2013-03-04 16:30:40 +00:00
|
|
|
/*
|
|
|
|
* Copyright (C) 2013-2014 Red Hat, Inc.
|
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
|
|
* License as published by the Free Software Foundation; either
|
|
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* Lesser General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
|
|
* License along with this library. If not, see
|
|
|
|
* <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <config.h>
|
|
|
|
|
|
|
|
#include "testutils.h"
|
|
|
|
|
2014-05-01 18:43:58 +00:00
|
|
|
#if defined(__linux__)
|
2013-03-04 16:30:40 +00:00
|
|
|
|
2020-09-15 12:00:53 +00:00
|
|
|
# include <gio/gio.h>
|
|
|
|
|
2014-05-01 18:43:58 +00:00
|
|
|
# include "virbuffer.h"
|
2018-12-13 14:53:50 +00:00
|
|
|
# define LIBVIRT_VIRCOMMANDPRIV_H_ALLOW
|
2014-05-01 18:43:58 +00:00
|
|
|
# include "vircommandpriv.h"
|
2018-12-13 14:53:50 +00:00
|
|
|
# define LIBVIRT_VIRFIREWALLPRIV_H_ALLOW
|
2014-05-01 18:43:58 +00:00
|
|
|
# include "virfirewallpriv.h"
|
2019-01-09 19:11:32 +00:00
|
|
|
# define LIBVIRT_VIRFIREWALLDPRIV_H_ALLOW
|
|
|
|
# include "virfirewalldpriv.h"
|
2014-05-01 18:43:58 +00:00
|
|
|
# include "virmock.h"
|
|
|
|
|
|
|
|
# define VIR_FROM_THIS VIR_FROM_FIREWALL
|
|
|
|
|
2013-03-04 16:30:40 +00:00
|
|
|
static bool fwDisabled = true;
|
|
|
|
static virBufferPtr fwBuf;
|
|
|
|
static bool fwError;
|
|
|
|
|
2017-11-03 12:09:47 +00:00
|
|
|
# define TEST_FILTER_TABLE_LIST \
|
|
|
|
"Chain INPUT (policy ACCEPT)\n" \
|
|
|
|
"target prot opt source destination\n" \
|
|
|
|
"\n" \
|
|
|
|
"Chain FORWARD (policy ACCEPT)\n" \
|
|
|
|
"target prot opt source destination\n" \
|
|
|
|
"\n" \
|
|
|
|
"Chain OUTPUT (policy ACCEPT)\n" \
|
2013-03-04 16:30:40 +00:00
|
|
|
"target prot opt source destination\n"
|
|
|
|
|
2017-11-03 12:09:47 +00:00
|
|
|
# define TEST_NAT_TABLE_LIST \
|
|
|
|
"Chain PREROUTING (policy ACCEPT)\n" \
|
|
|
|
"target prot opt source destination\n" \
|
|
|
|
"\n" \
|
|
|
|
"Chain INPUT (policy ACCEPT)\n" \
|
|
|
|
"target prot opt source destination\n" \
|
|
|
|
"\n" \
|
|
|
|
"Chain OUTPUT (policy ACCEPT)\n" \
|
|
|
|
"target prot opt source destination\n" \
|
|
|
|
"\n" \
|
|
|
|
"Chain POSTROUTING (policy ACCEPT)\n" \
|
2013-03-04 16:30:40 +00:00
|
|
|
"target prot opt source destination\n"
|
|
|
|
|
2020-09-15 12:00:53 +00:00
|
|
|
VIR_MOCK_WRAP_RET_ARGS(g_dbus_connection_call_sync,
|
|
|
|
GVariant *,
|
|
|
|
GDBusConnection *, connection,
|
|
|
|
const gchar *, bus_name,
|
|
|
|
const gchar *, object_path,
|
|
|
|
const gchar *, interface_name,
|
|
|
|
const gchar *, method_name,
|
|
|
|
GVariant *, parameters,
|
|
|
|
const GVariantType *, reply_type,
|
|
|
|
GDBusCallFlags, flags,
|
|
|
|
gint, timeout_msec,
|
|
|
|
GCancellable *, cancellable,
|
|
|
|
GError **, error)
|
2013-03-04 16:30:40 +00:00
|
|
|
{
|
2020-09-15 12:00:53 +00:00
|
|
|
GVariant *reply = NULL;
|
|
|
|
g_autoptr(GVariant) params = parameters;
|
|
|
|
|
2020-10-02 10:11:45 +00:00
|
|
|
if (params)
|
|
|
|
g_variant_ref_sink(params);
|
|
|
|
|
2020-09-15 12:00:53 +00:00
|
|
|
VIR_MOCK_REAL_INIT(g_dbus_connection_call_sync);
|
|
|
|
|
|
|
|
if (STREQ(bus_name, "org.freedesktop.DBus") &&
|
|
|
|
STREQ(method_name, "ListNames")) {
|
|
|
|
GVariantBuilder builder;
|
|
|
|
|
|
|
|
g_variant_builder_init(&builder, G_VARIANT_TYPE("(as)"));
|
|
|
|
g_variant_builder_open(&builder, G_VARIANT_TYPE("as"));
|
|
|
|
|
|
|
|
g_variant_builder_add(&builder, "s", "org.foo.bar.wizz");
|
|
|
|
|
|
|
|
if (!fwDisabled)
|
|
|
|
g_variant_builder_add(&builder, "s", VIR_FIREWALL_FIREWALLD_SERVICE);
|
|
|
|
|
|
|
|
g_variant_builder_close(&builder);
|
|
|
|
|
|
|
|
reply = g_variant_builder_end(&builder);
|
|
|
|
} else if (STREQ(bus_name, VIR_FIREWALL_FIREWALLD_SERVICE) &&
|
|
|
|
STREQ(method_name, "passthrough")) {
|
|
|
|
g_autoptr(GVariantIter) iter = NULL;
|
|
|
|
VIR_AUTOSTRINGLIST args = NULL;
|
|
|
|
size_t nargs = 0;
|
|
|
|
char *type = NULL;
|
|
|
|
char *item = NULL;
|
2013-03-04 16:30:40 +00:00
|
|
|
bool isAdd = false;
|
|
|
|
bool doError = false;
|
2020-09-15 12:00:53 +00:00
|
|
|
size_t i;
|
2013-03-04 16:30:40 +00:00
|
|
|
|
2020-09-15 12:00:53 +00:00
|
|
|
g_variant_get(params, "(&sas)", &type, &iter);
|
2013-03-04 16:30:40 +00:00
|
|
|
|
2020-09-15 12:00:53 +00:00
|
|
|
nargs = g_variant_iter_n_children(iter);
|
|
|
|
|
|
|
|
while (g_variant_iter_loop(iter, "s", &item)) {
|
2013-03-04 16:30:40 +00:00
|
|
|
