]>
Commit | Line | Data |
---|---|---|
f1bafd37 DM |
1 | #!/usr/bin/perl |
2 | ||
3 | use lib '../src'; | |
4 | use strict; | |
5 | use warnings; | |
6 | use Data::Dumper; | |
7 | use PVE::Firewall; | |
8 | ||
9 | my $mark; | |
10 | my $trace; | |
11 | ||
12 | sub rule_match { | |
13 | my ($chain, $rule, $pkg) = @_; | |
14 | ||
15 | $rule =~ s/^-A $chain // || die "got strange rule: $rule"; | |
16 | ||
17 | if ($rule =~ s/^-m conntrack\s*//) { | |
18 | return undef; # simply ignore | |
19 | } | |
20 | ||
21 | if ($rule =~ s/^-m addrtype\s*//) { | |
22 | return undef; # simply ignore | |
23 | } | |
24 | ||
25 | if ($rule =~ s/^-i (\S+)\s*//) { | |
26 | die "missing iface_in" if !$pkg->{iface_in}; | |
27 | return undef if $pkg->{iface_in} ne $1; # no match | |
28 | } | |
29 | if ($rule =~ s/^-o (\S+)\s*//) { | |
30 | die "missing iface_out" if !$pkg->{iface_out}; | |
31 | return undef if $pkg->{iface_out} ne $1; # no match | |
32 | } | |
33 | ||
34 | if ($rule =~ s/^-p (tcp|udp)\s*//) { | |
35 | die "missing proto" if !$pkg->{proto}; | |
36 | return undef if $pkg->{proto} ne $1; # no match | |
37 | } | |
38 | ||
39 | if ($rule =~ s/^--dport (\d+):(\d+)\s*//) { | |
40 | die "missing dport" if !$pkg->{dport}; | |
41 | return undef if ($pkg->{dport} < $1) || ($pkg->{dport} > $2); # no match | |
42 | } | |
43 | ||
44 | if ($rule =~ s/^--dport (\d+)\s*//) { | |
45 | die "missing dport" if !$pkg->{dport}; | |
46 | return undef if $pkg->{dport} != $1; # no match | |
47 | } | |
48 | ||
49 | if ($rule =~ s/^-s (\S+)\s*//) { | |
50 | die "missing source" if !$pkg->{source}; | |
51 | return undef if $pkg->{source} ne $1; # no match | |
52 | } | |
53 | ||
54 | if ($rule =~ s/^-d (\S+)\s*//) { | |
55 | die "missing destination" if !$pkg->{dest}; | |
56 | return undef if $pkg->{dest} ne $1; # no match | |
57 | } | |
58 | ||
59 | if ($rule =~ s/^-m mac ! --mac-source (\S+)\s*//) { | |
60 | die "missing source mac" if !$pkg->{mac_source}; | |
61 | return undef if $pkg->{mac_source} eq $1; # no match | |
62 | } | |
63 | ||
64 | if ($rule =~ s/^-m physdev --physdev-is-bridged --physdev-in (\S+)\s*//) { | |
65 | my $devre = $1; | |
66 | $devre =~ s/\+/\.\*/; | |
67 | return undef if !$pkg->{physdev_in}; | |
68 | return undef if $pkg->{physdev_in} !~ m/^${devre}$/; | |
69 | } | |
70 | ||
71 | if ($rule =~ s/^-m physdev --physdev-is-bridged --physdev-out (\S+)\s*//) { | |
72 | my $devre = $1; | |
73 | $devre =~ s/\+/\.\*/; | |
74 | return undef if !$pkg->{physdev_out}; | |
75 | return undef if $pkg->{physdev_out} !~ m/^${devre}$/; | |
76 | } | |
77 | ||
78 | if ($rule =~ s/^-j MARK --set-mark (\d+)\s*$//) { | |
79 | $mark = $1; | |
80 | return undef; | |
81 | } | |
82 | ||
83 | if ($rule =~ s/^-j (\S+)\s*$//) { | |
84 | return (0, $1); | |
85 | } | |
86 | ||
87 | if ($rule =~ s/^-g (\S+)\s*$//) { | |
88 | return (1, $1); | |
89 | } | |
90 | ||
91 | die "unable to parse rule: $rule"; | |
92 | } | |
93 | ||
94 | sub ruleset_simulate_chain { | |
95 | my ($ruleset, $chain, $pkg) = @_; | |
96 | ||
97 | $trace .= "ENTER chain $chain\n"; | |
98 | ||
99 | if ($chain eq 'PVEFW-Drop') { | |
100 | $trace .= "LEAVE chain $chain\n"; | |
101 | return 'DROP'; | |
102 | } | |
103 | if ($chain eq 'PVEFW-reject') { | |
104 | $trace .= "LEAVE chain $chain\n"; | |
105 | return 'REJECT'; | |
106 | } | |
107 | ||
108 | if ($chain eq 'PVEFW-tcpflags') { | |
109 | $trace .= "LEAVE chain $chain\n"; | |
110 | return undef; | |
111 | } | |
112 | ||
113 | my $rules = $ruleset->{$chain} || | |
114 | die "no such chain '$chain'"; | |
115 | ||
