user_create = Pihole.run('''
|
|
|
|
source /opt/pihole/basic-install.sh
|
|
|
|
create_pihole_user
|
|
|
|
''')
|
|
|
|
expected_stdout = tick_box + ' Creating user \'pihole\''
|
|
|
|
assert expected_stdout in user_create.stdout
|
|
|
|
# situation where both user and group already exist
|
|
|
|
user_create = Pihole.run('''
|
|
|
|
source /opt/pihole/basic-install.sh
|
|
|
|
create_pihole_user
|
|
|
|
''')
|
|
|
|
expected_stdout = tick_box + ' Checking for user \'pihole\''
|
|
|
|
assert expected_stdout in user_create.stdout
|
|
|
|
# situation where only group and no user exists
|
2020-04-03 17:22:30 +00:00
|
|
|
Pihole.run(sudo_cmd.format('userdel -r pihole'))
|
2020-04-03 10:06:59 +00:00
|
|
|
user_create = Pihole.run('''
|
|
|
|
source /opt/pihole/basic-install.sh
|
|
|
|
create_pihole_user
|
|
|
|
''')
|
|
|
|
expected_stdout = tick_box + ' Creating user \'pihole\''
|
|
|
|
assert expected_stdout in user_create.stdout
|
|
|
|
# situation where only user and no group exists
|
2020-04-03 17:22:30 +00:00
|
|
|
Pihole.run(sudo_cmd.format('userdel -r pihole'))
|
|
|
|
Pihole.run(sudo_cmd.format('groupdel pihole'))
|
|
|
|
Pihole.run(sudo_cmd.format('groupadd pihole_dummy'))
|
|
|
|
useradd_dummy = (
|
|
|
|
'useradd -r --no-user-group -g pihole_dummy ' +
|
|
|
|
'-s /usr/sbin/nologin pihole')
|
|
|
|
Pihole.run(sudo_cmd.format(useradd_dummy))
|
2020-04-03 10:06:59 +00:00
|
|
|
user_create = Pihole.run('''
|
|
|
|
source /opt/pihole/basic-install.sh
|
|
|
|
create_pihole_user
|
|
|
|
''')
|
|
|
|
expected_stdout = tick_box + ' Creating group \'pihole\''
|
|
|
|
assert expected_stdout in user_create.stdout
|
|
|
|
expected_stdout = tick_box + ' Adding user \'pihole\' to group \'pihole\''
|
|
|
|
assert expected_stdout in user_create.stdout
|
|
|
|
|
|
|
|
|
2017-01-24 02:59:48 +00:00
|
|
|
def test_configureFirewall_firewalld_running_no_errors(Pihole):
|
2018-07-03 06:05:24 +00:00
|
|
|
'''
|
|
|
|
confirms firewalld rules are applied when firewallD is running
|
|
|
|
'''
|
2017-01-24 19:03:37 +00:00
|
|
|
# firewallD returns 'running' as status
|
2018-07-02 21:25:51 +00:00
|
|
|
mock_command('firewall-cmd', {'*': ('running', 0)}, Pihole)
|
2017-01-24 19:03:37 +00:00
|
|
|
# Whiptail dialog returns Ok for user prompt
|
2018-07-02 21:25:51 +00:00
|
|
|
mock_command('whiptail', {'*': ('', 0)}, Pihole)
|
2016-11-03 04:25:13 +00:00
|
|
|
configureFirewall = Pihole.run('''
|
|
|
|
source /opt/pihole/basic-install.sh
|
|
|
|
configureFirewall
|
2016-11-03 04:58:54 +00:00
|
|
|
''')
|
2018-03-06 18:44:57 +00:00
|
|
|
expected_stdout = 'Configuring FirewallD for httpd and pihole-FTL'
|
2016-11-03 04:25:13 +00:00
|
|
|
assert expected_stdout in configureFirewall.stdout
|
|
|
|
firewall_calls = Pihole.run('cat /var/log/firewall-cmd').stdout
|
|
|
|
assert 'firewall-cmd --state' in firewall_calls
|
2018-07-03 06:05:24 +00:00
|
|
|
assert ('firewall-cmd '
|
|
|
|
'--permanent '
|
|
|
|
'--add-service=http '
|
|
|
|
'--add-service=dns') in firewall_calls
|
2016-11-03 04:25:13 +00:00
|
|
|
assert 'firewall-cmd --reload' in firewall_calls
|
|
|
|
|
2018-07-02 20:54:19 +00:00
|
|
|
|
2017-01-24 19:03:37 +00:00
|
|
|
def test_configureFirewall_firewalld_disabled_no_errors(Pihole):
|
2018-07-03 06:05:24 +00:00
|
|
|
'''
|
|
|
|
confirms firewalld rules are not applied when firewallD is not running
|
|
|
|
'''
|
2017-01-24 19:03:37 +00:00
|
|
|
# firewallD returns non-running status
|
2018-07-02 21:25:51 +00:00
|
|
|
mock_command('firewall-cmd', {'*': ('not running', '1')}, Pihole)
|
2017-01-24 19:03:37 +00:00
|
|
|
configureFirewall = Pihole.run('''
|
|
|
|
source /opt/pihole/basic-install.sh
|
|
|
|
configureFirewall
|
|
|
|
''')
|
2018-07-03 06:05:24 +00:00
|
|
|
expected_stdout = ('No active firewall detected.. '
|
|
|
|
'skipping firewall configuration')
|
2017-01-24 19:03:37 +00:00
|
|
|
assert expected_stdout in configureFirewall.stdout
|
|
|
|
|
2018-07-02 20:54:19 +00:00
|
|
|
|
2017-01-24 19:03:37 +00:00
|
|
|
def test_configureFirewall_firewalld_enabled_declined_no_errors(Pihole):
|
2018-07-03 06:05:24 +00:00
|
|
|
'''
|
|
|
|
confirms firewalld rules are not applied when firewallD is running, user
|
|
|
|
declines ruleset
|
|
|
|
'''
|
2017-01-24 19:03:37 +00:00
|
|
|
# firewallD returns running status
|
2018-07-02 21:25:51 +00:00
|
|
|
mock_command('firewall-cmd', {'*': ('running', 0)}, Pihole)
|
2017-01-24 19:03:37 +00:00
|
|
|
# Whiptail dialog returns Cancel for user prompt
|
2018-07-02 21:25:51 +00:00
|
|
|
mock_command('whiptail', {'*': ('', 1)}, Pihole)
|
2017-01-24 19:03:37 +00:00
|
|
|
configureFirewall = Pihole.run('''
|
|
|
|
source /opt/pihole/basic-install.sh
|
|
|
|
configureFirewall
|
|
|
|
''')
|
|
|
|
expected_stdout = 'Not installing firewall rulesets.'