/* Fake failure on the command with this IP addr */
|
2020-09-15 12:00:53 +00:00
|
|
|
if (STREQ(item, "-A")) {
|
2013-03-04 16:30:40 +00:00
|
|
|
isAdd = true;
|
2020-09-15 12:00:53 +00:00
|
|
|
} else if (isAdd && STREQ(item, "192.168.122.255")) {
|
2013-03-04 16:30:40 +00:00
|
|
|
doError = true;
|
|
|
|
}
|
2020-09-15 12:00:53 +00:00
|
|
|
|
2020-10-02 08:37:26 +00:00
|
|
|
virStringListAdd(&args, item);
|
2013-03-04 16:30:40 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (fwBuf) {
|
|
|
|
if (STREQ(type, "ipv4"))
|
|
|
|
virBufferAddLit(fwBuf, IPTABLES_PATH);
|
|
|
|
else if (STREQ(type, "ipv4"))
|
|
|
|
virBufferAddLit(fwBuf, IP6TABLES_PATH);
|
|
|
|
else
|
|
|
|
virBufferAddLit(fwBuf, EBTABLES_PATH);
|
|
|
|
}
|
2020-09-15 12:00:53 +00:00
|
|
|
|
2013-03-04 16:30:40 +00:00
|
|
|
for (i = 0; i < nargs; i++) {
|
|
|
|
if (fwBuf) {
|
|
|
|
virBufferAddLit(fwBuf, " ");
|
|
|
|
virBufferEscapeShell(fwBuf, args[i]);
|
|
|
|
}
|
|
|
|
}
|
2020-09-15 12:00:53 +00:00
|
|
|
|
2013-03-04 16:30:40 +00:00
|
|
|
if (fwBuf)
|
|
|
|
virBufferAddLit(fwBuf, "\n");
|
2020-09-15 12:00:53 +00:00
|
|
|
|
2013-03-04 16:30:40 +00:00
|
|
|
if (doError) {
|
2020-09-15 12:00:53 +00:00
|
|
|
if (error)
|
|
|
|
*error = g_dbus_error_new_for_dbus_error("org.firewalld.error",
|
|
|
|
"something bad happened");
|
2013-03-04 16:30:40 +00:00
|
|
|
} else {
|
|
|
|
if (nargs == 1 &&
|
|
|
|
STREQ(type, "ipv4") &&
|
|
|
|
STREQ(args[0], "-L")) {
|
2020-09-15 12:00:53 +00:00
|
|
|
reply = g_variant_new("(s)", TEST_FILTER_TABLE_LIST);
|
2013-03-04 16:30:40 +00:00
|
|
|
} else if (nargs == 3 &&
|
|
|
|
STREQ(type, "ipv4") &&
|
|
|
|
STREQ(args[0], "-t") &&
|
|
|
|
STREQ(args[1], "nat") &&
|
|
|
|
STREQ(args[2], "-L")) {
|
2020-09-15 12:00:53 +00:00
|
|
|
reply = g_variant_new("(s)", TEST_NAT_TABLE_LIST);
|
2013-03-04 16:30:40 +00:00
|
|
|
} else {
|
2020-09-15 12:00:53 +00:00
|
|
|
reply = g_variant_new("(s)", "success");
|
2013-03-04 16:30:40 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
2020-09-15 12:00:53 +00:00
|
|
|
reply = g_variant_new("()");
|
2013-03-04 16:30:40 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return reply;
|
|
|
|
}
|
|
|
|
|
|
|
|
struct testFirewallData {
|
|
|
|
virFirewallBackend tryBackend;
|
|
|
|
virFirewallBackend expectBackend;
|
|
|
|
bool fwDisabled;
|
|
|
|
};
|
|
|
|
|
|
|
|
static int
|
|
|
|
testFirewallSingleGroup(const void *opaque)
|
|
|
|
{
|
2020-07-02 23:35:41 +00:00
|
|
|
g_auto(virBuffer) cmdbuf = VIR_BUFFER_INITIALIZER;
|
2020-07-04 20:35:10 +00:00
|
|
|
g_autoptr(virFirewall) fw = virFirewallNew();
|
2013-03-04 16:30:40 +00:00
|
|
|
int ret = -1;
|
|
|
|
const char *actual = NULL;
|
|
|
|
const char *expected =
|
|
|
|
IPTABLES_PATH " -A INPUT --source-host 192.168.122.1 --jump ACCEPT\n"
|
|
|
|
IPTABLES_PATH " -A INPUT --source-host '!192.168.122.1' --jump REJECT\n";
|
|
|
|
const struct testFirewallData *data = opaque;
|
|
|
|
|
|
|
|
fwDisabled = data->fwDisabled;
|
|
|
|
if (virFirewallSetBackend(data->tryBackend) < 0)
|
|
|
|
goto cleanup;
|
|
|
|
|
|
|
|
if (data->expectBackend == VIR_FIREWALL_BACKEND_DIRECT)
|
|
|
|
virCommandSetDryRun(&cmdbuf, NULL, NULL);
|
|
|
|
else
|
|
|
|
fwBuf = &cmdbuf;
|
|
|
|
|
|
|
|
virFirewallStartTransaction(fw, 0);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-A", "INPUT",
|
|
|
|
"--source-host", "192.168.122.1",
|
|
|
|
"--jump", "ACCEPT", NULL);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-A", "INPUT",
|
|
|
|
"--source-host", "!192.168.122.1",
|
|
|
|
"--jump", "REJECT", NULL);
|
|
|
|
|
|
|
|
if (virFirewallApply(fw) < 0)
|
|
|
|
goto cleanup;
|
|
|
|
|
|
|
|
actual = virBufferCurrentContent(&cmdbuf);
|
|
|
|
|
|
|
|
if (STRNEQ_NULLABLE(expected, actual)) {
|
2018-12-04 17:08:14 +00:00
|
|
|
fprintf(stderr, "Unexpected command execution\n");
|
2016-05-26 15:01:51 +00:00
|
|
|
virTestDifference(stderr, expected, actual);
|
2013-03-04 16:30:40 +00:00
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = 0;
|
|
|
|
cleanup:
|
|
|
|
fwBuf = NULL;
|
|
|
|
virCommandSetDryRun(NULL, NULL, NULL);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int
|
|
|
|
testFirewallRemoveRule(const void *opaque)
|
|
|
|
{
|
2020-07-02 23:35:41 +00:00
|
|
|
g_auto(virBuffer) cmdbuf = VIR_BUFFER_INITIALIZER;
|
2020-07-04 20:35:10 +00:00
|
|
|
g_autoptr(virFirewall) fw = virFirewallNew();
|
2013-03-04 16:30:40 +00:00
|
|
|
int ret = -1;
|
|
|
|
const char *actual = NULL;
|
|
|
|
const char *expected =