116 | foreach my $rule (@$rules) { | |
117 | my ($goto, $action) = rule_match($chain, $rule, $pkg); | |
118 | if (!defined($action)) { | |
119 | $trace .= "SKIP: $rule\n"; | |
120 | next; | |
121 | } | |
122 | $trace .= "MATCH: $rule\n"; | |
123 | ||
124 | if ($action eq 'ACCEPT' || $action eq 'DROP' || $action eq 'REJECT') { | |
125 | $trace .= "TERMINATE chain $chain: $action\n"; | |
126 | return $action; | |
127 | } elsif ($action eq 'RETURN') { | |
128 | $trace .= "RETURN FROM chain $chain\n"; | |
129 | last; | |
130 | } else { | |
131 | if ($goto) { | |
132 | $trace .= "LEAVE chain $chain - goto $action\n"; | |
133 | return ruleset_simulate_chain($ruleset, $action, $pkg) | |
134 | #$chain = $action; | |
135 | #$rules = $ruleset->{$chain} || die "no such chain '$chain'"; | |
136 | } else { | |
137 | if ($action = ruleset_simulate_chain($ruleset, $action, $pkg)) { | |
138 | return $action; | |
139 | } | |
140 | $trace .= "CONTINUE chain $chain\n"; | |
141 | } | |
142 | } | |
143 | } | |
144 | ||
145 | $trace .= "LEAVE chain $chain\n"; | |
146 | if ($chain =~ m/^PVEFW-(INPUT|OUTPUT|FORWARD)$/) { | |
147 | return 'ACCEPT'; # default policy | |
148 | } | |
149 | ||
150 | return undef; | |
151 | } | |
152 | ||
153 | sub copy_packet { | |
154 | my ($pkg) = @_; | |
155 | ||
156 | my $res = {}; | |
157 | ||
158 | while (my ($k,$v) = each %$pkg) { | |
159 | $res->{$k} = $v; | |
160 | } | |
161 | ||
162 | return $res; | |
163 | } | |
164 | ||
165 | ||
166 | sub simulate_firewall { | |
167 | my ($ruleset, $ipset_ruleset, $vmdata, $test) = @_; | |
168 | ||
169 | my $from = delete $test->{from} || die "missing 'from' field"; | |
170 | my $to = delete $test->{to} || die "missing 'to' field"; | |
171 | my $action = delete $test->{action} || die "missing 'action'"; | |
172 | ||
173 | die "from/to needs to be different" if $from eq $to; | |
174 | ||
175 | my $pkg = { | |
176 | iface_in => 'lo', | |
177 | iface_out => 'lo', | |
178 | proto => 'tcp', | |
179 | sport => '1234', | |
180 | dport => '4321', | |
181 | source => '10.11.12.13', | |
182 | dest => '10.11.12.14', | |
183 | }; | |
184 | ||
185 | while (my ($k,$v) = each %$test) { | |
186 | $pkg->{$k} = $v; | |
187 | } | |
188 | ||
189 | my $pre_test; | |
190 | ||
191 | if ($from eq 'host') { | |
192 | $pre_test = ['PVEFW-OUTPUT', $pkg]; | |
193 | } elsif ($from =~ m/^ct(\d+)$/) { | |
194 | my $vmid = $1; | |
195 | my $conf = $vmdata->{openvz}->{$vmid} || die "no such CT '$vmid'"; | |
196 | if ($conf->{ip_address}) { | |
197 | $pkg->{source} = $conf->{ip_address}->{value}; | |
198 | $pkg->{iface_in} = 'venet0'; | |
199 | } else { | |
200 | die "implement me"; | |
201 | } | |
202 | $pre_test = ['PVEFW-FORWARD', $pkg]; | |
203 | } elsif ($from =~ m/^vm(\d+)$/) { | |
204 | my $vmid = $1; | |
205 | my $conf = $vmdata->{qemu}->{$vmid} || die "no such VM '$vmid'"; | |
206 | my $net = PVE::QemuServer::parse_net($conf->{net0}); | |
207 | my $macaddr = $net->{macaddr} || die "unable to get mac address"; | |
208 | $pkg->{iface_in} = $net->{bridge} || die "unable to get bridge"; | |
209 | $pkg->{mac_source} = $macaddr; | |
210 | my $brpkg = copy_packet($pkg); | |
211 | $brpkg->{physdev_in} = "tap${vmid}i0"; | |
d1b41c08 | 212 | $brpkg->{physdev_out} = "fwln${vmid}i0"; |
f1bafd37 DM |
213 | $brpkg->{iface_in} = $brpkg->{iface_out} = "fwbr${vmid}i0"; |
214 | $pre_test = ['PVEFW-FORWARD', $brpkg]; | |
215 | } else { | |
216 | die "implement me"; | |
217 | } | |
218 | ||
219 | my $post_test; | |
220 | if ($to eq 'host') { | |
221 | $post_test = ['PVEFW-INPUT', $pkg]; | |
