diff options
author | Nicolas Fort <nicolasfort1988@gmail.com> | 2024-03-18 14:53:03 +0000 |
---|---|---|
committer | Nicolas Fort <nicolasfort1988@gmail.com> | 2024-03-18 14:53:03 +0000 |
commit | e2df1f4929774792c1d4bfb78c2dfa5bdf7f0825 (patch) | |
tree | b326e5e1c471ff29860934054ea90cdd6b685cc4 | |
parent | 987b7e599fda2c468773cf31d92d976cd96c3e41 (diff) | |
download | vyos-1x-e2df1f4929774792c1d4bfb78c2dfa5bdf7f0825.tar.gz vyos-1x-e2df1f4929774792c1d4bfb78c2dfa5bdf7f0825.zip |
T6136: add error checks when using dynamic firewall groups
-rwxr-xr-x | src/conf_mode/firewall.py | 12 |
1 files changed, 12 insertions, 0 deletions
diff --git a/src/conf_mode/firewall.py b/src/conf_mode/firewall.py index 3c27655b0..810437dda 100755 --- a/src/conf_mode/firewall.py +++ b/src/conf_mode/firewall.py @@ -268,6 +268,18 @@ def verify_rule(firewall, rule_conf, ipv6): if 'port' in side_conf and dict_search_args(side_conf, 'group', 'port_group'): raise ConfigError(f'{side} port-group and port cannot both be defined') + if 'add_address_to_group' in rule_conf: + for type in ['destination_address', 'source_address']: + if type in rule_conf['add_address_to_group']: + if 'address_group' not in rule_conf['add_address_to_group'][type]: + raise ConfigError(f'Dynamic address group must be defined.') + else: + target = rule_conf['add_address_to_group'][type]['address_group'] + fwall_group = 'ipv6_address_group' if ipv6 else 'address_group' + group_obj = dict_search_args(firewall, 'group', 'dynamic_group', fwall_group, target) + if group_obj is None: + raise ConfigError(f'Invalid dynamic address group on firewall rule') + if 'log_options' in rule_conf: if 'log' not in rule_conf: raise ConfigError('log-options defined, but log is not enable') |