|
|
|
|
IPTABLES_PATH " -A INPUT --source-host 192.168.122.1 --jump ACCEPT\n"
|
|
|
|
IPTABLES_PATH " -A INPUT --source-host '!192.168.122.1' --jump REJECT\n";
|
|
|
|
const struct testFirewallData *data = opaque;
|
|
|
|
virFirewallRulePtr fwrule;
|
|
|
|
|
|
|
|
fwDisabled = data->fwDisabled;
|
|
|
|
if (virFirewallSetBackend(data->tryBackend) < 0)
|
|
|
|
goto cleanup;
|
|
|
|
|
|
|
|
if (data->expectBackend == VIR_FIREWALL_BACKEND_DIRECT)
|
|
|
|
virCommandSetDryRun(&cmdbuf, NULL, NULL);
|
|
|
|
else
|
|
|
|
fwBuf = &cmdbuf;
|
|
|
|
|
|
|
|
virFirewallStartTransaction(fw, 0);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-A", "INPUT",
|
|
|
|
"--source-host", "192.168.122.1",
|
|
|
|
"--jump", "ACCEPT", NULL);
|
|
|
|
|
|
|
|
fwrule = virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-A", "INPUT", NULL);
|
|
|
|
virFirewallRuleAddArg(fw, fwrule, "--source-host");
|
|
|
|
virFirewallRemoveRule(fw, fwrule);
|
|
|
|
|
|
|
|
fwrule = virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-A", "INPUT", NULL);
|
|
|
|
virFirewallRuleAddArg(fw, fwrule, "--source-host");
|
|
|
|
virFirewallRuleAddArgFormat(fw, fwrule, "%s", "!192.168.122.1");
|
|
|
|
virFirewallRuleAddArgList(fw, fwrule, "--jump", "REJECT", NULL);
|
|
|
|
|
|
|
|
if (virFirewallApply(fw) < 0)
|
|
|
|
goto cleanup;
|
|
|
|
|
|
|
|
actual = virBufferCurrentContent(&cmdbuf);
|
|
|
|
|
|
|
|
if (STRNEQ_NULLABLE(expected, actual)) {
|
2018-12-04 17:08:14 +00:00
|
|
|
fprintf(stderr, "Unexpected command execution\n");
|
2016-05-26 15:01:51 +00:00
|
|
|
virTestDifference(stderr, expected, actual);
|
2013-03-04 16:30:40 +00:00
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = 0;
|
|
|
|
cleanup:
|
|
|
|
fwBuf = NULL;
|
|
|
|
virCommandSetDryRun(NULL, NULL, NULL);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int
|
2019-10-14 12:45:03 +00:00
|
|
|
testFirewallManyGroups(const void *opaque G_GNUC_UNUSED)
|
2013-03-04 16:30:40 +00:00
|
|
|
{
|
2020-07-02 23:35:41 +00:00
|
|
|
g_auto(virBuffer) cmdbuf = VIR_BUFFER_INITIALIZER;
|
2020-07-04 20:35:10 +00:00
|
|
|
g_autoptr(virFirewall) fw = virFirewallNew();
|
2013-03-04 16:30:40 +00:00
|
|
|
int ret = -1;
|
|
|
|
const char *actual = NULL;
|
|
|
|
const char *expected =
|
|
|
|
IPTABLES_PATH " -A INPUT --source-host 192.168.122.1 --jump ACCEPT\n"
|
|
|
|
IPTABLES_PATH " -A INPUT --source-host '!192.168.122.1' --jump REJECT\n"
|
|
|
|
IPTABLES_PATH " -A OUTPUT --source-host 192.168.122.1 --jump ACCEPT\n"
|
|
|
|
IPTABLES_PATH " -A OUTPUT --jump DROP\n";
|
|
|
|
const struct testFirewallData *data = opaque;
|
|
|
|
|
|
|
|
fwDisabled = data->fwDisabled;
|
|
|
|
if (virFirewallSetBackend(data->tryBackend) < 0)
|
|
|
|
goto cleanup;
|
|
|
|
|
|
|
|
if (data->expectBackend == VIR_FIREWALL_BACKEND_DIRECT)
|
|
|
|
virCommandSetDryRun(&cmdbuf, NULL, NULL);
|
|
|
|
else
|
|
|
|
fwBuf = &cmdbuf;
|
|
|
|
|
|
|
|
virFirewallStartTransaction(fw, 0);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-A", "INPUT",
|
|
|
|
"--source-host", "192.168.122.1",
|
|
|
|
"--jump", "ACCEPT", NULL);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-A", "INPUT",
|
|
|
|
"--source-host", "!192.168.122.1",
|
|
|
|
"--jump", "REJECT", NULL);
|
|
|
|
|
|
|
|
virFirewallStartTransaction(fw, 0);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-A", "OUTPUT",
|
|
|
|
"--source-host", "192.168.122.1",
|
|
|
|
"--jump", "ACCEPT", NULL);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-A", "OUTPUT",
|
|
|
|
"--jump", "DROP", NULL);
|
|
|
|
|
|
|
|
|
|
|
|
if (virFirewallApply(fw) < 0)
|
|
|
|
goto cleanup;
|
|
|
|
|
|
|
|
actual = virBufferCurrentContent(&cmdbuf);
|
|
|
|
|
|
|
|
if (STRNEQ_NULLABLE(expected, actual)) {
|
2018-12-04 17:08:14 +00:00
|
|
|
fprintf(stderr, "Unexpected command execution\n");
|
2016-05-26 15:01:51 +00:00
|
|
|
virTestDifference(stderr, expected, actual);
|
2013-03-04 16:30:40 +00:00
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = 0;
|
|
|
|
cleanup:
|
|
|
|
fwBuf = NULL;
|
|
|
|
virCommandSetDryRun(NULL, NULL, NULL);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
testFirewallRollbackHook(const char *const*args,
|
2019-10-14 12:45:03 +00:00
|
|
|
const char *const*env G_GNUC_UNUSED,
|
|
|
|
const char *input G_GNUC_UNUSED,
|
|
|
|
char **output G_GNUC_UNUSED,
|
|
|
|
char **error G_GNUC_UNUSED,
|
2013-03-04 16:30:40 +00:00
|
|
|
int *status,
|
2019-10-14 12:45:03 +00:00
|
|
|
void *opaque G_GNUC_UNUSED)
|
