]>
Commit | Line | Data |
---|---|---|
f1bafd37 DM |
1 | #!/usr/bin/perl |
2 | ||
3 | use lib '../src'; | |
4 | use strict; | |
5 | use warnings; | |
6 | use Data::Dumper; | |
7 | use PVE::Firewall; | |
ec2e28f6 DM |
8 | use Getopt::Long; |
9 | use File::Basename; | |
680d56ee | 10 | use Net::IP; |
f1bafd37 DM |
11 | |
12 | my $mark; | |
13 | my $trace; | |
14 | ||
d1486f38 DM |
15 | my $debug = 0; |
16 | ||
ec2e28f6 DM |
17 | sub print_usage_and_exit { |
18 | die "usage: $0 [--debug] [testfile [testid]]\n"; | |
19 | } | |
20 | ||
21 | if (!GetOptions ('debug' => \$debug)) { | |
22 | print_usage_and_exit(); | |
23 | } | |
24 | ||
25 | my $testfilename = shift; | |
26 | my $testid = shift; | |
27 | ||
d1486f38 DM |
28 | sub add_trace { |
29 | my ($text) = @_; | |
30 | ||
31 | if ($debug) { | |
32 | print $text; | |
33 | } else { | |
34 | $trace .= $text; | |
35 | } | |
36 | } | |
37 | ||
e4e5fcaf DM |
38 | sub nf_dev_match { |
39 | my ($devre, $dev) = @_; | |
40 | ||
41 | $devre =~ s/\+$/\.\*/; | |
42 | return ($dev =~ m/^${devre}$/) ? 1 : 0; | |
43 | } | |
44 | ||
f1bafd37 DM |
45 | sub rule_match { |
46 | my ($chain, $rule, $pkg) = @_; | |
47 | ||
48 | $rule =~ s/^-A $chain // || die "got strange rule: $rule"; | |
49 | ||
680d56ee DM |
50 | while (length($rule)) { |
51 | ||
52 | if ($rule =~ s/^-m conntrack\s*//) { | |
53 | return undef; # simply ignore | |
54 | } | |
55 | ||
56 | if ($rule =~ s/^-m addrtype\s*//) { | |
57 | return undef; # simply ignore | |
58 | } | |
59 | ||
60 | if ($rule =~ s/^-i (\S+)\s*//) { | |
61 | my $devre = $1; | |
62 | die "missing iface_in" if !$pkg->{iface_in}; | |
63 | return undef if !nf_dev_match($devre, $pkg->{iface_in}); | |
64 | next; | |
65 | } | |
66 | ||
67 | if ($rule =~ s/^-o (\S+)\s*//) { | |
68 | my $devre = $1; | |
69 | die "missing iface_out" if !$pkg->{iface_out}; | |
70 | return undef if !nf_dev_match($devre, $pkg->{iface_out}); | |
71 | next; | |
72 | } | |
73 | ||
74 | if ($rule =~ s/^-p (tcp|udp)\s*//) { | |
75 | die "missing proto" if !$pkg->{proto}; | |
76 | return undef if $pkg->{proto} ne $1; # no match | |
77 | next; | |
78 | } | |
79 | ||
80 | if ($rule =~ s/^--dport (\d+):(\d+)\s*//) { | |
81 | die "missing dport" if !$pkg->{dport}; | |
82 | return undef if ($pkg->{dport} < $1) || ($pkg->{dport} > $2); # no match | |
83 | next; | |
84 | } | |
85 | ||
86 | if ($rule =~ s/^--dport (\d+)\s*//) { | |
87 | die "missing dport" if !$pkg->{dport}; | |
88 | return undef if $pkg->{dport} != $1; # no match | |
89 | next; | |
90 | } | |
91 | ||
92 | if ($rule =~ s/^-s (\S+)\s*//) { | |
93 | die "missing source" if !$pkg->{source}; | |
94 | my $ip = Net::IP->new($1); | |
95 | return undef if !$ip->overlaps(Net::IP->new($pkg->{source})); # no match | |
96 | next; | |
97 | } | |
f1bafd37 | 98 | |
680d56ee DM |
99 | if ($rule =~ s/^-d (\S+)\s*//) { |