|
|
|
|
assert expected_stdout in configureFirewall.stdout
|
|
|
|
|
2018-07-02 20:54:19 +00:00
|
|
|
|
2017-01-24 20:04:45 +00:00
|
|
|
def test_configureFirewall_no_firewall(Pihole):
|
|
|
|
''' confirms firewall skipped no daemon is running '''
|
2017-01-24 19:58:22 +00:00
|
|
|
configureFirewall = Pihole.run('''
|
|
|
|
source /opt/pihole/basic-install.sh
|
|
|
|
configureFirewall
|
|
|
|
''')
|
2017-01-24 20:04:45 +00:00
|
|
|
expected_stdout = 'No active firewall detected'
|
2017-01-24 19:58:22 +00:00
|
|
|
assert expected_stdout in configureFirewall.stdout
|
|
|
|
|
2018-07-02 20:54:19 +00:00
|
|
|
|
2017-01-24 20:09:58 +00:00
|
|
|
def test_configureFirewall_IPTables_enabled_declined_no_errors(Pihole):
|
2018-07-03 06:05:24 +00:00
|
|
|
'''
|
|
|
|
confirms IPTables rules are not applied when IPTables is running, user
|
|
|
|
declines ruleset
|
|
|
|
'''
|
2017-01-24 20:09:58 +00:00
|
|
|
# iptables command exists
|
2018-07-02 21:25:51 +00:00
|
|
|
mock_command('iptables', {'*': ('', '0')}, Pihole)
|
2017-01-24 20:09:58 +00:00
|
|
|
# modinfo returns always true (ip_tables module check)
|
2018-07-02 21:25:51 +00:00
|
|
|
mock_command('modinfo', {'*': ('', '0')}, Pihole)
|
2017-01-24 20:09:58 +00:00
|
|
|
# Whiptail dialog returns Cancel for user prompt
|
2018-07-02 21:25:51 +00:00
|
|
|
mock_command('whiptail', {'*': ('', '1')}, Pihole)
|
2017-01-24 20:09:58 +00:00
|
|
|
configureFirewall = Pihole.run('''
|
|
|
|
source /opt/pihole/basic-install.sh
|
|
|
|
configureFirewall
|
|
|
|
''')
|
|
|
|
expected_stdout = 'Not installing firewall rulesets.'
|
|
|
|
assert expected_stdout in configureFirewall.stdout
|
|
|
|
|
2018-07-02 20:54:19 +00:00
|
|
|
|
2017-01-24 20:09:58 +00:00
|
|
|
def test_configureFirewall_IPTables_enabled_rules_exist_no_errors(Pihole):
|
2018-07-03 06:05:24 +00:00
|
|
|
'''
|
|
|
|
confirms IPTables rules are not applied when IPTables is running and rules
|
|
|
|
exist
|
|
|
|
'''
|
|
|
|
# iptables command exists and returns 0 on calls
|
|
|
|
# (should return 0 on iptables -C)
|
2018-07-02 21:25:51 +00:00
|
|
|
mock_command('iptables', {'-S': ('-P INPUT DENY', '0')}, Pihole)
|
2017-01-24 20:09:58 +00:00
|
|
|
# modinfo returns always true (ip_tables module check)
|
2018-07-02 21:25:51 +00:00
|
|
|
mock_command('modinfo', {'*': ('', '0')}, Pihole)
|
2017-01-24 20:09:58 +00:00
|
|
|
# Whiptail dialog returns Cancel for user prompt
|
2018-07-02 21:25:51 +00:00
|
|
|
mock_command('whiptail', {'*': ('', '0')}, Pihole)
|
2017-01-24 20:09:58 +00:00
|
|
|
configureFirewall = Pihole.run('''
|
|
|
|
source /opt/pihole/basic-install.sh
|
|
|
|
configureFirewall
|
|
|
|
''')
|
|
|
|
expected_stdout = 'Installing new IPTables firewall rulesets'
|
|
|
|
assert expected_stdout in configureFirewall.stdout
|
|
|
|
firewall_calls = Pihole.run('cat /var/log/iptables').stdout
|
2020-03-08 23:53:14 +00:00
|
|
|
# General call type occurrences
|
2018-07-12 05:03:10 +00:00
|
|
|
assert len(re.findall(r'iptables -S', firewall_calls)) == 1
|
|
|
|
assert len(re.findall(r'iptables -C', firewall_calls)) == 4
|
|
|
|
assert len(re.findall(r'iptables -I', firewall_calls)) == 0
|
|
|
|
|
2020-03-08 23:53:14 +00:00
|
|
|
# Specific port call occurrences
|
2018-07-12 05:03:10 +00:00
|
|
|
assert len(re.findall(r'tcp --dport 80', firewall_calls)) == 1
|
|
|
|
assert len(re.findall(r'tcp --dport 53', firewall_calls)) == 1
|
|
|
|
assert len(re.findall(r'udp --dport 53', firewall_calls)) == 1
|
|
|
|