2013-03-04 16:30:40 +00:00
|
|
|
{
|
|
|
|
bool isAdd = false;
|
|
|
|
while (*args) {
|
|
|
|
/* Fake failure on the command with this IP addr */
|
|
|
|
if (STREQ(*args, "-A")) {
|
|
|
|
isAdd = true;
|
|
|
|
} else if (isAdd && STREQ(*args, "192.168.122.255")) {
|
|
|
|
*status = 127;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
args++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2019-10-14 12:45:03 +00:00
|
|
|
testFirewallIgnoreFailGroup(const void *opaque G_GNUC_UNUSED)
|
2013-03-04 16:30:40 +00:00
|
|
|
{
|
2020-07-02 23:35:41 +00:00
|
|
|
g_auto(virBuffer) cmdbuf = VIR_BUFFER_INITIALIZER;
|
2020-07-04 20:35:10 +00:00
|
|
|
g_autoptr(virFirewall) fw = virFirewallNew();
|
2013-03-04 16:30:40 +00:00
|
|
|
int ret = -1;
|
|
|
|
const char *actual = NULL;
|
|
|
|
const char *expected =
|
|
|
|
IPTABLES_PATH " -A INPUT --source-host 192.168.122.1 --jump ACCEPT\n"
|
|
|
|
IPTABLES_PATH " -A INPUT --source-host 192.168.122.255 --jump REJECT\n"
|
|
|
|
IPTABLES_PATH " -A OUTPUT --source-host 192.168.122.1 --jump ACCEPT\n"
|
|
|
|
IPTABLES_PATH " -A OUTPUT --jump DROP\n";
|
|
|
|
const struct testFirewallData *data = opaque;
|
|
|
|
|
|
|
|
fwDisabled = data->fwDisabled;
|
|
|
|
if (virFirewallSetBackend(data->tryBackend) < 0)
|
|
|
|
goto cleanup;
|
|
|
|
|
|
|
|
if (data->expectBackend == VIR_FIREWALL_BACKEND_DIRECT) {
|
|
|
|
virCommandSetDryRun(&cmdbuf, testFirewallRollbackHook, NULL);
|
|
|
|
} else {
|
|
|
|
fwBuf = &cmdbuf;
|
|
|
|
fwError = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
virFirewallStartTransaction(fw, VIR_FIREWALL_TRANSACTION_IGNORE_ERRORS);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-A", "INPUT",
|
|
|
|
"--source-host", "192.168.122.1",
|
|
|
|
"--jump", "ACCEPT", NULL);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-A", "INPUT",
|
|
|
|
"--source-host", "192.168.122.255",
|
|
|
|
"--jump", "REJECT", NULL);
|
|
|
|
|
|
|
|
virFirewallStartTransaction(fw, 0);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-A", "OUTPUT",
|
|
|
|
"--source-host", "192.168.122.1",
|
|
|
|
"--jump", "ACCEPT", NULL);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-A", "OUTPUT",
|
|
|
|
"--jump", "DROP", NULL);
|
|
|
|
|
|
|
|
|
|
|
|
if (virFirewallApply(fw) < 0)
|
|
|
|
goto cleanup;
|
|
|
|
|
|
|
|
actual = virBufferCurrentContent(&cmdbuf);
|
|
|
|
|
|
|
|
if (STRNEQ_NULLABLE(expected, actual)) {
|
2018-12-04 17:08:14 +00:00
|
|
|
fprintf(stderr, "Unexpected command execution\n");
|
2016-05-26 15:01:51 +00:00
|
|
|
virTestDifference(stderr, expected, actual);
|
2013-03-04 16:30:40 +00:00
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = 0;
|
|
|
|
cleanup:
|
|
|
|
fwBuf = NULL;
|
|
|
|
virCommandSetDryRun(NULL, NULL, NULL);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int
|
2019-10-14 12:45:03 +00:00
|
|
|
testFirewallIgnoreFailRule(const void *opaque G_GNUC_UNUSED)
|
2013-03-04 16:30:40 +00:00
|
|
|
{
|
2020-07-02 23:35:41 +00:00
|
|
|
g_auto(virBuffer) cmdbuf = VIR_BUFFER_INITIALIZER;
|
2020-07-04 20:35:10 +00:00
|
|
|
g_autoptr(virFirewall) fw = virFirewallNew();
|
2013-03-04 16:30:40 +00:00
|
|
|
int ret = -1;
|
|
|
|
const char *actual = NULL;
|
|
|
|
const char *expected =
|
|
|
|
IPTABLES_PATH " -A INPUT --source-host 192.168.122.1 --jump ACCEPT\n"
|
|
|
|
IPTABLES_PATH " -A INPUT --source-host 192.168.122.255 --jump REJECT\n"
|
|
|
|
IPTABLES_PATH " -A OUTPUT --source-host 192.168.122.1 --jump ACCEPT\n"
|
|
|
|
IPTABLES_PATH " -A OUTPUT --jump DROP\n";
|
|
|
|
const struct testFirewallData *data = opaque;
|
|
|
|
|
|
|
|
fwDisabled = data->fwDisabled;
|
|
|
|
if (virFirewallSetBackend(data->tryBackend) < 0)
|
|
|
|
goto cleanup;
|
|
|
|
|
|
|
|
if (data->expectBackend == VIR_FIREWALL_BACKEND_DIRECT) {
|
|
|
|
virCommandSetDryRun(&cmdbuf, testFirewallRollbackHook, NULL);
|
|
|
|
} else {
|
|
|
|
fwBuf = &cmdbuf;
|
|
|
|
fwError = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
virFirewallStartTransaction(fw, 0);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-A", "INPUT",
|
|
|
|
"--source-host", "192.168.122.1",
|
|
|
|
"--jump", "ACCEPT", NULL);
|
|
|
|
|
|
|
|
virFirewallAddRuleFull(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
true, NULL, NULL,
|
|
|
|
"-A", "INPUT",
|
|
|
|
"--source-host", "192.168.122.255",
|
|
|
|
"--jump", "REJECT", NULL);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-A", "OUTPUT",
|
|
|
|
"--source-host", "192.168.122.1",
|
|
|
|