100 | die "missing destination" if !$pkg->{dest}; | |
101 | my $ip = Net::IP->new($1); | |
102 | return undef if !$ip->overlaps(Net::IP->new($pkg->{dest})); # no match | |
103 | next; | |
104 | } | |
105 | ||
106 | if ($rule =~ s/^-m mac ! --mac-source (\S+)\s*//) { | |
107 | die "missing source mac" if !$pkg->{mac_source}; | |
108 | return undef if $pkg->{mac_source} eq $1; # no match | |
109 | next; | |
110 | } | |
111 | ||
112 | if ($rule =~ s/^-m physdev --physdev-is-bridged --physdev-in (\S+)\s*//) { | |
113 | my $devre = $1; | |
114 | return undef if !$pkg->{physdev_in}; | |
115 | return undef if !nf_dev_match($devre, $pkg->{physdev_in}); | |
116 | next; | |
117 | } | |
118 | ||
119 | if ($rule =~ s/^-m physdev --physdev-is-bridged --physdev-out (\S+)\s*//) { | |
120 | my $devre = $1; | |
121 | return undef if !$pkg->{physdev_out}; | |
122 | return undef if !nf_dev_match($devre, $pkg->{physdev_out}); | |
123 | next; | |
124 | } | |
125 | ||
126 | if ($rule =~ s/^-m mark --mark (\d+)\s*//) { | |
127 | return undef if !defined($mark) || $mark != $1; | |
128 | next; | |
129 | } | |
130 | ||
131 | # final actions | |
132 | if ($rule =~ s/^-j MARK --set-mark (\d+)\s*$//) { | |
133 | $mark = $1; | |
134 | return undef; | |
135 | } | |
136 | ||
137 | if ($rule =~ s/^-j (\S+)\s*$//) { | |
138 | return (0, $1); | |
139 | } | |
140 | ||
141 | if ($rule =~ s/^-g (\S+)\s*$//) { | |
142 | return (1, $1); | |
143 | } | |
144 | ||
145 | last; | |
f1bafd37 DM |
146 | } |
147 | ||
148 | die "unable to parse rule: $rule"; | |
149 | } | |
150 | ||
151 | sub ruleset_simulate_chain { | |
152 | my ($ruleset, $chain, $pkg) = @_; | |
153 | ||
d1486f38 | 154 | add_trace("ENTER chain $chain\n"); |
f1bafd37 | 155 | |
6a84e461 | 156 | my $counter = 0; |
111cce51 | 157 | |
f1bafd37 | 158 | if ($chain eq 'PVEFW-Drop') { |
d1486f38 | 159 | add_trace("LEAVE chain $chain\n"); |
111cce51 | 160 | return ('DROP', $counter); |
f1bafd37 DM |
161 | } |
162 | if ($chain eq 'PVEFW-reject') { | |
d1486f38 | 163 | add_trace("LEAVE chain $chain\n"); |
111cce51 | 164 | return ('REJECT', $counter); |
f1bafd37 DM |
165 | } |
166 | ||
167 | if ($chain eq 'PVEFW-tcpflags') { | |
d1486f38 | 168 | add_trace("LEAVE chain $chain\n"); |
111cce51 | 169 | return (undef, $counter); |
f1bafd37 DM |
170 | } |
171 | ||
172 | my $rules = $ruleset->{$chain} || | |
173 | die "no such chain '$chain'"; | |
174 | ||
175 | foreach my $rule (@$rules) { | |
111cce51 | 176 | $counter++; |
f1bafd37 DM |
177 | my ($goto, $action) = rule_match($chain, $rule, $pkg); |
178 | if (!defined($action)) { | |
d1486f38 | 179 | add_trace("SKIP: $rule\n"); |
f1bafd37 DM |
180 | next; |
181 | } | |
d1486f38 | 182 | add_trace("MATCH: $rule\n"); |
f1bafd37 DM |
183 | |
184 | if ($action eq 'ACCEPT' || $action eq 'DROP' || $action eq 'REJECT') { | |
d1486f38 | 185 | add_trace("TERMINATE chain $chain: $action\n"); |