assert len(re.findall(r'tcp --dport 4711:4720', firewall_calls)) == 1
|
2017-01-24 20:09:58 +00:00
|
|
|
|
2018-07-02 20:54:19 +00:00
|
|
|
|
2017-01-24 20:09:58 +00:00
|
|
|
def test_configureFirewall_IPTables_enabled_not_exist_no_errors(Pihole):
|
2018-07-03 06:05:24 +00:00
|
|
|
'''
|
|
|
|
confirms IPTables rules are applied when IPTables is running and rules do
|
|
|
|
not exist
|
|
|
|
'''
|
2017-01-24 23:44:48 +00:00
|
|
|
# iptables command and returns 0 on calls (should return 1 on iptables -C)
|
2018-07-03 06:05:24 +00:00
|
|
|
mock_command(
|
|
|
|
'iptables',
|
|
|
|
{
|
|
|
|
'-S': (
|
|
|
|
'-P INPUT DENY',
|
|
|
|
'0'
|
|
|
|
),
|
|
|
|
'-C': (
|
|
|
|
'',
|
|
|
|
1
|
|
|
|
),
|
|
|
|
'-I': (
|
|
|
|
'',
|
|
|
|
0
|
|
|
|
)
|
|
|
|
},
|
|
|
|
Pihole
|
|
|
|
)
|
2017-01-24 20:09:58 +00:00
|
|
|
# modinfo returns always true (ip_tables module check)
|
2018-07-02 21:25:51 +00:00
|
|
|
mock_command('modinfo', {'*': ('', '0')}, Pihole)
|
2017-01-24 20:09:58 +00:00
|
|
|
# Whiptail dialog returns Cancel for user prompt
|
2018-07-02 21:25:51 +00:00
|
|
|
mock_command('whiptail', {'*': ('', '0')}, Pihole)
|
2017-01-24 20:09:58 +00:00
|
|
|
configureFirewall = Pihole.run('''
|
|
|
|
source /opt/pihole/basic-install.sh
|
|
|
|
configureFirewall
|
|
|
|
''')
|
|
|
|
expected_stdout = 'Installing new IPTables firewall rulesets'
|
|
|
|
assert expected_stdout in configureFirewall.stdout
|
|
|
|
firewall_calls = Pihole.run('cat /var/log/iptables').stdout
|
2020-03-08 23:53:14 +00:00
|
|
|
# General call type occurrences
|
2018-07-12 05:03:10 +00:00
|
|
|
assert len(re.findall(r'iptables -S', firewall_calls)) == 1
|
|
|
|
assert len(re.findall(r'iptables -C', firewall_calls)) == 4
|
|
|
|
assert len(re.findall(r'iptables -I', firewall_calls)) == 4
|
|
|
|
|
2020-03-08 23:53:14 +00:00
|
|
|
# Specific port call occurrences
|
2018-07-12 05:03:10 +00:00
|
|
|
assert len(re.findall(r'tcp --dport 80', firewall_calls)) == 2
|
|
|
|
assert len(re.findall(r'tcp --dport 53', firewall_calls)) == 2
|
|
|
|
assert len(re.findall(r'udp --dport 53', firewall_calls)) == 2
|
|
|
|
assert len(re.findall(r'tcp --dport 4711:4720', firewall_calls)) == 2
|
2017-01-24 20:09:58 +00:00
|
|
|
|
2018-07-02 20:54:19 +00:00
|
|
|
|
2019-10-14 18:26:39 +00:00
|
|
|
def test_selinux_not_detected(Pihole):
|
2018-07-03 06:05:24 +00:00
|
|
|
'''
|
2019-10-14 18:26:39 +00:00
|
|
|
confirms installer continues when SELinux configuration file does not exist
|
2018-07-03 06:05:24 +00:00
|
|
|
'''
|
2018-06-26 06:09:30 +00:00
|
|
|
check_selinux = Pihole.run('''
|
2019-10-14 18:26:39 +00:00
|
|
|
rm -f /etc/selinux/config
|
2018-06-26 06:09:30 +00:00
|
|
|
source /opt/pihole/basic-install.sh
|
|
|
|
checkSelinux
|
|
|
|
''')
|
2019-10-14 18:26:39 +00:00
|
|
|
expected_stdout = info_box + ' SELinux not detected'
|
2018-07-03 06:05:24 +00:00
|
|
|
assert expected_stdout in check_selinux.stdout
|
2018-06-26 06:09:30 +00:00
|
|
|
assert check_selinux.rc == 0
|
|
|
|
|
2018-07-02 20:54:19 +00:00
|
|
|
|
2017-01-28 04:24:20 +00:00
|
|
|
def test_installPiholeWeb_fresh_install_no_errors(Pihole):
|
2018-07-03 06:05:24 +00:00
|
|
|
'''
|
|
|
|
confirms all web page assets from Core repo are installed on a fresh build
|
|
|
|
'''
|
2017-01-28 04:24:20 +00:00
|
|
|
installWeb = Pihole.run('''
|
|
|
|
source /opt/pihole/basic-install.sh
|
|
|
|
installPiholeWeb
|
|
|
|
''')
|
2018-07-03 06:05:24 +00:00
|
|
|
expected_stdout = info_box + ' Installing blocking page...'