"--jump", "ACCEPT", NULL);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-A", "OUTPUT",
|
|
|
|
"--jump", "DROP", NULL);
|
|
|
|
|
|
|
|
|
|
|
|
if (virFirewallApply(fw) < 0)
|
|
|
|
goto cleanup;
|
|
|
|
|
|
|
|
actual = virBufferCurrentContent(&cmdbuf);
|
|
|
|
|
|
|
|
if (STRNEQ_NULLABLE(expected, actual)) {
|
2018-12-04 17:08:14 +00:00
|
|
|
fprintf(stderr, "Unexpected command execution\n");
|
2016-05-26 15:01:51 +00:00
|
|
|
virTestDifference(stderr, expected, actual);
|
2013-03-04 16:30:40 +00:00
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = 0;
|
|
|
|
cleanup:
|
|
|
|
fwBuf = NULL;
|
|
|
|
virCommandSetDryRun(NULL, NULL, NULL);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int
|
2019-10-14 12:45:03 +00:00
|
|
|
testFirewallNoRollback(const void *opaque G_GNUC_UNUSED)
|
2013-03-04 16:30:40 +00:00
|
|
|
{
|
2020-07-02 23:35:41 +00:00
|
|
|
g_auto(virBuffer) cmdbuf = VIR_BUFFER_INITIALIZER;
|
2020-07-04 20:35:10 +00:00
|
|
|
g_autoptr(virFirewall) fw = virFirewallNew();
|
2013-03-04 16:30:40 +00:00
|
|
|
int ret = -1;
|
|
|
|
const char *actual = NULL;
|
|
|
|
const char *expected =
|
|
|
|
IPTABLES_PATH " -A INPUT --source-host 192.168.122.1 --jump ACCEPT\n"
|
|
|
|
IPTABLES_PATH " -A INPUT --source-host 192.168.122.255 --jump REJECT\n";
|
|
|
|
const struct testFirewallData *data = opaque;
|
|
|
|
|
|
|
|
fwDisabled = data->fwDisabled;
|
|
|
|
if (virFirewallSetBackend(data->tryBackend) < 0)
|
|
|
|
goto cleanup;
|
|
|
|
|
|
|
|
if (data->expectBackend == VIR_FIREWALL_BACKEND_DIRECT) {
|
|
|
|
virCommandSetDryRun(&cmdbuf, testFirewallRollbackHook, NULL);
|
|
|
|
} else {
|
|
|
|
fwBuf = &cmdbuf;
|
|
|
|
fwError = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
virFirewallStartTransaction(fw, 0);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-A", "INPUT",
|
|
|
|
"--source-host", "192.168.122.1",
|
|
|
|
"--jump", "ACCEPT", NULL);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-A", "INPUT",
|
|
|
|
"--source-host", "192.168.122.255",
|
|
|
|
"--jump", "REJECT", NULL);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-A", "INPUT",
|
|
|
|
"--source-host", "!192.168.122.1",
|
|
|
|
"--jump", "REJECT", NULL);
|
|
|
|
|
|
|
|
if (virFirewallApply(fw) == 0) {
|
|
|
|
fprintf(stderr, "Firewall apply unexpectedly worked\n");
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
actual = virBufferCurrentContent(&cmdbuf);
|
|
|
|
|
|
|
|
if (STRNEQ_NULLABLE(expected, actual)) {
|
2018-12-04 17:08:14 +00:00
|
|
|
fprintf(stderr, "Unexpected command execution\n");
|
2016-05-26 15:01:51 +00:00
|
|
|
virTestDifference(stderr, expected, actual);
|
2013-03-04 16:30:40 +00:00
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = 0;
|
|
|
|
cleanup:
|
|
|
|
fwBuf = NULL;
|
|
|
|
virCommandSetDryRun(NULL, NULL, NULL);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2019-10-14 12:45:03 +00:00
|
|
|
testFirewallSingleRollback(const void *opaque G_GNUC_UNUSED)
|
2013-03-04 16:30:40 +00:00
|
|
|
{
|
2020-07-02 23:35:41 +00:00
|
|
|
g_auto(virBuffer) cmdbuf = VIR_BUFFER_INITIALIZER;
|
2020-07-04 20:35:10 +00:00
|
|
|
g_autoptr(virFirewall) fw = virFirewallNew();
|
2013-03-04 16:30:40 +00:00
|
|
|
int ret = -1;
|
|
|
|
const char *actual = NULL;
|
|
|
|
const char *expected =
|
|
|
|
IPTABLES_PATH " -A INPUT --source-host 192.168.122.1 --jump ACCEPT\n"
|
|
|
|
IPTABLES_PATH " -A INPUT --source-host 192.168.122.255 --jump REJECT\n"
|
|
|
|
IPTABLES_PATH " -D INPUT --source-host 192.168.122.1 --jump ACCEPT\n"
|
|
|
|
IPTABLES_PATH " -D INPUT --source-host 192.168.122.255 --jump REJECT\n"
|
|
|
|
IPTABLES_PATH " -D INPUT --source-host '!192.168.122.1' --jump REJECT\n";
|
|
|
|
const struct testFirewallData *data = opaque;
|
|
|
|
|
|
|
|
fwDisabled = data->fwDisabled;
|
|
|
|
if (virFirewallSetBackend(data->tryBackend) < 0)
|
|
|
|
goto cleanup;
|
|
|
|
|
|
|
|
if (data->expectBackend == VIR_FIREWALL_BACKEND_DIRECT) {
|
|
|
|
virCommandSetDryRun(&cmdbuf, testFirewallRollbackHook, NULL);
|
|
|
|
} else {
|
|
|
|
fwError = true;
|
|
|
|
fwBuf = &cmdbuf;
|
|
|
|
}
|
|
|
|
|
|
|
|
virFirewallStartTransaction(fw, 0);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-A", "INPUT",
|
|
|
|
"--source-host", "192.168.122.1",
|
|
|
|
"--jump", "ACCEPT", NULL);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-A", "INPUT",
|
|
|
|
"--source-host", "192.168.122.255",
|
|
|
|
"--jump", "REJECT", NULL);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-A", "INPUT",
