summaryrefslogtreecommitdiffstats
path: root/func/minion/modules/iptables/common.py
diff options
context:
space:
mode:
authorAdrian Likins <alikins@redhat.com>2008-03-28 15:29:10 -0400
committerAdrian Likins <alikins@redhat.com>2008-03-28 15:29:10 -0400
commita2d5d31e8d0cec0e700d6a95e3b912e607bbf84f (patch)
tree9d1d4b2bfe8922dce5beb5f1cb5c4335affa5671 /func/minion/modules/iptables/common.py
parent4054792be014a9b7373a5b909f5052ab271c2307 (diff)
downloadthird_party-func-a2d5d31e8d0cec0e700d6a95e3b912e607bbf84f.tar.gz
third_party-func-a2d5d31e8d0cec0e700d6a95e3b912e607bbf84f.tar.xz
third_party-func-a2d5d31e8d0cec0e700d6a95e3b912e607bbf84f.zip
add iptables module from Krzysztof A. Adamski <krzysztofa@gmail.com>
add some basic test cases to the unittests (needs expanded) add file info to setup.py add Makefiles to minion/modules/netapp/* and minion/modules/iptables/* to make make clean work
Diffstat (limited to 'func/minion/modules/iptables/common.py')
-rw-r--r--func/minion/modules/iptables/common.py56
1 files changed, 56 insertions, 0 deletions
diff --git a/func/minion/modules/iptables/common.py b/func/minion/modules/iptables/common.py
new file mode 100644
index 0000000..c5214f5
--- /dev/null
+++ b/func/minion/modules/iptables/common.py
@@ -0,0 +1,56 @@
+#
+# Copyright 2008
+# Krzysztof A. Adamski <krzysztofa@gmail.com>
+#
+# This software may be freely redistributed under the terms of the GNU
+# general public license.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
+
+# other modules
+import sub_process
+
+def run_iptables(args):
+ cmd = sub_process.Popen(["/sbin/iptables"] + args.split(),
+ executable="/sbin/iptables",
+ stdout=sub_process.PIPE,
+ stderr=sub_process.PIPE,
+ shell=False)
+
+ data, error = cmd.communicate()
+
+ results = []
+ for line in data.split("\n"):
+ tokens = line.split()
+ results.append(tokens)
+
+ return results
+
+def call_iptables(args):
+ return sub_process.call(["/sbin/iptables"] + args.split(),
+ executable="/sbin/iptables",
+ shell=False)
+
+def check_policy(chain):
+ ret = run_iptables("-L %s" % chain)
+ try:
+ if ret[0][2] == "(policy":
+ return ret[0][3][:-1]
+ else:
+ return False
+ except:
+ return False
+
+def set_policy(chain, policy):
+ return call_iptables("-P %s %s" % (chain, policy) )
+
+def clear_all(arg):
+ while not call_iptables(arg): pass
+
+def call_if_policy(chain, policy, arg):
+ if check_policy(chain) == policy:
+ return call_iptables(arg)
+ else:
+ return 0