|
|
|
|
assert expected_stdout in installWeb.stdout
|
|
|
|
expected_stdout = tick_box + (' Creating directory for blocking page, '
|
|
|
|
'and copying files')
|
|
|
|
assert expected_stdout in installWeb.stdout
|
2019-09-17 20:16:49 +00:00
|
|
|
expected_stdout = info_box + ' Backing up index.lighttpd.html'
|
2018-07-03 06:05:24 +00:00
|
|
|
assert expected_stdout in installWeb.stdout
|
|
|
|
expected_stdout = ('No default index.lighttpd.html file found... '
|
|
|
|
'not backing up')
|
|
|
|
assert expected_stdout in installWeb.stdout
|
|
|
|
expected_stdout = tick_box + ' Installing sudoer file'
|
|
|
|
assert expected_stdout in installWeb.stdout
|
2017-01-28 04:24:20 +00:00
|
|
|
web_directory = Pihole.run('ls -r /var/www/html/pihole').stdout
|
2017-01-28 04:28:03 +00:00
|
|
|
assert 'index.php' in web_directory
|
|
|
|
assert 'blockingpage.css' in web_directory
|
|
|
|
|
2018-07-02 20:54:19 +00:00
|
|
|
|
2017-01-28 23:44:31 +00:00
|
|
|
def test_update_package_cache_success_no_errors(Pihole):
|
2018-07-03 06:05:24 +00:00
|
|
|
'''
|
|
|
|
confirms package cache was updated without any errors
|
|
|
|
'''
|
2017-01-28 23:44:31 +00:00
|
|
|
updateCache = Pihole.run('''
|
|
|
|
source /opt/pihole/basic-install.sh
|
2017-01-29 00:08:43 +00:00
|
|
|
distro_check
|
2017-01-28 23:44:31 +00:00
|
|
|
update_package_cache
|
|
|
|
''')
|
2018-07-03 06:05:24 +00:00
|
|
|
expected_stdout = tick_box + ' Update local cache of available packages'
|
|
|
|
assert expected_stdout in updateCache.stdout
|
2018-07-12 05:03:10 +00:00
|
|
|
assert 'error' not in updateCache.stdout.lower()
|
2017-01-28 23:44:31 +00:00
|
|
|
|
2018-07-02 20:54:19 +00:00
|
|
|
|
2017-01-28 23:49:28 +00:00
|
|
|
def test_update_package_cache_failure_no_errors(Pihole):
|
2018-07-03 06:05:24 +00:00
|
|
|
'''
|
|
|
|
confirms package cache was not updated
|
|
|
|
'''
|
2018-07-02 21:25:51 +00:00
|
|
|
mock_command('apt-get', {'update': ('', '1')}, Pihole)
|
2017-01-28 23:49:28 +00:00
|
|
|
updateCache = Pihole.run('''
|
|
|
|
source /opt/pihole/basic-install.sh
|
2017-01-29 00:08:43 +00:00
|
|
|
distro_check
|
2017-01-28 23:49:28 +00:00
|
|
|
update_package_cache
|
|
|
|
''')
|
2018-07-03 06:05:24 +00:00
|
|
|
expected_stdout = cross_box + ' Update local cache of available packages'
|
|
|
|
assert expected_stdout in updateCache.stdout
|
2017-06-21 11:49:05 +00:00
|
|
|
assert 'Error: Unable to update package cache.' in updateCache.stdout
|
2017-01-28 23:49:28 +00:00
|
|
|
|
2018-07-02 20:54:19 +00:00
|
|
|
|
2017-02-20 12:44:31 +00:00
|
|
|
def test_FTL_detect_aarch64_no_errors(Pihole):
|
2018-07-03 06:05:24 +00:00
|
|
|
'''
|
|
|
|
confirms only aarch64 package is downloaded for FTL engine
|
|
|
|
'''
|
2017-02-20 05:38:02 +00:00
|
|
|
# mock uname to return aarch64 platform
|
2018-07-02 21:25:51 +00:00
|
|
|
mock_command('uname', {'-m': ('aarch64', '0')}, Pihole)
|
2017-02-20 12:44:31 +00:00
|
|
|
# mock ldd to respond with aarch64 shared library
|
2018-07-03 06:05:24 +00:00
|
|
|
mock_command(
|
|
|
|
'ldd',
|
|
|
|
{
|
|
|
|
'/bin/ls': (
|
|
|
|
'/lib/ld-linux-aarch64.so.1',
|
|
|
|
'0'
|
|
|
|
)
|
|
|
|
},
|
|
|
|
Pihole
|
|
|
|
)
|
2017-02-20 05:38:02 +00:00
|
|
|
detectPlatform = Pihole.run('''
|
|
|
|
source /opt/pihole/basic-install.sh
|
2019-05-12 09:27:25 +00:00
|
|
|
create_pihole_user
|
2019-11-14 18:52:07 +00:00
|
|
|
funcOutput=$(get_binary_name)
|
|
|
|
binary="pihole-FTL${funcOutput##*pihole-FTL}"
|
|
|
|
theRest="${funcOutput%pihole-FTL*}"
|
|
|
|
FTLdetect "${binary}" "${theRest}"
|
2017-02-20 05:38:02 +00:00
|
|
|
''')
|
2017-07-12 21:52:03 +00:00
|
|
|
expected_stdout = info_box + ' FTL Checks...'
