Added a "negate result" option
[sfa.git] / sfatables / exec.py
1 #!/usr/bin/python
2
3 import sys
4 import os
5 import pdb
6 import libxml2
7
8 from optparse import OptionParser
9 from sfatables import commands, matches, targets
10 from sfatables.xmlextension import Xmlextension
11 from sfatables.globals import *
12 from sfatables.commands.List import *
13 from sfatables.xmlrule import *
14
15 class SFATablesRules:
16     def __init__(self, chain_name):
17         self.sorted_rule_list = []
18         chain_dir_path = "%s/%s"%(sfatables_config,chain_name)
19         rule_list = List().get_rule_list(chain_dir_path)
20         for rule_number in rule_list:
21             self.sorted_rule_list.append(XMLRule(chain_name, rule_number))
22         return
23
24     def apply(self, rspec):
25         intermediate_rspec = rspec
26         for rule in self.sorted_rule_list:
27             intermediate_rspec  = rule.apply_interpreted(intermediate_rspec)
28
29         return intermediate_rspec
30
31 def main():
32     incoming = SFATablesRules('INCOMING')
33     outgoing = SFATablesRules('OUTGOING')
34
35     rspec = """
36 <rspec>
37     <request-context>
38         <sfa><user><hrn>plc.princeton.sapan</hrn></user></sfa>
39     </request-context>
40
41     <sfatables-rule>
42             <argument>
43                 <name>hrn</name>
44                 <value>plc</value>
45             </argument>
46             <argument>
47                 <name>whitelist</name>
48                 <value>plc.princeton</value>
49             </argument>
50             <argument>
51                 <name>blacklist</name>
52                 <value>plc.tp</value>
53             </argument>
54     </sfatables-rule>
55     <request>
56         <nodespec>
57             <node name="plc.princeton.planetlab-01"/>
58             <node name="plc.princeton.planetlab-02"/>
59             <node name="plc.princeton.planetlab-03"/>
60             <node name="plc.princeton.planetlab-04"/>
61             <node name="plc.tp.planetlab3"/>
62         </nodespec>
63     </request>
64 </rspec>
65     """
66
67     
68     print "%d rules loaded for INCOMING chain\n"%len(incoming.sorted_rule_list)
69     print "%d rules loaded for OUTGOING chain\n"%len(outgoing.sorted_rule_list)
70
71     newrspec = incoming.apply(rspec)
72     print newrspec
73     return
74
75 if __name__=="__main__":
76     main()