|
|
|
|
"--source-host", "!192.168.122.1",
|
|
|
|
"--jump", "REJECT", NULL);
|
|
|
|
|
|
|
|
virFirewallStartRollback(fw, 0);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-D", "INPUT",
|
|
|
|
"--source-host", "192.168.122.1",
|
|
|
|
"--jump", "ACCEPT", NULL);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-D", "INPUT",
|
|
|
|
"--source-host", "192.168.122.255",
|
|
|
|
"--jump", "REJECT", NULL);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-D", "INPUT",
|
|
|
|
"--source-host", "!192.168.122.1",
|
|
|
|
"--jump", "REJECT", NULL);
|
|
|
|
|
|
|
|
if (virFirewallApply(fw) == 0) {
|
|
|
|
fprintf(stderr, "Firewall apply unexpectedly worked\n");
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
actual = virBufferCurrentContent(&cmdbuf);
|
|
|
|
|
|
|
|
if (STRNEQ_NULLABLE(expected, actual)) {
|
2018-12-04 17:08:14 +00:00
|
|
|
fprintf(stderr, "Unexpected command execution\n");
|
2016-05-26 15:01:51 +00:00
|
|
|
virTestDifference(stderr, expected, actual);
|
2013-03-04 16:30:40 +00:00
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = 0;
|
|
|
|
cleanup:
|
|
|
|
fwBuf = NULL;
|
|
|
|
virCommandSetDryRun(NULL, NULL, NULL);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2019-10-14 12:45:03 +00:00
|
|
|
testFirewallManyRollback(const void *opaque G_GNUC_UNUSED)
|
2013-03-04 16:30:40 +00:00
|
|
|
{
|
2020-07-02 23:35:41 +00:00
|
|
|
g_auto(virBuffer) cmdbuf = VIR_BUFFER_INITIALIZER;
|
2020-07-04 20:35:10 +00:00
|
|
|
g_autoptr(virFirewall) fw = virFirewallNew();
|
2013-03-04 16:30:40 +00:00
|
|
|
int ret = -1;
|
|
|
|
const char *actual = NULL;
|
|
|
|
const char *expected =
|
|
|
|
IPTABLES_PATH " -A INPUT --source-host 192.168.122.1 --jump ACCEPT\n"
|
|
|
|
IPTABLES_PATH " -A INPUT --source-host 192.168.122.255 --jump REJECT\n"
|
|
|
|
IPTABLES_PATH " -D INPUT --source-host 192.168.122.255 --jump REJECT\n"
|
|
|
|
IPTABLES_PATH " -D INPUT --source-host '!192.168.122.1' --jump REJECT\n";
|
|
|
|
const struct testFirewallData *data = opaque;
|
|
|
|
|
|
|
|
fwDisabled = data->fwDisabled;
|
|
|
|
if (virFirewallSetBackend(data->tryBackend) < 0)
|
|
|
|
goto cleanup;
|
|
|
|
|
|
|
|
if (data->expectBackend == VIR_FIREWALL_BACKEND_DIRECT) {
|
|
|
|
virCommandSetDryRun(&cmdbuf, testFirewallRollbackHook, NULL);
|
|
|
|
} else {
|
|
|
|
fwBuf = &cmdbuf;
|
|
|
|
fwError = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
virFirewallStartTransaction(fw, 0);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-A", "INPUT",
|
|
|
|
"--source-host", "192.168.122.1",
|
|
|
|
"--jump", "ACCEPT", NULL);
|
|
|
|
|
|
|
|
virFirewallStartRollback(fw, 0);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-D", "INPUT",
|
|
|
|
"--source-host", "192.168.122.1",
|
|
|
|
"--jump", "ACCEPT", NULL);
|
|
|
|
|
|
|
|
virFirewallStartTransaction(fw, 0);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-A", "INPUT",
|
|
|
|
"--source-host", "192.168.122.255",
|
|
|
|
"--jump", "REJECT", NULL);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-A", "INPUT",
|
|
|
|
"--source-host", "!192.168.122.1",
|
|
|
|
"--jump", "REJECT", NULL);
|
|
|
|
|
|
|
|
virFirewallStartRollback(fw, 0);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-D", "INPUT",
|
|
|
|
"--source-host", "192.168.122.255",
|
|
|
|
"--jump", "REJECT", NULL);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-D", "INPUT",
|
|
|
|
"--source-host", "!192.168.122.1",
|
|
|
|
"--jump", "REJECT", NULL);
|
|
|
|
|
|
|
|
if (virFirewallApply(fw) == 0) {
|
|
|
|
fprintf(stderr, "Firewall apply unexpectedly worked\n");
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
actual = virBufferCurrentContent(&cmdbuf);
|
|
|
|
|
|
|
|
if (STRNEQ_NULLABLE(expected, actual)) {
|
2018-12-04 17:08:14 +00:00
|
|
|
fprintf(stderr, "Unexpected command execution\n");
|
2016-05-26 15:01:51 +00:00
|
|
|
virTestDifference(stderr, expected, actual);
|
2013-03-04 16:30:40 +00:00
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = 0;
|
|
|
|
cleanup:
|
|
|
|
fwBuf = NULL;
|
|
|
|
virCommandSetDryRun(NULL, NULL, NULL);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2019-10-14 12:45:03 +00:00
|
|
|
testFirewallChainedRollback(const void *opaque G_GNUC_UNUSED)
|
2013-03-04 16:30:40 +00:00
|
|
|
{
|
2020-07-02 23:35:41 +00:00
|
|
|
g_auto(virBuffer) cmdbuf = VIR_BUFFER_INITIALIZER;
|
2020-07-04 20:35:10 +00:00
|
|
|
g_autoptr(virFirewall) fw = virFirewallNew();
|
2013-03-04 16:30:40 +00:00
|
|
|