|
2017-06-21 11:49:05 +00:00
|
|
|
assert expected_stdout in detectPlatform.stdout
|
|
|
|
expected_stdout = tick_box + ' Detected ARM-aarch64 architecture'
|
|
|
|
assert expected_stdout in detectPlatform.stdout
|
2017-07-12 21:52:03 +00:00
|
|
|
expected_stdout = tick_box + ' Downloading and Installing FTL'
|
2017-02-20 05:38:02 +00:00
|
|
|
assert expected_stdout in detectPlatform.stdout
|
|
|
|
|
2018-07-02 20:54:19 +00:00
|
|
|
|
2017-02-20 12:44:31 +00:00
|
|
|
def test_FTL_detect_armv6l_no_errors(Pihole):
|
2018-07-03 06:05:24 +00:00
|
|
|
'''
|
|
|
|
confirms only armv6l package is downloaded for FTL engine
|
|
|
|
'''
|
2017-02-20 12:44:31 +00:00
|
|
|
# mock uname to return armv6l platform
|
2018-07-02 21:25:51 +00:00
|
|
|
mock_command('uname', {'-m': ('armv6l', '0')}, Pihole)
|
2017-02-20 12:44:31 +00:00
|
|
|
# mock ldd to respond with aarch64 shared library
|
2018-07-02 21:25:51 +00:00
|
|
|
mock_command('ldd', {'/bin/ls': ('/lib/ld-linux-armhf.so.3', '0')}, Pihole)
|
2017-02-20 12:44:31 +00:00
|
|
|
detectPlatform = Pihole.run('''
|
|
|
|
source /opt/pihole/basic-install.sh
|
2019-05-12 09:27:25 +00:00
|
|
|
create_pihole_user
|
2019-11-14 18:52:07 +00:00
|
|
|
funcOutput=$(get_binary_name)
|
|
|
|
binary="pihole-FTL${funcOutput##*pihole-FTL}"
|
|
|
|
theRest="${funcOutput%pihole-FTL*}"
|
|
|
|
FTLdetect "${binary}" "${theRest}"
|
2017-02-20 12:44:31 +00:00
|
|
|
''')
|
2017-07-12 21:52:03 +00:00
|
|
|
expected_stdout = info_box + ' FTL Checks...'
|
2017-06-21 11:49:05 +00:00
|
|
|
assert expected_stdout in detectPlatform.stdout
|
2018-07-03 06:05:24 +00:00
|
|
|
expected_stdout = tick_box + (' Detected ARM-hf architecture '
|
|
|
|
'(armv6 or lower)')
|
2017-06-21 11:49:05 +00:00
|
|
|
assert expected_stdout in detectPlatform.stdout
|
2017-07-12 21:52:03 +00:00
|
|
|
expected_stdout = tick_box + ' Downloading and Installing FTL'
|
2017-02-20 12:44:31 +00:00
|
|
|
assert expected_stdout in detectPlatform.stdout
|
|
|
|
|
2018-07-02 20:54:19 +00:00
|
|
|
|
2017-02-20 12:44:31 +00:00
|
|
|
def test_FTL_detect_armv7l_no_errors(Pihole):
|
2018-07-03 06:05:24 +00:00
|
|
|
'''
|
|
|
|
confirms only armv7l package is downloaded for FTL engine
|
|
|
|
'''
|
2017-02-20 12:44:31 +00:00
|
|
|
# mock uname to return armv7l platform
|
2018-07-02 21:25:51 +00:00
|
|
|
mock_command('uname', {'-m': ('armv7l', '0')}, Pihole)
|
2017-02-20 12:44:31 +00:00
|
|
|
# mock ldd to respond with aarch64 shared library
|
2018-07-02 21:25:51 +00:00
|
|
|
mock_command('ldd', {'/bin/ls': ('/lib/ld-linux-armhf.so.3', '0')}, Pihole)
|
2017-02-20 12:44:31 +00:00
|
|
|
detectPlatform = Pihole.run('''
|
|
|
|
source /opt/pihole/basic-install.sh
|
2019-05-12 09:27:25 +00:00
|
|
|
create_pihole_user
|
2019-11-14 18:52:07 +00:00
|
|
|
funcOutput=$(get_binary_name)
|
|
|
|
binary="pihole-FTL${funcOutput##*pihole-FTL}"
|
|
|
|
theRest="${funcOutput%pihole-FTL*}"
|
|
|
|
FTLdetect "${binary}" "${theRest}"
|
2017-02-20 12:44:31 +00:00
|
|
|
''')
|
2017-07-12 21:52:03 +00:00
|
|
|
expected_stdout = info_box + ' FTL Checks...'
