Skip to content

Commit 4e0ef48

Browse files
committed
update docs
1 parent 5152cfa commit 4e0ef48

File tree

5 files changed

+22
-17
lines changed

5 files changed

+22
-17
lines changed

docs/source/conf.py

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,8 +9,8 @@
99
exclude_patterns = []
1010
html_theme = 'sphinx_immaterial'
1111
html_static_path = ['_static']
12-
html_logo = '_static/img/logo.svg'
13-
html_favicon = '_static/img/logo.svg'
12+
html_logo = 'https://files.oxl.at/img/oxl3_xst.webp'
13+
html_favicon = 'https://files.oxl.at/img/oxl3_sm.webp'
1414
html_js_files = ['https://files.oxl.at/js/feedback.js']
1515
html_css_files = ['css/main.css', 'https://files.oxl.at/css/feedback.css']
1616
master_doc = 'index'
@@ -41,6 +41,7 @@
4141
"search.suggest",
4242
"toc.follow",
4343
"toc.sticky",
44+
"toc.integrate",
4445
"content.tabs.link",
4546
"content.code.copy",
4647
"content.action.edit",

docs/source/dev/1_intro.rst

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ Code Structure
8080
##############
8181

8282
1. Entrypoint
83-
*************
83+
=============
8484

8585
**Files**: :code:`src/firewall_test/cli.py`, :code:`src/firewall_test/ci.py`, :code:`src/firewall_test/shell.py`
8686

@@ -111,7 +111,7 @@ The entrypoints are designed to be executed by the user.
111111
----
112112

113113
2. Simulated Packets
114-
********************
114+
====================
115115

116116
**Files**: :code:`src/firewall_test/simulator/packet.py`
117117

@@ -120,7 +120,7 @@ The network-traffic configuration as provided by the user is parsed to packets.
120120
----
121121

122122
3. Config Loader
123-
****************
123+
================
124124

125125
**Files**: :code:`src/firewall_test/simulator/loader.py`, :code:`src/firewall_test/plugins/system/config.py` (mapping target-system to translate-plugins), :code:`:code:`src/firewall_test/system/*` (target-system config), :code:`/home/rath/code/firewall-testing-framework/src/firewall_test/plugins/translate/*` (translate plugins)
126126

@@ -133,7 +133,7 @@ The configuration-files provided by the user are loaded and parsed as configured
133133
----
134134

135135
4. Simulator Initialization
136-
***************************
136+
===========================
137137

138138
**Files**: :code:`src/firewall_test/simulator/main.py`, :code:`src/firewall_test/simulator/router.py`, :code:`src/firewall_test/simulator/firewall.py`
139139

@@ -148,11 +148,11 @@ The configuration-files provided by the user are loaded and parsed as configured
148148
.. _dev_intro_simulation:
149149

150150
5. Simulating Traffic
151-
*********************
151+
=====================
152152

153153
1. A :code:`SimulatorRun` is initialized
154154

155-
2. **It is checked which kind of traffic-flow applies **
155+
2. **It is checked which kind of traffic-flow applies**
156156

157157
* If the source or destination IPs are local to the firewall
158158

@@ -221,13 +221,13 @@ Routing & Firewalling
221221
.. _dev_intro_router:
222222

223223
Routing Simulator
224-
*****************
224+
=================
225225

226226
tbd
227227

228228
.. _dev_intro_firewall:
229229

230230
Firewall Simulator
231-
******************
231+
==================
232232

233233
tbd

docs/source/usage/1_intro.rst

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ When having to administer IT infrastructure and networks - we will often have mu
1717
Maintaining these might be time-consuming. You might also face some challenges:
1818

1919
Troubleshooting & Analysis
20-
**************************
20+
==========================
2121

2222
Even for senior network engineers it can be a challenge to find the source of an unexpected block/accept in large rulesets that are distributed across multiple systems and firewall vendors.
2323

@@ -26,7 +26,7 @@ Infrastructure-as-Code does help to keep the rulesets in a consistent state - bu
2626
This project wants to provide one interface for simulating traffic over multiple firewall systems.
2727

2828
Automated Regression-Tests
29-
**************************
29+
==========================
3030

3131
**Why would you want to do ruleset-regression-tests?**
3232

docs/source/usage/2_system_support.rst

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ For Firewall-Ruleset parsing.
5252

5353
* - `OPNsense <https://opnsense.org/>`_
5454

55-
- -
55+
- \-
5656

5757
- Development
5858

@@ -65,7 +65,7 @@ For Firewall-Ruleset parsing.
6565
----
6666

6767
Operating System Support
68-
************************
68+
########################
6969

7070
For Routing- and Network-Interface parsing.
7171

docs/source/usage/3_run.rst

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Run Modes
2424
#########
2525

2626
One-Shot CLI
27-
************
27+
============
2828

2929
For simulating single packets you can use the simple CLI.
3030

@@ -58,6 +58,7 @@ This is also a good way to test your setup at first!
5858
> -z FILE_RULESET, --file-ruleset FILE_RULESET
5959
> Path to the file containing the firewall-ruleset information
6060
61+
6162
# PASS EXAMPLE:
6263
ftf-cli --firewall-system 'linux_netfilter' \
6364
--file-interfaces 'testdata/plugin_translate_linux_interfaces.json' \
@@ -114,6 +115,7 @@ This is also a good way to test your setup at first!
114115
> 🛈 FIREWALL: Processing Egress Filter-Hooks
115116
> ✓ FIREWALL: Packet passed
116117
118+
117119
# BLOCK EXAMPLE:
118120
ftf-cli ... --src-ip 10.0.0.1 --dst-ip 172.17.10.6
119121
@@ -160,6 +162,8 @@ This is also a good way to test your setup at first!
160162
> 🛈 FIREWALL: > Match: True | Action: drop
161163
> ✖ FIREWALL: Packet blocked by rule: {'action': 'drop', 'seq': 1, 'raw': Rule: #22 | Matches: [Match: ['ni_in'] != ['docker0'], Match: ['ni_out'] == ['docker0']]}
162164
165+
166+
# SYSTEM-CONFIG EXAMPLE:
163167
ftf-cli ... --src-ip 172.17.11.5 --dst-ip 10.100.1.1
164168
165169
> 🛈 ROUTER: Packet inbound-interface: docker0
@@ -184,7 +188,7 @@ This is also a good way to test your setup at first!
184188
----
185189

186190
Automated for CI
187-
****************
191+
================
188192

189193
.. warning::
190194

@@ -193,7 +197,7 @@ Automated for CI
193197
----
194198

195199
Interactive Shell
196-
*****************
200+
=================
197201

198202
.. warning::
199203

0 commit comments

Comments
 (0)