Skip to content

mvo5/fwadmin

 
 

Repository files navigation

Fwadmin

Build Status Coverage Status

Django based self-serivce firwall config tool.

The use-case is that a group of trusted users can easily configure simple fireall rules for a set of machines. Each machine has a owner and the rules are valid for a certain amount of time only, then they need to be refreshed.

Supported firewalls are: cisco, ubuntu ufw

Dependencies to run in production:

  • python-django (tested with 1.4 and 1.5)
  • python-django-auth-ldap
  • python-netaddr
  • python-django-south
  • bower
  • django-bootstrapforms

Dependencies for testing/development:

  • python-mock

Setup virtualenv

$ virtualenv env-fwadmin
$ . env-fwadmin/bin/activate
$ pip install -r requirements_dev.txt

How to install javascript dependencies:

$ bower install

How to run the testsuite:

$ python manage.py test fwadmin

One time setup:

$ echo "my-secret-ldap-password" > django_project/ldap-password
$ PYTHONPATH=. python django_project/first_time_init.py
$ python manage.py syncdb
$ python manage.py migrate

How to test interactively:

$ python manage.py runserver

go to the admin interface: http://localhost:8000/admin/ and create user(s) and add them to the "Mitarb".

If you want users to have moderation capabilities add them to "G-zentrale-systeme".

Then go to: http://localhost:8000/fwadmin/ and create hosts/rules.

To generate rules run:

$ python manange genrules ufw

(supported are currently cisco, ufw)

To compile the i18n strings:

$ (cd fwadmin ; python ../manage.py compilemessages)

And to update the i18n strings for new translations do:

$ (cd fwadmin ; python ../manage.py makemessages -a)

About

Django based self-service firewall config tool

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages

  • Python 96.4%
  • JavaScript 2.8%
  • CSS 0.8%