setup_ip_tables_linux_test.go 5.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187
  1. package bridge
  2. import (
  3. "net"
  4. "testing"
  5. "github.com/docker/docker/internal/testutils/netnsutils"
  6. "github.com/docker/docker/libnetwork/iptables"
  7. "github.com/docker/docker/libnetwork/netlabel"
  8. "github.com/docker/docker/libnetwork/portmapper"
  9. "github.com/vishvananda/netlink"
  10. )
  11. const (
  12. iptablesTestBridgeIP = "192.168.42.1"
  13. )
  14. func TestProgramIPTable(t *testing.T) {
  15. // Create a test bridge with a basic bridge configuration (name + IPv4).
  16. defer netnsutils.SetupTestOSContext(t)()
  17. nh, err := netlink.NewHandle()
  18. if err != nil {
  19. t.Fatal(err)
  20. }
  21. createTestBridge(getBasicTestConfig(), &bridgeInterface{nlh: nh}, t)
  22. // Store various iptables chain rules we care for.
  23. rules := []struct {
  24. rule iptRule
  25. descr string
  26. }{
  27. {iptRule{ipv: iptables.IPv4, table: iptables.Filter, chain: "FORWARD", args: []string{"-d", "127.1.2.3", "-i", "lo", "-o", "lo", "-j", "DROP"}}, "Test Loopback"},
  28. {iptRule{ipv: iptables.IPv4, table: iptables.Nat, chain: "POSTROUTING", args: []string{"-s", iptablesTestBridgeIP, "!", "-o", DefaultBridgeName, "-j", "MASQUERADE"}}, "NAT Test"},
  29. {iptRule{ipv: iptables.IPv4, table: iptables.Filter, chain: "FORWARD", args: []string{"-o", DefaultBridgeName, "-m", "conntrack", "--ctstate", "RELATED,ESTABLISHED", "-j", "ACCEPT"}}, "Test ACCEPT INCOMING"},
  30. {iptRule{ipv: iptables.IPv4, table: iptables.Filter, chain: "FORWARD", args: []string{"-i", DefaultBridgeName, "!", "-o", DefaultBridgeName, "-j", "ACCEPT"}}, "Test ACCEPT NON_ICC OUTGOING"},
  31. {iptRule{ipv: iptables.IPv4, table: iptables.Filter, chain: "FORWARD", args: []string{"-i", DefaultBridgeName, "-o", DefaultBridgeName, "-j", "ACCEPT"}}, "Test enable ICC"},
  32. {iptRule{ipv: iptables.IPv4, table: iptables.Filter, chain: "FORWARD", args: []string{"-i", DefaultBridgeName, "-o", DefaultBridgeName, "-j", "DROP"}}, "Test disable ICC"},
  33. }
  34. // Assert the chain rules' insertion and removal.
  35. for _, c := range rules {
  36. assertIPTableChainProgramming(c.rule, c.descr, t)
  37. }
  38. }
  39. func TestSetupIPChains(t *testing.T) {
  40. // Create a test bridge with a basic bridge configuration (name + IPv4).
  41. defer netnsutils.SetupTestOSContext(t)()
  42. nh, err := netlink.NewHandle()
  43. if err != nil {
  44. t.Fatal(err)
  45. }
  46. driverconfig := configuration{
  47. EnableIPTables: true,
  48. }
  49. d := &driver{
  50. config: driverconfig,
  51. }
  52. assertChainConfig(d, t)
  53. config := getBasicTestConfig()
  54. br := &bridgeInterface{nlh: nh}
  55. createTestBridge(config, br, t)
  56. assertBridgeConfig(config, br, d, t)
  57. config.EnableIPMasquerade = true
  58. assertBridgeConfig(config, br, d, t)
  59. config.EnableICC = true
  60. assertBridgeConfig(config, br, d, t)
  61. config.EnableIPMasquerade = false
  62. assertBridgeConfig(config, br, d, t)
  63. }
  64. func getBasicTestConfig() *networkConfiguration {
  65. config := &networkConfiguration{
  66. BridgeName: DefaultBridgeName,
  67. AddressIPv4: &net.IPNet{IP: net.ParseIP(iptablesTestBridgeIP), Mask: net.CIDRMask(16, 32)},
  68. }
  69. return config
  70. }
  71. func createTestBridge(config *networkConfiguration, br *bridgeInterface, t *testing.T) {
  72. if err := setupDevice(config, br); err != nil {
  73. t.Fatalf("Failed to create the testing Bridge: %s", err.Error())
  74. }
  75. if err := setupBridgeIPv4(config, br); err != nil {
  76. t.Fatalf("Failed to bring up the testing Bridge: %s", err.Error())
  77. }
  78. if config.EnableIPv6 {
  79. if err := setupBridgeIPv6(config, br); err != nil {
  80. t.Fatalf("Failed to bring up the testing Bridge: %s", err.Error())
  81. }
  82. }
  83. }
  84. // Assert base function which pushes iptables chain rules on insertion and removal.