int ret = -1;
|
|
|
|
const char *actual = NULL;
|
|
|
|
const char *expected =
|
|
|
|
IPTABLES_PATH " -A INPUT --source-host 192.168.122.1 --jump ACCEPT\n"
|
|
|
|
IPTABLES_PATH " -A INPUT --source-host 192.168.122.127 --jump REJECT\n"
|
|
|
|
IPTABLES_PATH " -A INPUT --source-host '!192.168.122.1' --jump REJECT\n"
|
|
|
|
IPTABLES_PATH " -A INPUT --source-host 192.168.122.255 --jump REJECT\n"
|
|
|
|
IPTABLES_PATH " -D INPUT --source-host 192.168.122.127 --jump REJECT\n"
|
|
|
|
IPTABLES_PATH " -D INPUT --source-host '!192.168.122.1' --jump REJECT\n"
|
|
|
|
IPTABLES_PATH " -D INPUT --source-host 192.168.122.255 --jump REJECT\n"
|
|
|
|
IPTABLES_PATH " -D INPUT --source-host '!192.168.122.1' --jump REJECT\n";
|
|
|
|
const struct testFirewallData *data = opaque;
|
|
|
|
|
|
|
|
fwDisabled = data->fwDisabled;
|
|
|
|
if (virFirewallSetBackend(data->tryBackend) < 0)
|
|
|
|
goto cleanup;
|
|
|
|
|
|
|
|
if (data->expectBackend == VIR_FIREWALL_BACKEND_DIRECT) {
|
|
|
|
virCommandSetDryRun(&cmdbuf, testFirewallRollbackHook, NULL);
|
|
|
|
} else {
|
|
|
|
fwBuf = &cmdbuf;
|
|
|
|
fwError = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
virFirewallStartTransaction(fw, 0);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-A", "INPUT",
|
|
|
|
"--source-host", "192.168.122.1",
|
|
|
|
"--jump", "ACCEPT", NULL);
|
|
|
|
|
|
|
|
virFirewallStartRollback(fw, 0);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-D", "INPUT",
|
|
|
|
"--source-host", "192.168.122.1",
|
|
|
|
"--jump", "ACCEPT", NULL);
|
|
|
|
|
|
|
|
|
|
|
|
virFirewallStartTransaction(fw, 0);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-A", "INPUT",
|
|
|
|
"--source-host", "192.168.122.127",
|
|
|
|
"--jump", "REJECT", NULL);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-A", "INPUT",
|
|
|
|
"--source-host", "!192.168.122.1",
|
|
|
|
"--jump", "REJECT", NULL);
|
|
|
|
|
|
|
|
virFirewallStartRollback(fw, 0);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-D", "INPUT",
|
|
|
|
"--source-host", "192.168.122.127",
|
|
|
|
"--jump", "REJECT", NULL);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-D", "INPUT",
|
|
|
|
"--source-host", "!192.168.122.1",
|
|
|
|
"--jump", "REJECT", NULL);
|
|
|
|
|
|
|
|
|
|
|
|
virFirewallStartTransaction(fw, 0);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-A", "INPUT",
|
|
|
|
"--source-host", "192.168.122.255",
|
|
|
|
"--jump", "REJECT", NULL);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-A", "INPUT",
|
|
|
|
"--source-host", "!192.168.122.1",
|
|
|
|
"--jump", "REJECT", NULL);
|
|
|
|
|
|
|
|
virFirewallStartRollback(fw, VIR_FIREWALL_ROLLBACK_INHERIT_PREVIOUS);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-D", "INPUT",
|
|
|
|
"--source-host", "192.168.122.255",
|
|
|
|
"--jump", "REJECT", NULL);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-D", "INPUT",
|
|
|
|
"--source-host", "!192.168.122.1",
|
|
|
|
"--jump", "REJECT", NULL);
|
|
|
|
|
|
|
|
if (virFirewallApply(fw) == 0) {
|
|
|
|
fprintf(stderr, "Firewall apply unexpectedly worked\n");
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
actual = virBufferCurrentContent(&cmdbuf);
|
|
|
|
|
|
|
|
if (STRNEQ_NULLABLE(expected, actual)) {
|
2018-12-04 17:08:14 +00:00
|
|
|
fprintf(stderr, "Unexpected command execution\n");
|
2016-05-26 15:01:51 +00:00
|
|
|
virTestDifference(stderr, expected, actual);
|
2013-03-04 16:30:40 +00:00
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = 0;
|
|
|
|
cleanup:
|
|
|
|
fwBuf = NULL;
|
|
|
|
virCommandSetDryRun(NULL, NULL, NULL);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static const char *expectedLines[] = {
|
|
|
|
"Chain INPUT (policy ACCEPT)",
|
|
|
|
"target prot opt source destination",
|
|
|
|
"",
|
|
|
|
"Chain FORWARD (policy ACCEPT)",
|
|
|
|
"target prot opt source destination",
|
|
|
|
"",
|
|
|
|
"Chain OUTPUT (policy ACCEPT)",
|
|
|
|
"target prot opt source destination",
|
|
|
|
"",
|
|
|
|
"Chain PREROUTING (policy ACCEPT)",
|
|
|
|
"target prot opt source destination",
|
|
|
|
"",
|
|
|
|
"Chain INPUT (policy ACCEPT)",
|
|
|
|
"target prot opt source destination",
|
|
|
|
"",
|
|
|
|
"Chain OUTPUT (policy ACCEPT)",
|
|
|
|
"target prot opt source destination",
|
|
|
|
"",
|
|
|
|
"Chain POSTROUTING (policy ACCEPT)",
|
|
|
|
"target prot opt source destination",
|
|
|
|
"",
|
|
|
|
};
|
|
|
|
static size_t expectedLineNum;
|
|
|
|
static bool expectedLineError;
|
|
|
|
|
|
|
|