111cce51 | 186 | return ($action, $counter); |
f1bafd37 | 187 | } elsif ($action eq 'RETURN') { |
d1486f38 | 188 | add_trace("RETURN FROM chain $chain\n"); |
f1bafd37 DM |
189 | last; |
190 | } else { | |
191 | if ($goto) { | |
d1486f38 | 192 | add_trace("LEAVE chain $chain - goto $action\n"); |
f1bafd37 DM |
193 | return ruleset_simulate_chain($ruleset, $action, $pkg) |
194 | #$chain = $action; | |
195 | #$rules = $ruleset->{$chain} || die "no such chain '$chain'"; | |
196 | } else { | |
111cce51 DM |
197 | my ($act, $ctr) = ruleset_simulate_chain($ruleset, $action, $pkg); |
198 | $counter += $ctr; | |
199 | return ($act, $counter) if $act; | |
d1486f38 | 200 | add_trace("CONTINUE chain $chain\n"); |
f1bafd37 DM |
201 | } |
202 | } | |
203 | } | |
204 | ||
d1486f38 | 205 | add_trace("LEAVE chain $chain\n"); |
f1bafd37 | 206 | if ($chain =~ m/^PVEFW-(INPUT|OUTPUT|FORWARD)$/) { |
111cce51 | 207 | return ('ACCEPT', $counter); # default policy |
f1bafd37 DM |
208 | } |
209 | ||
111cce51 | 210 | return (undef, $counter); |
f1bafd37 DM |
211 | } |
212 | ||
213 | sub copy_packet { | |
214 | my ($pkg) = @_; | |
215 | ||
216 | my $res = {}; | |
217 | ||
218 | while (my ($k,$v) = each %$pkg) { | |
219 | $res->{$k} = $v; | |
220 | } | |
221 | ||
222 | return $res; | |
223 | } | |
224 | ||
d1486f38 DM |
225 | # Try to simulate packet traversal inside kernel. This invokes iptable |
226 | # checks several times. | |
227 | sub route_packet { | |
228 | my ($ruleset, $ipset_ruleset, $pkg, $from_info, $target, $start_state) = @_; | |
229 | ||
230 | my $route_state = $start_state; | |
231 | ||
232 | my $physdev_in; | |
233 | ||
111cce51 DM |
234 | my $ipt_invocation_counter = 0; |
235 | my $rule_check_counter = 0; | |
236 | ||
d1486f38 DM |
237 | while ($route_state ne $target->{iface}) { |
238 | ||
239 | my $chain; | |
240 | my $next_route_state; | |
241 | my $next_physdev_in; | |
242 | ||
243 | $pkg->{iface_in} = $pkg->{iface_out} = undef; | |
244 | $pkg->{physdev_in} = $pkg->{physdev_out} = undef; | |
245 | ||
47ece390 DM |
246 | if ($route_state eq 'from-bport') { |
247 | $next_route_state = $from_info->{bridge} || die 'internal error'; | |
248 | $next_physdev_in = $from_info->{iface} || die 'internal error'; | |
31dc73f1 | 249 | } elsif ($route_state eq 'host') { |
d1486f38 | 250 | |
47ece390 | 251 | if ($target->{type} eq 'bport') { |
c0c871d8 | 252 | $pkg->{iface_in} = 'lo'; |
47ece390 | 253 | $pkg->{iface_out} = $target->{bridge} || die 'internal error'; |
c0c871d8 | 254 | $chain = 'PVEFW-OUTPUT'; |
47ece390 | 255 | $next_route_state = $target->{iface} || die 'internal error'; |
31dc73f1 | 256 | } elsif ($target->{type} eq 'ct') { |
d1486f38 DM |
257 | $pkg->{iface_in} = 'lo'; |
258 | $pkg->{iface_out} = 'venet0'; | |
259 | $chain = 'PVEFW-OUTPUT'; | |
260 | $next_route_state = 'venet-in'; | |
261 | } elsif ($target->{type} eq 'vm') { | |
