setup_ip_tables_test.go 3.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105
  1. package bridge
  2. import (
  3. "net"
  4. "testing"
  5. "github.com/docker/libnetwork/iptables"
  6. "github.com/docker/libnetwork/netutils"
  7. "github.com/docker/libnetwork/portmapper"
  8. )
  9. const (
  10. iptablesTestBridgeIP = "192.168.42.1"
  11. )
  12. func TestProgramIPTable(t *testing.T) {
  13. // Create a test bridge with a basic bridge configuration (name + IPv4).
  14. defer netutils.SetupTestNetNS(t)()
  15. createTestBridge(getBasicTestConfig(), &bridgeInterface{}, t)
  16. // Store various iptables chain rules we care for.
  17. rules := []struct {
  18. rule iptRule
  19. descr string
  20. }{
  21. {iptRule{table: iptables.Filter, chain: "FORWARD", args: []string{"-d", "127.1.2.3", "-i", "lo", "-o", "lo", "-j", "DROP"}}, "Test Loopback"},
  22. {iptRule{table: iptables.Nat, chain: "POSTROUTING", preArgs: []string{"-t", "nat"}, args: []string{"-s", iptablesTestBridgeIP, "!", "-o", DefaultBridgeName, "-j", "MASQUERADE"}}, "NAT Test"},
  23. {iptRule{table: iptables.Filter, chain: "FORWARD", args: []string{"-i", DefaultBridgeName, "!", "-o", DefaultBridgeName, "-j", "ACCEPT"}}, "Test ACCEPT NON_ICC OUTGOING"},
  24. {iptRule{table: iptables.Filter, chain: "FORWARD", args: []string{"-o", DefaultBridgeName, "-m", "conntrack", "--ctstate", "RELATED,ESTABLISHED", "-j", "ACCEPT"}}, "Test ACCEPT INCOMING"},
  25. {iptRule{table: iptables.Filter, chain: "FORWARD", args: []string{"-i", DefaultBridgeName, "-o", DefaultBridgeName, "-j", "ACCEPT"}}, "Test enable ICC"},
  26. {iptRule{table: iptables.Filter, chain: "FORWARD", args: []string{"-i", DefaultBridgeName, "-o", DefaultBridgeName, "-j", "DROP"}}, "Test disable ICC"},
  27. }
  28. // Assert the chain rules' insertion and removal.
  29. for _, c := range rules {
  30. assertIPTableChainProgramming(c.rule, c.descr, t)
  31. }
  32. }
  33. func TestSetupIPTables(t *testing.T) {
  34. // Create a test bridge with a basic bridge configuration (name + IPv4).
  35. defer netutils.SetupTestNetNS(t)()
  36. config := getBasicTestConfig()
  37. br := &bridgeInterface{}
  38. createTestBridge(config, br, t)
  39. // Modify iptables params in base configuration and apply them.
  40. config.EnableIPTables = true
  41. assertBridgeConfig(config, br, t)
  42. config.EnableIPMasquerade = true
  43. assertBridgeConfig(config, br, t)
  44. config.EnableICC = true
  45. assertBridgeConfig(config, br, t)
  46. config.EnableIPMasquerade = false
  47. assertBridgeConfig(config, br, t)
  48. }
  49. func getBasicTestConfig() *networkConfiguration {
  50. config := &networkConfiguration{
  51. BridgeName: DefaultBridgeName,
  52. AddressIPv4: &net.IPNet{IP: net.ParseIP(iptablesTestBridgeIP), Mask: net.CIDRMask(16, 32)}}
  53. return config
  54. }
  55. func createTestBridge(config *networkConfiguration, br *bridgeInterface, t *testing.T) {
  56. if err := setupDevice(config, br); err != nil {
  57. t.Fatalf("Failed to create the testing Bridge: %s", err.Error())
  58. }
  59. if err := setupBridgeIPv4(config, br); err != nil {
  60. t.Fatalf("Failed to bring up the testing Bridge: %s", err.Error())
  61. }
  62. }
  63. // Assert base function which pushes iptables chain rules on insertion and removal.
  64. func assertIPTableChainProgramming(rule iptRule, descr string, t *testing.T) {
  65. // Add
  66. if err := programChainRule(rule, descr, true); err != nil {
  67. t.Fatalf("Failed to program iptable rule %s: %s", descr, err.Error())
  68. }
  69. if iptables.Exists(rule.table, rule.chain, rule.args...) == false {
  70. t.Fatalf("Failed to effectively program iptable rule: %s", descr)
  71. }
  72. // Remove
  73. if err := programChainRule(rule, descr, false); err != nil {
  74. t.Fatalf("Failed to remove iptable rule %s: %s", descr, err.Error())
  75. }
  76. if iptables.Exists(rule.table, rule.chain, rule.args...) == true {
  77. t.Fatalf("Failed to effectively remove iptable rule: %s", descr)
  78. }
  79. }
  80. // Assert function which pushes chains based on bridge config parameters.
  81. func assertBridgeConfig(config *networkConfiguration, br *bridgeInterface, t *testing.T) {
  82. nw := bridgeNetwork{portMapper: portmapper.New()}
  83. // Attempt programming of ip tables.
  84. err := nw.setupIPTables(config, br)
  85. if err != nil {
  86. t.Fatalf("%v", err)
  87. }
  88. }