123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187 |
- package bridge
- import (
- "net"
- "testing"
- "github.com/docker/docker/internal/testutils/netnsutils"
- "github.com/docker/docker/libnetwork/iptables"
- "github.com/docker/docker/libnetwork/netlabel"
- "github.com/docker/docker/libnetwork/portmapper"
- "github.com/vishvananda/netlink"
- )
- const (
- iptablesTestBridgeIP = "192.168.42.1"
- )
- func TestProgramIPTable(t *testing.T) {
- // Create a test bridge with a basic bridge configuration (name + IPv4).
- defer netnsutils.SetupTestOSContext(t)()
- nh, err := netlink.NewHandle()
- if err != nil {
- t.Fatal(err)
- }
- createTestBridge(getBasicTestConfig(), &bridgeInterface{nlh: nh}, t)
- // Store various iptables chain rules we care for.
- rules := []struct {
- rule iptRule
- descr string
- }{
- {iptRule{ipv: iptables.IPv4, table: iptables.Filter, chain: "FORWARD", args: []string{"-d", "127.1.2.3", "-i", "lo", "-o", "lo", "-j", "DROP"}}, "Test Loopback"},
- {iptRule{ipv: iptables.IPv4, table: iptables.Nat, chain: "POSTROUTING", args: []string{"-s", iptablesTestBridgeIP, "!", "-o", DefaultBridgeName, "-j", "MASQUERADE"}}, "NAT Test"},
- {iptRule{ipv: iptables.IPv4, table: iptables.Filter, chain: "FORWARD", args: []string{"-o", DefaultBridgeName, "-m", "conntrack", "--ctstate", "RELATED,ESTABLISHED", "-j", "ACCEPT"}}, "Test ACCEPT INCOMING"},
- {iptRule{ipv: iptables.IPv4, table: iptables.Filter, chain: "FORWARD", args: []string{"-i", DefaultBridgeName, "!", "-o", DefaultBridgeName, "-j", "ACCEPT"}}, "Test ACCEPT NON_ICC OUTGOING"},
- {iptRule{ipv: iptables.IPv4, table: iptables.Filter, chain: "FORWARD", args: []string{"-i", DefaultBridgeName, "-o", DefaultBridgeName, "-j", "ACCEPT"}}, "Test enable ICC"},
- {iptRule{ipv: iptables.IPv4, table: iptables.Filter, chain: "FORWARD", args: []string{"-i", DefaultBridgeName, "-o", DefaultBridgeName, "-j", "DROP"}}, "Test disable ICC"},
- }
- // Assert the chain rules' insertion and removal.
- for _, c := range rules {
- assertIPTableChainProgramming(c.rule, c.descr, t)
- }
- }
- func TestSetupIPChains(t *testing.T) {
- // Create a test bridge with a basic bridge configuration (name + IPv4).
- defer netnsutils.SetupTestOSContext(t)()
- nh, err := netlink.NewHandle()
- if err != nil {
- t.Fatal(err)
- }
- driverconfig := configuration{
- EnableIPTables: true,
- }
- d := &driver{
- config: driverconfig,
- }
- assertChainConfig(d, t)
- config := getBasicTestConfig()
- br := &bridgeInterface{nlh: nh}
- createTestBridge(config, br, t)
- assertBridgeConfig(config, br, d, t)
- config.EnableIPMasquerade = true
- assertBridgeConfig(config, br, d, t)
- config.EnableICC = true
- assertBridgeConfig(config, br, d, t)
- config.EnableIPMasquerade = false
- assertBridgeConfig(config, br, d, t)
- }
- func getBasicTestConfig() *networkConfiguration {
- config := &networkConfiguration{
- BridgeName: DefaultBridgeName,
- AddressIPv4: &net.IPNet{IP: net.ParseIP(iptablesTestBridgeIP), Mask: net.CIDRMask(16, 32)},
- }
- return config
- }
- func createTestBridge(config *networkConfiguration, br *bridgeInterface, t *testing.T) {
- if err := setupDevice(config, br); err != nil {
- t.Fatalf("Failed to create the testing Bridge: %s", err.Error())
- }
- if err := setupBridgeIPv4(config, br); err != nil {
- t.Fatalf("Failed to bring up the testing Bridge: %s", err.Error())
- }
- if config.EnableIPv6 {
- if err := setupBridgeIPv6(config, br); err != nil {
- t.Fatalf("Failed to bring up the testing Bridge: %s", err.Error())
- }
- }
- }
- // Assert base function which pushes iptables chain rules on insertion and removal.
