diff options
| author | Nicolas Fort <nicolasfort1988@gmail.com> | 2024-03-18 14:53:03 +0000 | 
|---|---|---|
| committer | Nicolas Fort <nicolasfort1988@gmail.com> | 2024-03-18 14:53:03 +0000 | 
| commit | e2df1f4929774792c1d4bfb78c2dfa5bdf7f0825 (patch) | |
| tree | b326e5e1c471ff29860934054ea90cdd6b685cc4 | |
| parent | 987b7e599fda2c468773cf31d92d976cd96c3e41 (diff) | |
| download | vyos-1x-e2df1f4929774792c1d4bfb78c2dfa5bdf7f0825.tar.gz vyos-1x-e2df1f4929774792c1d4bfb78c2dfa5bdf7f0825.zip | |
T6136: add error checks when using dynamic firewall groups
| -rwxr-xr-x | src/conf_mode/firewall.py | 12 | 
1 files changed, 12 insertions, 0 deletions
| diff --git a/src/conf_mode/firewall.py b/src/conf_mode/firewall.py index 3c27655b0..810437dda 100755 --- a/src/conf_mode/firewall.py +++ b/src/conf_mode/firewall.py @@ -268,6 +268,18 @@ def verify_rule(firewall, rule_conf, ipv6):              if 'port' in side_conf and dict_search_args(side_conf, 'group', 'port_group'):                  raise ConfigError(f'{side} port-group and port cannot both be defined') +    if 'add_address_to_group' in rule_conf: +        for type in ['destination_address', 'source_address']: +            if type in rule_conf['add_address_to_group']: +                if 'address_group' not in rule_conf['add_address_to_group'][type]: +                    raise ConfigError(f'Dynamic address group must be defined.') +                else: +                    target = rule_conf['add_address_to_group'][type]['address_group'] +                    fwall_group = 'ipv6_address_group' if ipv6 else 'address_group' +                    group_obj = dict_search_args(firewall, 'group', 'dynamic_group', fwall_group, target) +                    if group_obj is None: +                            raise ConfigError(f'Invalid dynamic address group on firewall rule') +      if 'log_options' in rule_conf:          if 'log' not in rule_conf:              raise ConfigError('log-options defined, but log is not enable') | 