262 | $pkg->{iface_in} = 'lo'; | |
263 | $pkg->{iface_out} = $target->{bridge} || die 'internal error'; | |
264 | $chain = 'PVEFW-OUTPUT'; | |
265 | $next_route_state = 'fwbr-in'; | |
266 | } else { | |
267 | die "implement me"; | |
268 | } | |
269 | ||
270 | } elsif ($route_state eq 'venet-out') { | |
271 | ||
272 | if ($target->{type} eq 'host') { | |
273 | ||
274 | $chain = 'PVEFW-INPUT'; | |
275 | $pkg->{iface_in} = 'venet0'; | |
276 | $pkg->{iface_out} = 'lo'; | |
277 | $next_route_state = 'host'; | |
278 | ||
47ece390 | 279 | } elsif ($target->{type} eq 'bport') { |
c0c871d8 DM |
280 | |
281 | $chain = 'PVEFW-FORWARD'; | |
282 | $pkg->{iface_in} = 'venet0'; | |
47ece390 DM |
283 | $pkg->{iface_out} = $target->{bridge} || die 'internal error'; |
284 | $next_route_state = $target->{iface} || die 'internal error'; | |
c0c871d8 | 285 | |
d1486f38 DM |
286 | } elsif ($target->{type} eq 'vm') { |
287 | ||
288 | $chain = 'PVEFW-FORWARD'; | |
289 | $pkg->{iface_in} = 'venet0'; | |
290 | $pkg->{iface_out} = $target->{bridge} || die 'internal error'; | |
291 | $next_route_state = 'fwbr-in'; | |
292 | ||
293 | } elsif ($target->{type} eq 'ct') { | |
294 | ||
295 | $chain = 'PVEFW-FORWARD'; | |
296 | $pkg->{iface_in} = 'venet0'; | |
297 | $pkg->{iface_out} = 'venet0'; | |
298 | $next_route_state = 'venet-in'; | |
299 | ||
300 | } else { | |
301 | die "implement me"; | |
302 | } | |
303 | ||
304 | } elsif ($route_state eq 'fwbr-out') { | |
305 | ||
306 | $chain = 'PVEFW-FORWARD'; | |
307 | $next_route_state = $from_info->{bridge} || die 'internal error'; | |
308 | $next_physdev_in = $from_info->{fwpr} || die 'internal error'; | |
309 | $pkg->{iface_in} = $from_info->{fwbr} || die 'internal error'; | |
310 | $pkg->{iface_out} = $from_info->{fwbr} || die 'internal error'; | |
311 | $pkg->{physdev_in} = $from_info->{tapdev} || die 'internal error'; | |
312 | $pkg->{physdev_out} = $from_info->{fwln} || die 'internal error'; | |
313 | ||
314 | } elsif ($route_state eq 'fwbr-in') { | |
315 | ||
316 | $chain = 'PVEFW-FORWARD'; | |
317 | $next_route_state = $target->{tapdev}; | |
318 | $pkg->{iface_in} = $target->{fwbr} || die 'internal error'; | |
319 | $pkg->{iface_out} = $target->{fwbr} || die 'internal error'; | |
320 | $pkg->{physdev_in} = $target->{fwln} || die 'internal error'; | |
321 | $pkg->{physdev_out} = $target->{tapdev} || die 'internal error'; | |
322 | ||
323 | } elsif ($route_state =~ m/^vmbr\d+$/) { | |
324 | ||
325 | die "missing physdev_in - internal error?" if !$physdev_in; | |
eb5faed9 | 326 | $pkg->{physdev_in} = $physdev_in; |
d1486f38 DM |
327 | |
328 | if ($target->{type} eq 'host') { | |
329 | ||
330 | $chain = 'PVEFW-INPUT'; | |
331 | $pkg->{iface_in} = $route_state; | |
332 | $pkg->{iface_out} = 'lo'; | |
333 | $next_route_state = 'host'; | |
334 | ||
47ece390 | 335 | } elsif ($target->{type} eq 'bport') { |