222 | } elsif ($to =~ m/^ct(\d+)$/) { | |
223 | my $vmid = $1; | |
224 | my $conf = $vmdata->{openvz}->{$vmid} || die "no such CT '$vmid'"; | |
225 | if ($conf->{ip_address}) { | |
226 | $pkg->{dest} = $conf->{ip_address}->{value}; | |
227 | $pkg->{iface_out} = 'venet0'; | |
228 | } else { | |
229 | die "implement me"; | |
230 | } | |
231 | $post_test = ['PVEFW-FORWARD', $pkg]; | |
232 | } elsif ($to =~ m/^vm(\d+)$/) { | |
233 | my $vmid = $1; | |
234 | my $conf = $vmdata->{qemu}->{$vmid} || die "no such VM '$vmid'"; | |
235 | my $net = PVE::QemuServer::parse_net($conf->{net0}); | |
236 | $pkg->{iface_out} = $net->{bridge} || die "unable to get bridge"; | |
237 | my $brpkg = copy_packet($pkg); | |
238 | $brpkg->{physdev_out} = "tap${vmid}i0"; | |
d1b41c08 | 239 | $brpkg->{physdev_in} = "fwln${vmid}i0"; |
f1bafd37 DM |
240 | $brpkg->{iface_in} = $brpkg->{iface_out} = "fwbr${vmid}i0"; |
241 | $post_test = ['PVEFW-FORWARD', $brpkg]; | |
242 | } else { | |
243 | die "implement me"; | |
244 | } | |
245 | ||
246 | my $res = 'UNKNOWN'; | |
247 | if ($pre_test) { | |
248 | my ($chain, $testpkg) = @$pre_test; | |
249 | $trace .= "PRE TEST $chain: " . Dumper($testpkg); | |
250 | $res = ruleset_simulate_chain($ruleset, $chain, $testpkg); | |
251 | if ($res ne 'ACCEPT') { | |
252 | die "test failed ($res != $action)\n" if $action ne $res; | |
253 | return undef; # sucess | |
254 | } | |
255 | } | |
256 | ||
257 | if ($post_test) { | |
258 | my ($chain, $testpkg) = @$post_test; | |
259 | $trace .= "POST TEST $chain: " . Dumper($testpkg); | |
260 | $res = ruleset_simulate_chain($ruleset, $chain, $testpkg); | |
261 | if ($res ne 'ACCEPT') { | |
262 | die "test failed ($res != $action)\n" if $action ne $res; | |
263 | return undef; # sucess | |
264 | } | |
265 | } | |
266 | ||
267 | die "test failed ($res != $action)\n" if $action ne $res; # fixme: remove | |
268 | ||
269 | return undef; | |
270 | } | |
271 | ||
272 | sub run_tests { | |
273 | my ($vmdata, $testdir) = @_; | |
274 | ||
275 | $vmdata->{testdir} = $testdir; | |
276 | ||
277 | my ($ruleset, $ipset_ruleset) = | |
278 | PVE::Firewall::compile(undef, undef, $vmdata); | |
279 | ||
280 | my $testfile = "$testdir/tests"; | |
281 | my $fh = IO::File->new($testfile) || | |
282 | die "unable to open '$testfile' - $!\n"; | |
283 | ||
284 | while (defined(my $line = <$fh>)) { | |
285 | next if $line =~ m/^\s*$/; | |
286 | next if $line =~ m/^#.*$/; | |
287 | if ($line =~ m/^\{.*\}\s*$/) { | |
288 | my $test = eval $line; | |
289 | die $@ if $@; | |
290 | $trace = ''; | |
291 | eval { simulate_firewall($ruleset, $ipset_ruleset, $vmdata, $test); }; | |
292 | if (my $err = $@) { | |
293 | ||
294 | print Dumper($ruleset); | |
295 | ||
296 | print "$trace\n"; | |
297 | ||
298 | print "$testfile line $.: $line"; | |
299 | ||
300 | print "test failed: $err\n"; | |
301 | ||
302 | exit(-1); | |
303 | } | |
304 | } else { | |
305 | die "parse error"; | |
306 | } | |
307 | } | |
308 | ||
309 | print "PASS: $testfile\n"; | |
310 | ||
311 | return undef; | |
312 | } | |
313 | ||
314 | my $vmdata = { | |
315 | qemu => { | |
316 | 100 => { | |
317 | net0 => "e1000=0E:0B:38:B8:B3:21,bridge=vmbr0,firewall=0", | |
318 | }, | |
319 | }, | |
320 | openvz => { | |
321 | 200 => { | |
322 | ip_address => { value => '10.0.200.1' }, | |
323 | }, | |
324 | }, | |
325 | }; | |
326 | ||
327 | foreach my $dir (<test-*>) { | |
328 | next if ! -d $dir; | |
329 | run_tests($vmdata, $dir); | |
330 | } | |
331 | ||
332 | print "OK - all tests passed\n"; | |
333 | ||
334 | exit(0); |