  85. func assertIPTableChainProgramming(rule iptRule, descr string, t *testing.T) {
  86. // Add
  87. if err := programChainRule(rule, descr, true); err != nil {
  88. t.Fatalf("Failed to program iptable rule %s: %s", descr, err.Error())
  89. }
  90. iptable := iptables.GetIptable(rule.ipv)
  91. if iptable.Exists(rule.table, rule.chain, rule.args...) == false {
  92. t.Fatalf("Failed to effectively program iptable rule: %s", descr)
  93. }
  94. // Remove
  95. if err := programChainRule(rule, descr, false); err != nil {
  96. t.Fatalf("Failed to remove iptable rule %s: %s", descr, err.Error())
  97. }
  98. if iptable.Exists(rule.table, rule.chain, rule.args...) == true {
  99. t.Fatalf("Failed to effectively remove iptable rule: %s", descr)
  100. }
  101. }
  102. // Assert function which create chains.
  103. func assertChainConfig(d *driver, t *testing.T) {
  104. var err error
  105. d.natChain, d.filterChain, d.isolationChain1, d.isolationChain2, err = setupIPChains(d.config, iptables.IPv4)
  106. if err != nil {
  107. t.Fatal(err)
  108. }
  109. if d.config.EnableIP6Tables {
  110. d.natChainV6, d.filterChainV6, d.isolationChain1V6, d.isolationChain2V6, err = setupIPChains(d.config, iptables.IPv6)
  111. if err != nil {
  112. t.Fatal(err)
  113. }
  114. }
  115. }
  116. // Assert function which pushes chains based on bridge config parameters.
  117. func assertBridgeConfig(config *networkConfiguration, br *bridgeInterface, d *driver, t *testing.T) {
  118. nw := bridgeNetwork{
  119. portMapper: portmapper.New(),
  120. portMapperV6: portmapper.New(),
  121. config: config,
  122. }
  123. nw.driver = d
  124. // Attempt programming of ip tables.
  125. err := nw.setupIP4Tables(config, br)
  126. if err != nil {
  127. t.Fatalf("%v", err)
  128. }
  129. if d.config.EnableIP6Tables {
  130. if err := nw.setupIP6Tables(config, br); err != nil {
  131. t.Fatalf("%v", err)
  132. }
  133. }
  134. }
  135. // Regression test for https://github.com/moby/moby/issues/46445
  136. func TestSetupIP6TablesWithHostIP(t *testing.T) {
  137. defer netnsutils.SetupTestOSContext(t)()
  138. d := newDriver()
  139. dc := &configuration{
  140. EnableIPTables: true,
  141. EnableIP6Tables: true,
  142. }
  143. if err := d.configure(map[string]interface{}{netlabel.GenericData: dc}); err != nil {
  144. t.Fatal(err)
  145. }
  146. nc := &networkConfiguration{
  147. BridgeName: DefaultBridgeName,
  148. AddressIPv4: &net.IPNet{IP: net.ParseIP(iptablesTestBridgeIP), Mask: net.CIDRMask(16, 32)},
  149. EnableIPMasquerade: true,
  150. EnableIPv6: true,
  151. AddressIPv6: &net.IPNet{IP: net.ParseIP("2001:db8::1"), Mask: net.CIDRMask(64, 128)},
  152. HostIP: net.ParseIP("192.0.2.2"),
  153. }
  154. nh, err := netlink.NewHandle()
  155. if err != nil {
  156. t.Fatal(err)
  157. }
  158. br := &bridgeInterface{nlh: nh}
  159. createTestBridge(nc, br, t)
  160. assertBridgeConfig(nc, br, d, t)
  161. }