|
2017-06-21 11:49:05 +00:00
|
|
|
assert expected_stdout in detectPlatform.stdout
|
|
|
|
expected_stdout = tick_box + ' Detected ARM-hf architecture (armv7+)'
|
|
|
|
assert expected_stdout in detectPlatform.stdout
|
2017-07-12 21:52:03 +00:00
|
|
|
expected_stdout = tick_box + ' Downloading and Installing FTL'
|
2017-02-20 12:44:31 +00:00
|
|
|
assert expected_stdout in detectPlatform.stdout
|
|
|
|
|
2018-07-02 20:54:19 +00:00
|
|
|
|
2017-02-20 12:44:31 +00:00
|
|
|
def test_FTL_detect_x86_64_no_errors(Pihole):
|
2018-07-03 06:05:24 +00:00
|
|
|
'''
|
|
|
|
confirms only x86_64 package is downloaded for FTL engine
|
|
|
|
'''
|
2017-02-20 12:44:31 +00:00
|
|
|
detectPlatform = Pihole.run('''
|
|
|
|
source /opt/pihole/basic-install.sh
|
2019-05-12 09:27:25 +00:00
|
|
|
create_pihole_user
|
2019-11-14 18:52:07 +00:00
|
|
|
funcOutput=$(get_binary_name)
|
|
|
|
binary="pihole-FTL${funcOutput##*pihole-FTL}"
|
|
|
|
theRest="${funcOutput%pihole-FTL*}"
|
|
|
|
FTLdetect "${binary}" "${theRest}"
|
2017-02-20 12:44:31 +00:00
|
|
|
''')
|
2017-07-12 21:52:03 +00:00
|
|
|
expected_stdout = info_box + ' FTL Checks...'
|
2017-06-21 11:49:05 +00:00
|
|
|
assert expected_stdout in detectPlatform.stdout
|
|
|
|
expected_stdout = tick_box + ' Detected x86_64 architecture'
|
|
|
|
assert expected_stdout in detectPlatform.stdout
|
2017-07-12 21:52:03 +00:00
|
|
|
expected_stdout = tick_box + ' Downloading and Installing FTL'
|
2017-02-20 12:44:31 +00:00
|
|
|
assert expected_stdout in detectPlatform.stdout
|
|
|
|
|
2018-07-02 20:54:19 +00:00
|
|
|
|
2017-02-20 12:44:31 +00:00
|
|
|
def test_FTL_detect_unknown_no_errors(Pihole):
|
|
|
|
''' confirms only generic package is downloaded for FTL engine '''
|
|
|
|
# mock uname to return generic platform
|
2018-07-02 21:25:51 +00:00
|
|
|
mock_command('uname', {'-m': ('mips', '0')}, Pihole)
|
2017-02-20 05:38:02 +00:00
|
|
|
detectPlatform = Pihole.run('''
|
|
|
|
source /opt/pihole/basic-install.sh
|
2019-05-12 09:27:25 +00:00
|
|
|
create_pihole_user
|
2019-11-14 18:52:07 +00:00
|
|
|
funcOutput=$(get_binary_name)
|
|
|
|
binary="pihole-FTL${funcOutput##*pihole-FTL}"
|
|
|
|
theRest="${funcOutput%pihole-FTL*}"
|
|
|
|
FTLdetect "${binary}" "${theRest}"
|
2017-02-20 05:38:02 +00:00
|
|
|
''')
|
2017-02-20 12:44:31 +00:00
|
|
|
expected_stdout = 'Not able to detect architecture (unknown: mips)'
|
2017-02-20 05:38:02 +00:00
|
|
|
assert expected_stdout in detectPlatform.stdout
|
2017-02-20 17:36:24 +00:00
|
|
|
|
2018-07-02 20:54:19 +00:00
|
|
|
|
2017-02-20 17:36:24 +00:00
|
|
|
def test_FTL_download_aarch64_no_errors(Pihole):
|
2018-07-03 06:05:24 +00:00
|
|
|
'''
|
|
|
|
confirms only aarch64 package is downloaded for FTL engine
|
|
|
|
'''
|
2019-07-06 17:06:08 +00:00
|
|
|
# mock whiptail answers and ensure installer dependencies
|
|
|
|
mock_command('whiptail', {'*': ('', '0')}, Pihole)
|
|
|
|
Pihole.run('''
|
|
|
|
source /opt/pihole/basic-install.sh
|
|
|
|
distro_check
|
|
|
|
install_dependent_packages ${INSTALLER_DEPS[@]}
|
|
|
|
''')
|
2017-02-20 17:36:24 +00:00
|
|
|
download_binary = Pihole.run('''
|
|
|
|
source /opt/pihole/basic-install.sh
|
2019-05-12 09:27:25 +00:00
|
|
|
create_pihole_user
|
2019-11-14 18:52:07 +00:00
|
|
|
FTLinstall "pihole-FTL-aarch64-linux-gnu"
|
2017-02-20 17:36:24 +00:00
|
|
|
''')
|
2017-07-12 21:52:03 +00:00
|
|
|
expected_stdout = tick_box + ' Downloading and Installing FTL'
|
2017-02-20 17:36:24 +00:00
|
|
|
assert expected_stdout in download_binary.stdout
|