31dc73f1 DM |
336 | |
337 | $chain = 'PVEFW-FORWARD'; | |
338 | $pkg->{iface_in} = $route_state; | |
47ece390 | 339 | $pkg->{iface_out} = $target->{bridge} || die 'internal error'; |
c0c871d8 | 340 | # conditionally set physdev_out (same behavior as kernel) |
47ece390 DM |
341 | if ($route_state eq $target->{bridge}) { |
342 | $pkg->{physdev_out} = $target->{iface} || die 'internal error'; | |
c0c871d8 | 343 | } |
47ece390 | 344 | $next_route_state = $target->{iface}; |
c0c871d8 | 345 | |
d1486f38 DM |
346 | } elsif ($target->{type} eq 'ct') { |
347 | ||
348 | $chain = 'PVEFW-FORWARD'; | |
349 | $pkg->{iface_in} = $route_state; | |
350 | $pkg->{iface_out} = 'venet0'; | |
351 | $next_route_state = 'venet-in'; | |
352 | ||
353 | } elsif ($target->{type} eq 'vm') { | |
354 | ||
355 | $chain = 'PVEFW-FORWARD'; | |
31dc73f1 DM |
356 | $pkg->{iface_in} = $route_state; |
357 | $pkg->{iface_out} = $target->{bridge}; | |
31dc73f1 | 358 | # conditionally set physdev_out (same behavior as kernel) |
d1486f38 | 359 | if ($route_state eq $target->{bridge}) { |
d1486f38 | 360 | $pkg->{physdev_out} = $target->{fwpr} || die 'internal error'; |
d1486f38 DM |
361 | } |
362 | $next_route_state = 'fwbr-in'; | |
363 | ||
364 | } else { | |
365 | die "implement me"; | |
366 | } | |
367 | ||
368 | } else { | |
369 | die "implement me $route_state"; | |
370 | } | |
371 | ||
372 | die "internal error" if !defined($next_route_state); | |
373 | ||
374 | if ($chain) { | |
375 | add_trace("IPT check at $route_state (chain $chain)\n"); | |
376 | add_trace(Dumper($pkg)); | |
111cce51 DM |
377 | $ipt_invocation_counter++; |
378 | my ($res, $ctr) = ruleset_simulate_chain($ruleset, $chain, $pkg); | |
379 | $rule_check_counter += $ctr; | |
380 | return ($res, $ipt_invocation_counter, $rule_check_counter) if $res ne 'ACCEPT'; | |
d1486f38 DM |
381 | } |
382 | ||
383 | $route_state = $next_route_state; | |
384 | ||
385 | $physdev_in = $next_physdev_in; | |
386 | } | |
387 | ||
111cce51 | 388 | return ('ACCEPT', $ipt_invocation_counter, $rule_check_counter); |
d1486f38 DM |
389 | } |
390 | ||
391 | sub extract_ct_info { | |
392 | my ($vmdata, $vmid) = @_; | |
393 | ||
394 | my $info = { type => 'ct', vmid => $vmid }; | |
395 | ||
396 | my $conf = $vmdata->{openvz}->{$vmid} || die "no such CT '$vmid'"; | |
397 | if ($conf->{ip_address}) { | |
398 | $info->{ip_address} = $conf->{ip_address}->{value}; | |
399 | } else { | |
400 | die "implement me"; | |
401 | } | |
402 | return $info; | |
403 | } | |
404 | ||
405 | sub extract_vm_info { | |
406 | my ($vmdata, $vmid) = @_; | |
407 | ||
408 | my $info = { type => 'vm', vmid => $vmid }; | |
409 | ||
410 | my $conf = $vmdata->{qemu}->{$vmid} || die "no such VM '$vmid'"; | |
411 | my $net = PVE::QemuServer::parse_net($conf->{net0}); | |
412 | $info->{macaddr} = $net->{macaddr} || die "unable to get mac address"; | |