- func assertIPTableChainProgramming(rule iptRule, descr string, t *testing.T) {
- // Add
- if err := programChainRule(rule, descr, true); err != nil {
- t.Fatalf("Failed to program iptable rule %s: %s", descr, err.Error())
- }
- iptable := iptables.GetIptable(rule.ipv)
- if iptable.Exists(rule.table, rule.chain, rule.args...) == false {
- t.Fatalf("Failed to effectively program iptable rule: %s", descr)
- }
- // Remove
- if err := programChainRule(rule, descr, false); err != nil {
- t.Fatalf("Failed to remove iptable rule %s: %s", descr, err.Error())
- }
- if iptable.Exists(rule.table, rule.chain, rule.args...) == true {
- t.Fatalf("Failed to effectively remove iptable rule: %s", descr)
- }
- }
- // Assert function which create chains.
- func assertChainConfig(d *driver, t *testing.T) {
- var err error
- d.natChain, d.filterChain, d.isolationChain1, d.isolationChain2, err = setupIPChains(d.config, iptables.IPv4)
- if err != nil {
- t.Fatal(err)
- }
- if d.config.EnableIP6Tables {
- d.natChainV6, d.filterChainV6, d.isolationChain1V6, d.isolationChain2V6, err = setupIPChains(d.config, iptables.IPv6)
- if err != nil {
- t.Fatal(err)
- }
- }
- }
- // Assert function which pushes chains based on bridge config parameters.
- func assertBridgeConfig(config *networkConfiguration, br *bridgeInterface, d *driver, t *testing.T) {
- nw := bridgeNetwork{
- portMapper: portmapper.New(),
- portMapperV6: portmapper.New(),
- config: config,
- }
- nw.driver = d
- // Attempt programming of ip tables.
- err := nw.setupIP4Tables(config, br)
- if err != nil {
- t.Fatalf("%v", err)
- }
- if d.config.EnableIP6Tables {
- if err := nw.setupIP6Tables(config, br); err != nil {
- t.Fatalf("%v", err)
- }
- }
- }
- // Regression test for https://github.com/moby/moby/issues/46445
- func TestSetupIP6TablesWithHostIP(t *testing.T) {
- defer netnsutils.SetupTestOSContext(t)()
- d := newDriver()
- dc := &configuration{
- EnableIPTables: true,
- EnableIP6Tables: true,
- }
- if err := d.configure(map[string]interface{}{netlabel.GenericData: dc}); err != nil {
- t.Fatal(err)
- }
- nc := &networkConfiguration{
- BridgeName: DefaultBridgeName,
- AddressIPv4: &net.IPNet{IP: net.ParseIP(iptablesTestBridgeIP), Mask: net.CIDRMask(16, 32)},
- EnableIPMasquerade: true,
- EnableIPv6: true,
- AddressIPv6: &net.IPNet{IP: net.ParseIP("2001:db8::1"), Mask: net.CIDRMask(64, 128)},
- HostIP: net.ParseIP("192.0.2.2"),
- }
- nh, err := netlink.NewHandle()
- if err != nil {
- t.Fatal(err)
- }
- br := &bridgeInterface{nlh: nh}
- createTestBridge(nc, br, t)
- assertBridgeConfig(nc, br, d, t)
- }
|