2018-07-12 05:03:10 +00:00
|
|
|
assert 'error' not in download_binary.stdout.lower()
|
2017-02-20 17:36:24 +00:00
|
|
|
|
2018-07-02 20:54:19 +00:00
|
|
|
|
2017-02-21 01:15:04 +00:00
|
|
|
def test_FTL_binary_installed_and_responsive_no_errors(Pihole):
|
2018-07-03 06:05:24 +00:00
|
|
|
'''
|
|
|
|
confirms FTL binary is copied and functional in installed location
|
|
|
|
'''
|
2017-02-21 01:15:04 +00:00
|
|
|
installed_binary = Pihole.run('''
|
|
|
|
source /opt/pihole/basic-install.sh
|
2019-05-12 09:27:25 +00:00
|
|
|
create_pihole_user
|
2019-11-14 18:52:07 +00:00
|
|
|
funcOutput=$(get_binary_name)
|
|
|
|
binary="pihole-FTL${funcOutput##*pihole-FTL}"
|
|
|
|
theRest="${funcOutput%pihole-FTL*}"
|
|
|
|
FTLdetect "${binary}" "${theRest}"
|
2017-02-21 01:15:04 +00:00
|
|
|
pihole-FTL version
|
|
|
|
''')
|
|
|
|
expected_stdout = 'v'
|
|
|
|
assert expected_stdout in installed_binary.stdout
|
|
|
|
|
2018-07-02 20:54:19 +00:00
|
|
|
|
2017-02-21 10:25:18 +00:00
|
|
|
# def test_FTL_support_files_installed(Pihole):
|
2018-07-03 06:05:24 +00:00
|
|
|
# '''
|
|
|
|
# confirms FTL support files are installed
|
|
|
|
# '''
|
2017-02-21 10:25:18 +00:00
|
|
|
# support_files = Pihole.run('''
|
|
|
|
# source /opt/pihole/basic-install.sh
|
|
|
|
# FTLdetect
|
|
|
|
# stat -c '%a %n' /var/log/pihole-FTL.log
|
|
|
|
# stat -c '%a %n' /run/pihole-FTL.port
|
|
|
|
# stat -c '%a %n' /run/pihole-FTL.pid
|
|
|
|
# ls -lac /run
|
|
|
|
# ''')
|
|
|
|
# assert '644 /run/pihole-FTL.port' in support_files.stdout
|
|
|
|
# assert '644 /run/pihole-FTL.pid' in support_files.stdout
|
|
|
|
# assert '644 /var/log/pihole-FTL.log' in support_files.stdout
|
2017-02-21 01:28:38 +00:00
|
|
|
|
2018-07-02 20:54:19 +00:00
|
|
|
|
2017-06-02 21:01:48 +00:00
|
|
|
def test_IPv6_only_link_local(Pihole):
|
2018-07-03 06:05:24 +00:00
|
|
|
'''
|
|
|
|
confirms IPv6 blocking is disabled for Link-local address
|
|
|
|
'''
|
2017-06-02 21:01:48 +00:00
|
|
|
# mock ip -6 address to return Link-local address
|
2018-07-03 06:05:24 +00:00
|
|
|
mock_command_2(
|
|
|
|
'ip',
|
|
|
|
{
|
|
|
|
'-6 address': (
|
|
|
|
'inet6 fe80::d210:52fa:fe00:7ad7/64 scope link',
|
|
|
|
'0'
|
|
|
|
)
|
|
|
|
},
|
|
|
|
Pihole
|
|
|
|
)
|
2017-06-02 21:01:48 +00:00
|
|
|
detectPlatform = Pihole.run('''
|
|
|
|
source /opt/pihole/basic-install.sh
|
|
|
|
useIPv6dialog
|
|
|
|
''')
|
2018-07-03 06:05:24 +00:00
|
|
|
expected_stdout = ('Unable to find IPv6 ULA/GUA address, '
|
|
|
|
'IPv6 adblocking will not be enabled')
|
2017-06-02 21:01:48 +00:00
|
|
|
assert expected_stdout in detectPlatform.stdout
|
|
|
|
|
2018-07-02 20:54:19 +00:00
|
|
|
|
2017-06-02 21:01:48 +00:00
|
|
|
def test_IPv6_only_ULA(Pihole):
|
2018-07-03 06:05:24 +00:00
|
|
|
'''
|
|
|
|
confirms IPv6 blocking is enabled for ULA addresses
|
|
|
|
'''
|
2017-06-02 21:01:48 +00:00
|
|
|
# mock ip -6 address to return ULA address
|
2018-07-03 06:05:24 +00:00
|
|
|
mock_command_2(
|
|
|
|
'ip',
|
|
|
|
{
|
|
|
|
'-6 address': (
|
|
|
|
'inet6 fda2:2001:5555:0:d210:52fa:fe00:7ad7/64 scope global',
|
|
|
|
'0'
|
|
|
|
)
|
|
|
|
},
|
|
|
|
Pihole
|
|
|
|
)
|
2017-06-02 21:01:48 +00:00
|
|
|
detectPlatform = Pihole.run('''
|
|
|
|
source /opt/pihole/basic-install.sh
|
|
|
|
useIPv6dialog
|
|
|
|
''')
|
|
|
|
expected_stdout = 'Found IPv6 ULA address, using it for blocking IPv6 ads'
|
|
|
|
assert expected_stdout in detectPlatform.stdout
|
|
|
|
|
2018-07-02 20:54:19 +00:00
|
|
|
|
2017-06-02 21:01:48 +00:00
|
|
|
def test_IPv6_only_GUA(Pihole):
|