413 | $info->{bridge} = $net->{bridge} || die "unable to get bridge"; | |
414 | $info->{fwbr} = "fwbr${vmid}i0"; | |
415 | $info->{tapdev} = "tap${vmid}i0"; | |
416 | $info->{fwln} = "fwln${vmid}i0"; | |
417 | $info->{fwpr} = "fwpr${vmid}p0"; | |
418 | ||
419 | return $info; | |
420 | } | |
f1bafd37 DM |
421 | |
422 | sub simulate_firewall { | |
423 | my ($ruleset, $ipset_ruleset, $vmdata, $test) = @_; | |
424 | ||
1352eaa1 DM |
425 | my $from = $test->{from} || die "missing 'from' field"; |
426 | my $to = $test->{to} || die "missing 'to' field"; | |
427 | my $action = $test->{action} || die "missing 'action'"; | |
8215a0da | 428 | |
1352eaa1 | 429 | my $testid = $test->{id}; |
8215a0da | 430 | |
f1bafd37 DM |
431 | die "from/to needs to be different" if $from eq $to; |
432 | ||
433 | my $pkg = { | |
f1bafd37 | 434 | proto => 'tcp', |
8215a0da DM |
435 | sport => undef, |
436 | dport => undef, | |
437 | source => undef, | |
438 | dest => undef, | |
f1bafd37 DM |
439 | }; |
440 | ||
441 | while (my ($k,$v) = each %$test) { | |
1352eaa1 DM |
442 | next if $k eq 'from'; |
443 | next if $k eq 'to'; | |
444 | next if $k eq 'action'; | |
445 | next if $k eq 'id'; | |
8215a0da | 446 | die "unknown attribute '$k'\n" if !exists($pkg->{$k}); |
f1bafd37 DM |
447 | $pkg->{$k} = $v; |
448 | } | |
449 | ||
d1486f38 DM |
450 | my $from_info = {}; |
451 | ||
452 | my $start_state; | |
f1bafd37 DM |
453 | |
454 | if ($from eq 'host') { | |
d1486f38 DM |
455 | $from_info->{type} = 'host'; |
456 | $start_state = 'host'; | |
47ece390 DM |
457 | } elsif ($from =~ m|^(vmbr\d+)/(\S+)$|) { |
458 | $from_info->{type} = 'bport'; | |
459 | $from_info->{bridge} = $1; | |
460 | $from_info->{iface} = $2; | |
461 | $start_state = 'from-bport'; | |
31dc73f1 | 462 | } elsif ($from eq 'outside') { |
47ece390 DM |
463 | $from_info->{type} = 'bport'; |
464 | $from_info->{bridge} = 'vmbr0'; | |
465 | $from_info->{iface} = 'eth0'; | |
466 | $start_state = 'from-bport'; | |
c0c871d8 | 467 | } elsif ($from eq 'nfvm') { |
47ece390 DM |
468 | $from_info->{type} = 'bport'; |
469 | $from_info->{bridge} = 'vmbr0'; | |
470 | $from_info->{iface} = 'tapXYZ'; | |
471 | $start_state = 'from-bport'; | |
f1bafd37 DM |
472 | } elsif ($from =~ m/^ct(\d+)$/) { |
473 | my $vmid = $1; | |
d1486f38 DM |
474 | $from_info = extract_ct_info($vmdata, $vmid); |
475 | if ($from_info->{ip_address}) { | |
1352eaa1 | 476 | $pkg->{source} = $from_info->{ip_address} if !defined($pkg->{source}); |
d1486f38 | 477 | $start_state = 'venet-out'; |
f1bafd37 DM |
478 | } else { |
479 | die "implement me"; | |
480 | } | |
f1bafd37 DM |
481 | } elsif ($from =~ m/^vm(\d+)$/) { |
482 | my $vmid = $1; | |
d1486f38 DM |
483 | $from_info = extract_vm_info($vmdata, $vmid); |
484 | $start_state = 'fwbr-out'; | |
485 | $pkg->{mac_source} = $from_info->{macaddr}; | |
f1bafd37 | 486 | } else { |
