setup_ip_tables_test.go 4.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124
  1. package bridge
  2. import (
  3. "net"
  4. "testing"
  5. "github.com/docker/libnetwork/iptables"
  6. "github.com/docker/libnetwork/netutils"
  7. "github.com/docker/libnetwork/portmapper"
  8. )
  9. const (
  10. iptablesTestBridgeIP = "192.168.42.1"
  11. )
  12. func TestProgramIPTable(t *testing.T) {
  13. // Create a test bridge with a basic bridge configuration (name + IPv4).
  14. defer netutils.SetupTestNetNS(t)()
  15. createTestBridge(getBasicTestConfig(), &bridgeInterface{}, t)
  16. // Store various iptables chain rules we care for.
  17. rules := []struct {
  18. rule iptRule
  19. descr string
  20. }{
  21. {iptRule{table: iptables.Filter, chain: "FORWARD", args: []string{"-d", "127.1.2.3", "-i", "lo", "-o", "lo", "-j", "DROP"}}, "Test Loopback"},
  22. {iptRule{table: iptables.Nat, chain: "POSTROUTING", preArgs: []string{"-t", "nat"}, args: []string{"-s", iptablesTestBridgeIP, "!", "-o", DefaultBridgeName, "-j", "MASQUERADE"}}, "NAT Test"},
  23. {iptRule{table: iptables.Filter, chain: "FORWARD", args: []string{"-i", DefaultBridgeName, "!", "-o", DefaultBridgeName, "-j", "ACCEPT"}}, "Test ACCEPT NON_ICC OUTGOING"},
  24. {iptRule{table: iptables.Filter, chain: "FORWARD", args: []string{"-o", DefaultBridgeName, "-m", "conntrack", "--ctstate", "RELATED,ESTABLISHED", "-j", "ACCEPT"}}, "Test ACCEPT INCOMING"},
  25. {iptRule{table: iptables.Filter, chain: "FORWARD", args: []string{"-i", DefaultBridgeName, "-o", DefaultBridgeName, "-j", "ACCEPT"}}, "Test enable ICC"},
  26. {iptRule{table: iptables.Filter, chain: "FORWARD", args: []string{"-i", DefaultBridgeName, "-o", DefaultBridgeName, "-j", "DROP"}}, "Test disable ICC"},
  27. }
  28. // Assert the chain rules' insertion and removal.
  29. for _, c := range rules {
  30. assertIPTableChainProgramming(c.rule, c.descr, t)
  31. }
  32. }
  33. func TestSetupIPChains(t *testing.T) {
  34. // Create a test bridge with a basic bridge configuration (name + IPv4).
  35. defer netutils.SetupTestNetNS(t)()
  36. driverconfig := &configuration{
  37. EnableIPTables: true,
  38. }
  39. d := &driver{
  40. config: driverconfig,
  41. }
  42. assertChainConfig(d, t)
  43. config := getBasicTestConfig()
  44. br := &bridgeInterface{}
  45. createTestBridge(config, br, t)
  46. assertBridgeConfig(config, br, d, t)
  47. config.EnableIPMasquerade = true
  48. assertBridgeConfig(config, br, d, t)
  49. config.EnableICC = true
  50. assertBridgeConfig(config, br, d, t)
  51. config.EnableIPMasquerade = false
  52. assertBridgeConfig(config, br, d, t)
  53. }
  54. func getBasicTestConfig() *networkConfiguration {
  55. config := &networkConfiguration{
  56. BridgeName: DefaultBridgeName,
  57. AddressIPv4: &net.IPNet{IP: net.ParseIP(iptablesTestBridgeIP), Mask: net.CIDRMask(16, 32)}}
  58. return config
  59. }
  60. func createTestBridge(config *networkConfiguration, br *bridgeInterface, t *testing.T) {
  61. if err := setupDevice(config, br); err != nil {
  62. t.Fatalf("Failed to create the testing Bridge: %s", err.Error())
  63. }
  64. if err := setupBridgeIPv4(config, br); err != nil {
  65. t.Fatalf("Failed to bring up the testing Bridge: %s", err.Error())
  66. }
  67. }
  68. // Assert base function which pushes iptables chain rules on insertion and removal.
  69. func assertIPTableChainProgramming(rule iptRule, descr string, t *testing.T) {
  70. // Add
  71. if err := programChainRule(rule, descr, true); err != nil {
  72. t.Fatalf("Failed to program iptable rule %s: %s", descr, err.Error())
  73. }
  74. if iptables.Exists(rule.table, rule.chain, rule.args...) == false {
  75. t.Fatalf("Failed to effectively program iptable rule: %s", descr)
  76. }
  77. // Remove
  78. if err := programChainRule(rule, descr, false); err != nil {
  79. t.Fatalf("Failed to remove iptable rule %s: %s", descr, err.Error())
  80. }
  81. if iptables.Exists(rule.table, rule.chain, rule.args...) == true {
  82. t.Fatalf("Failed to effectively remove iptable rule: %s", descr)
  83. }
  84. }
  85. // Assert function which create chains.
  86. func assertChainConfig(d *driver, t *testing.T) {
  87. var err error
  88. d.natChain, d.filterChain, err = setupIPChains(d.config)
  89. if err != nil {
  90. t.Fatal(err)
  91. }
  92. }
  93. // Assert function which pushes chains based on bridge config parameters.
  94. func assertBridgeConfig(config *networkConfiguration, br *bridgeInterface, d *driver, t *testing.T) {
  95. nw := bridgeNetwork{portMapper: portmapper.New(),
  96. config: config}
  97. nw.driver = d
  98. // Attempt programming of ip tables.
  99. err := nw.setupIPTables(config, br)
  100. if err != nil {
  101. t.Fatalf("%v", err)
  102. }
  103. }