2018-07-03 06:05:24 +00:00
|
|
|
'''
|
|
|
|
confirms IPv6 blocking is enabled for GUA addresses
|
|
|
|
'''
|
2017-06-02 21:01:48 +00:00
|
|
|
# mock ip -6 address to return GUA address
|
2018-07-03 06:05:24 +00:00
|
|
|
mock_command_2(
|
|
|
|
'ip',
|
|
|
|
{
|
|
|
|
'-6 address': (
|
|
|
|
'inet6 2003:12:1e43:301:d210:52fa:fe00:7ad7/64 scope global',
|
|
|
|
'0'
|
|
|
|
)
|
|
|
|
},
|
|
|
|
Pihole
|
|
|
|
)
|
2017-06-02 21:01:48 +00:00
|
|
|
detectPlatform = Pihole.run('''
|
|
|
|
source /opt/pihole/basic-install.sh
|
|
|
|
useIPv6dialog
|
|
|
|
''')
|
|
|
|
expected_stdout = 'Found IPv6 GUA address, using it for blocking IPv6 ads'
|
|
|
|
assert expected_stdout in detectPlatform.stdout
|
|
|
|
|
2018-07-02 20:54:19 +00:00
|
|
|
|
2017-06-02 21:01:48 +00:00
|
|
|
def test_IPv6_GUA_ULA_test(Pihole):
|
2018-07-03 06:05:24 +00:00
|
|
|
'''
|
|
|
|
confirms IPv6 blocking is enabled for GUA and ULA addresses
|
|
|
|
'''
|
2017-06-02 21:01:48 +00:00
|
|
|
# mock ip -6 address to return GUA and ULA addresses
|
2018-07-03 06:05:24 +00:00
|
|
|
mock_command_2(
|
|
|
|
'ip',
|
|
|
|
{
|
|
|
|
'-6 address': (
|
|
|
|
'inet6 2003:12:1e43:301:d210:52fa:fe00:7ad7/64 scope global\n'
|
|
|
|
'inet6 fda2:2001:5555:0:d210:52fa:fe00:7ad7/64 scope global',
|
|
|
|
'0'
|
|
|
|
)
|
|
|
|
},
|
|
|
|
Pihole
|
|
|
|
)
|
2017-06-02 21:01:48 +00:00
|
|
|
detectPlatform = Pihole.run('''
|
|
|
|
source /opt/pihole/basic-install.sh
|
|
|
|
useIPv6dialog
|
|
|
|
''')
|
|
|
|
expected_stdout = 'Found IPv6 ULA address, using it for blocking IPv6 ads'
|
|
|
|
assert expected_stdout in detectPlatform.stdout
|
|
|
|
|
2018-07-02 20:54:19 +00:00
|
|
|
|
2017-06-02 21:01:48 +00:00
|
|
|
def test_IPv6_ULA_GUA_test(Pihole):
|
2018-07-03 06:05:24 +00:00
|
|
|
'''
|
|
|
|
confirms IPv6 blocking is enabled for GUA and ULA addresses
|
|
|
|
'''
|
2017-06-02 21:01:48 +00:00
|
|
|
# mock ip -6 address to return ULA and GUA addresses
|
2018-07-03 06:05:24 +00:00
|
|
|
mock_command_2(
|
|
|
|
'ip',
|
|
|
|
{
|
|
|
|
'-6 address': (
|
|
|
|
'inet6 fda2:2001:5555:0:d210:52fa:fe00:7ad7/64 scope global\n'
|
|
|
|
'inet6 2003:12:1e43:301:d210:52fa:fe00:7ad7/64 scope global',
|
|
|
|
'0'
|
|
|
|
)
|
|
|
|
},
|
|
|
|
Pihole
|
|
|
|
)
|
2017-06-02 21:01:48 +00:00
|
|
|
detectPlatform = Pihole.run('''
|
|
|
|
source /opt/pihole/basic-install.sh
|
|
|
|
useIPv6dialog
|
|
|
|
''')
|
|
|
|
expected_stdout = 'Found IPv6 ULA address, using it for blocking IPv6 ads'
|
|
|
|
assert expected_stdout in detectPlatform.stdout
|
2019-07-11 04:18:58 +00:00
|
|
|
|
|
|
|
|
|
|
|
def test_validate_ip_valid(Pihole):
|
|
|
|
'''
|
|
|
|
Given a valid IP address, valid_ip returns success
|
|
|
|
'''
|
|
|
|
|
|
|
|
output = Pihole.run('''
|
|
|
|
source /opt/pihole/basic-install.sh
|
|
|
|
valid_ip "192.168.1.1"
|
|
|
|
''')
|
|
|
|
|
|
|
|
assert output.rc == 0
|
|
|
|
|
|
|
|
|
|
|
|
def test_validate_ip_invalid_octet(Pihole):
|
|
|
|
'''
|
|
|
|
Given an invalid IP address (large octet), valid_ip returns an error
|
|
|
|
'''
|
|
|
|
|
|
|
|
output = Pihole.run('''
|
|
|
|
source /opt/pihole/basic-install.sh
|
|
|
|
valid_ip "1092.168.1.1"
|
|
|
|
''')
|
|
|
|
|
|
|
|
assert output.rc == 1
|
|
|
|
|
|
|
|
|
|
|
|
def test_validate_ip_invalid_letters(Pihole):
|
|
|
|
'''
|
|
|
|
Given an invalid IP address (contains letters), valid_ip returns an error
|
|
|
|
'''
|
|
|
|
|
|
|
|
output = Pihole.run('''
|
|
|
|
source /opt/pihole/basic-install.sh
|
|
|
|
valid_ip "not an IP"
|
|
|
|
''')
|
|
|
|
|
|
|
|
assert output.rc == 1
|