-
Notifications
You must be signed in to change notification settings - Fork 387
/
Copy pathFirewallRule.swift
61 lines (52 loc) · 1.97 KB
/
FirewallRule.swift
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
//
// FirewallRule.swift
// MullvadVPNUITests
//
// Created by Niklas Berglund on 2024-01-18.
// Copyright © 2024 Mullvad VPN AB. All rights reserved.
//
import Foundation
import XCTest
struct FirewallRule {
let fromIPAddress: String
let toIPAddress: String
let protocols: [NetworkTransportProtocol]
/// - Parameters:
/// - fromIPAddress: Block traffic originating from this source IP address.
/// - toIPAddress: Block traffic to this destination IP address.
/// - protocols: Protocols which should be blocked. If none is specified all will be blocked.
private init(fromIPAddress: String, toIPAddress: String, protocols: [NetworkTransportProtocol]) {
self.fromIPAddress = fromIPAddress
self.toIPAddress = toIPAddress
self.protocols = protocols
}
public func protocolsAsStringArray() -> [String] {
return protocols.map { $0.rawValue }
}
/// Make a firewall rule blocking API access for the current device under test
public static func makeBlockAPIAccessFirewallRule() throws -> FirewallRule {
let deviceIPAddress = try Networking.getIPAddress()
let apiIPAddress = try MullvadAPIWrapper.getAPIIPAddress()
return FirewallRule(
fromIPAddress: deviceIPAddress,
toIPAddress: apiIPAddress,
protocols: [.TCP]
)
}
public static func makeBlockAllTrafficRule(toIPAddress: String) throws -> FirewallRule {
let deviceIPAddress = try Networking.getIPAddress()
return FirewallRule(
fromIPAddress: deviceIPAddress,
toIPAddress: toIPAddress,
protocols: [.ICMP, .TCP, .UDP]
)
}
public static func makeBlockUDPTrafficRule(toIPAddress: String) throws -> FirewallRule {
let deviceIPAddress = try Networking.getIPAddress()
return FirewallRule(
fromIPAddress: deviceIPAddress,
toIPAddress: toIPAddress,
protocols: [.UDP]
)
}
}