49e9d9a5 | 487 | die "unable to parse \"from => '$from'\"\n"; |
f1bafd37 DM |
488 | } |
489 | ||
d1486f38 DM |
490 | my $target; |
491 | ||
f1bafd37 | 492 | if ($to eq 'host') { |
d1486f38 DM |
493 | $target->{type} = 'host'; |
494 | $target->{iface} = 'host'; | |
47ece390 DM |
495 | } elsif ($to =~ m|^(vmbr\d+)/(\S+)$|) { |
496 | $target->{type} = 'bport'; | |
497 | $target->{bridge} = $1; | |
498 | $target->{iface} = $2; | |
31dc73f1 | 499 | } elsif ($to eq 'outside') { |
47ece390 DM |
500 | $target->{type} = 'bport'; |
501 | $target->{bridge} = 'vmbr0'; | |
502 | $target->{iface} = 'eth0'; | |
c0c871d8 | 503 | } elsif ($to eq 'nfvm') { |
47ece390 DM |
504 | $target->{type} = 'bport'; |
505 | $target->{bridge} = 'vmbr0'; | |
506 | $target->{iface} = 'tapXYZ'; | |
f1bafd37 DM |
507 | } elsif ($to =~ m/^ct(\d+)$/) { |
508 | my $vmid = $1; | |
d1486f38 DM |
509 | $target = extract_ct_info($vmdata, $vmid); |
510 | $target->{iface} = 'venet-in'; | |
511 | ||
512 | if ($target->{ip_address}) { | |
513 | $pkg->{dest} = $target->{ip_address}; | |
f1bafd37 DM |
514 | } else { |
515 | die "implement me"; | |
516 | } | |
f1bafd37 DM |
517 | } elsif ($to =~ m/^vm(\d+)$/) { |
518 | my $vmid = $1; | |
d1486f38 DM |
519 | $target = extract_vm_info($vmdata, $vmid); |
520 | $target->{iface} = $target->{tapdev}; | |
f1bafd37 | 521 | } else { |
49e9d9a5 | 522 | die "unable to parse \"to => '$to'\"\n"; |
f1bafd37 DM |
523 | } |
524 | ||
111cce51 DM |
525 | my ($res, $ic, $rc) = route_packet($ruleset, $ipset_ruleset, $pkg, |
526 | $from_info, $target, $start_state); | |
f1bafd37 | 527 | |
111cce51 DM |
528 | add_trace("IPT statistics: invocation = $ic, checks = $rc\n"); |
529 | ||
d1486f38 | 530 | die "test failed ($res != $action)\n" if $action ne $res; |
f1bafd37 | 531 | |
d1486f38 | 532 | return undef; |
f1bafd37 DM |
533 | } |
534 | ||
535 | sub run_tests { | |
ec2e28f6 DM |
536 | my ($vmdata, $testdir, $testfile, $testid) = @_; |
537 | ||
538 | $testfile = 'tests' if !$testfile; | |
f1bafd37 DM |
539 | |
540 | $vmdata->{testdir} = $testdir; | |
541 | ||
542 | my ($ruleset, $ipset_ruleset) = | |
543 | PVE::Firewall::compile(undef, undef, $vmdata); | |
544 | ||
ec2e28f6 DM |
545 | my $filename = "$testdir/$testfile"; |
546 | my $fh = IO::File->new($filename) || | |
547 | die "unable to open '$filename' - $!\n"; | |
f1bafd37 | 548 | |
ec2e28f6 | 549 | my $testcount = 0; |
f1bafd37 DM |
550 | while (defined(my $line = <$fh>)) { |
551 | next if $line =~ m/^\s*$/; | |
552 | next if $line =~ m/^#.*$/; | |
553 | if ($line =~ m/^\{.*\}\s*$/) { | |
554 | my $test = eval $line; | |
555 | die $@ if $@; | |
ec2e28f6 | 556 | next if defined($testid) && (!defined($test->{id}) || ($testid ne $test->{id})); |
f1bafd37 | 557 | $trace = ''; |
d1486f38 | 558 | print Dumper($ruleset) if $debug; |
ec2e28f6 | 559 | $testcount++; |
1352eaa1 DM |
560 | eval { |
561 | my @test_zones = qw(host outside nfvm vm100 ct200); | |
562 | if (!defined($test->{from}) && !defined($test->{to})) { | |
563 | die "missing zone speification (from, to)\n"; | |
564 | } elsif (!defined($test->{to})) { | |
565 | foreach my $zone (@test_zones) { | |
566 | next if $zone eq $test->{from}; | |
567 | $test->{to} = $zone; | |
568 | add_trace("Set Zone: to => '$zone'\n"); | |
569 | simulate_firewall($ruleset, $ipset_ruleset, $vmdata, $test); | |
570 | } | |
571 | } elsif (!defined($test->{from})) { | |
572 | foreach my $zone (@test_zones) { | |
573 | next if $zone eq $test->{to}; | |
574 | $test->{from} = $zone; | |
575 | add_trace("Set Zone: from => '$zone'\n"); | |
576 | simulate_firewall($ruleset, $ipset_ruleset, $vmdata, $test); | |
577 | } | |
578 | } else { | |
579 | simulate_firewall($ruleset, $ipset_ruleset, $vmdata, $test); | |
580 | } | |
581 | }; | |
f1bafd37 DM |
582 | if (my $err = $@) { |
583 | ||
d1486f38 | 584 | print Dumper($ruleset) if !$debug; |
f1bafd37 | 585 | |
d1486f38 | 586 | print "$trace\n" if !$debug; |
f1bafd37 | 587 | |
ec2e28f6 | 588 | print "$filename line $.: $line"; |
f1bafd37 DM |
589 | |
590 | print "test failed: $err\n"; | |
591 | ||
592 | exit(-1); | |
593 | } | |
594 | } else { | |
595 | die "parse error"; | |
596 | } | |
597 | } | |
598 | ||
ec2e28f6 DM |
599 | die "no tests found\n" if $testcount <= 0; |
600 | ||
601 | print "PASS: $filename\n"; | |
f1bafd37 DM |
602 | |
603 | return undef; | |
604 | } | |
605 | ||
606 | my $vmdata = { | |
607 | qemu => { | |
608 | 100 => { | |
db990d66 | 609 | net0 => "e1000=0E:0B:38:B8:B3:21,bridge=vmbr0,firewall=1", |
d1486f38 DM |
610 | }, |
611 | 101 => { | |
db990d66 | 612 | net0 => "e1000=0E:0B:38:B8:B3:22,bridge=vmbr0,firewall=1", |
d1486f38 DM |
613 | }, |
614 | # on bridge vmbr1 | |
615 | 110 => { | |
db990d66 | 616 | net0 => "e1000=0E:0B:38:B8:B4:21,bridge=vmbr1,firewall=1", |
f1bafd37 DM |
617 | }, |
618 | }, | |
619 | openvz => { | |
620 | 200 => { | |
621 | ip_address => { value => '10.0.200.1' }, | |
622 | }, | |
d1486f38 DM |
623 | 201 => { |
624 | ip_address => { value => '10.0.200.2' }, | |
625 | }, | |
f1bafd37 DM |
626 | }, |
627 | }; | |
628 | ||
ec2e28f6 DM |
629 | if ($testfilename) { |
630 | my $testfile; | |
631 | my $dir; | |
632 | ||
633 | if (-d $testfilename) { | |
634 | $dir = $testfilename; | |
635 | } elsif (-f $testfilename) { | |
636 | $dir = dirname($testfilename); | |
637 | $testfile = basename($testfilename); | |
638 | } else { | |
639 | die "no such file/dir '$testfilename'\n"; | |
640 | } | |
641 | ||
642 | run_tests($vmdata, $dir, $testfile, $testid); | |
643 | ||
644 | } else { | |
645 | foreach my $dir (<test-*>) { | |
646 | next if ! -d $dir; | |
647 | run_tests($vmdata, $dir); | |
648 | } | |
f1bafd37 DM |
649 | } |
650 | ||
651 | print "OK - all tests passed\n"; | |
652 | ||
653 | exit(0); |