static void
|
|
|
|
testFirewallQueryHook(const char *const*args,
|
2019-10-14 12:45:03 +00:00
|
|
|
const char *const*env G_GNUC_UNUSED,
|
|
|
|
const char *input G_GNUC_UNUSED,
|
2013-03-04 16:30:40 +00:00
|
|
|
char **output,
|
2019-10-14 12:45:03 +00:00
|
|
|
char **error G_GNUC_UNUSED,
|
2019-10-20 11:49:46 +00:00
|
|
|
int *status G_GNUC_UNUSED,
|
2019-10-14 12:45:03 +00:00
|
|
|
void *opaque G_GNUC_UNUSED)
|
2013-03-04 16:30:40 +00:00
|
|
|
{
|
|
|
|
if (STREQ(args[0], IPTABLES_PATH) &&
|
|
|
|
STREQ(args[1], "-L")) {
|
2019-10-20 11:49:46 +00:00
|
|
|
*output = g_strdup(TEST_FILTER_TABLE_LIST);
|
2013-03-04 16:30:40 +00:00
|
|
|
} else if (STREQ(args[0], IPTABLES_PATH) &&
|
|
|
|
STREQ(args[1], "-t") &&
|
|
|
|
STREQ(args[2], "nat") &&
|
|
|
|
STREQ(args[3], "-L")) {
|
2019-10-20 11:49:46 +00:00
|
|
|
*output = g_strdup(TEST_NAT_TABLE_LIST);
|
2013-03-04 16:30:40 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int
|
|
|
|
testFirewallQueryCallback(virFirewallPtr fw,
|
2018-12-04 16:33:28 +00:00
|
|
|
virFirewallLayer layer,
|
2013-03-04 16:30:40 +00:00
|
|
|
const char *const *lines,
|
2019-10-14 12:45:03 +00:00
|
|
|
void *opaque G_GNUC_UNUSED)
|
2013-03-04 16:30:40 +00:00
|
|
|
{
|
|
|
|
size_t i;
|
2018-12-04 16:33:28 +00:00
|
|
|
virFirewallAddRule(fw, layer,
|
2013-03-04 16:30:40 +00:00
|
|
|
"-A", "INPUT",
|
|
|
|
"--source-host", "!192.168.122.129",
|
|
|
|
"--jump", "REJECT", NULL);
|
|
|
|
|
|
|
|
for (i = 0; lines[i] != NULL; i++) {
|
2019-10-15 11:55:26 +00:00
|
|
|
if (expectedLineNum >= G_N_ELEMENTS(expectedLines)) {
|
2013-03-04 16:30:40 +00:00
|
|
|
expectedLineError = true;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (STRNEQ(expectedLines[expectedLineNum], lines[i])) {
|
|
|
|
fprintf(stderr, "Mismatch '%s' vs '%s' at %zu, %zu\n",
|
|
|
|
expectedLines[expectedLineNum], lines[i],
|
|
|
|
expectedLineNum, i);
|
|
|
|
expectedLineError = true;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
expectedLineNum++;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2019-10-14 12:45:03 +00:00
|
|
|
testFirewallQuery(const void *opaque G_GNUC_UNUSED)
|
2013-03-04 16:30:40 +00:00
|
|
|
{
|
2020-07-02 23:35:41 +00:00
|
|
|
g_auto(virBuffer) cmdbuf = VIR_BUFFER_INITIALIZER;
|
2020-07-04 20:35:10 +00:00
|
|
|
g_autoptr(virFirewall) fw = virFirewallNew();
|
2013-03-04 16:30:40 +00:00
|
|
|
int ret = -1;
|
|
|
|
const char *actual = NULL;
|
|
|
|
const char *expected =
|
|
|
|
IPTABLES_PATH " -A INPUT --source-host 192.168.122.1 --jump ACCEPT\n"
|
|
|
|
IPTABLES_PATH " -A INPUT --source-host 192.168.122.127 --jump REJECT\n"
|
|
|
|
IPTABLES_PATH " -L\n"
|
|
|
|
IPTABLES_PATH " -t nat -L\n"
|
|
|
|
IPTABLES_PATH " -A INPUT --source-host 192.168.122.130 --jump REJECT\n"
|
|
|
|
IPTABLES_PATH " -A INPUT --source-host '!192.168.122.129' --jump REJECT\n"
|
|
|
|
IPTABLES_PATH " -A INPUT --source-host '!192.168.122.129' --jump REJECT\n"
|
|
|
|
IPTABLES_PATH " -A INPUT --source-host 192.168.122.128 --jump REJECT\n"
|
|
|
|
IPTABLES_PATH " -A INPUT --source-host '!192.168.122.1' --jump REJECT\n";
|
|
|
|
const struct testFirewallData *data = opaque;
|
|
|
|
|
|
|
|
expectedLineNum = 0;
|
|
|
|
expectedLineError = false;
|
|
|
|
fwDisabled = data->fwDisabled;
|
|
|
|
if (virFirewallSetBackend(data->tryBackend) < 0)
|
|
|
|
goto cleanup;
|
|
|
|
|
|
|
|
if (data->expectBackend == VIR_FIREWALL_BACKEND_DIRECT) {
|
|
|
|
virCommandSetDryRun(&cmdbuf, testFirewallQueryHook, NULL);
|
|
|
|
} else {
|
|
|
|
fwBuf = &cmdbuf;
|
|
|
|
fwError = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
virFirewallStartTransaction(fw, 0);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-A", "INPUT",
|
|
|
|
"--source-host", "192.168.122.1",
|
|
|
|
"--jump", "ACCEPT", NULL);
|
|
|
|
|
|
|
|
virFirewallStartTransaction(fw, 0);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-A", "INPUT",
|
|
|
|
"--source-host", "192.168.122.127",
|
|
|
|
"--jump", "REJECT", NULL);
|
|
|
|
|
|
|
|
virFirewallAddRuleFull(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
false,
|
|
|
|
testFirewallQueryCallback,
|
|
|
|
NULL,
|
|
|
|
"-L", NULL);
|
|
|
|
virFirewallAddRuleFull(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
false,
|
|
|
|
testFirewallQueryCallback,
|
|
|
|
NULL,
|
|
|
|
"-t", "nat", "-L", NULL);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-A", "INPUT",
|
|
|
|
"--source-host", "192.168.122.130",
|
|
|
|
"--jump", "REJECT", NULL);
|
|
|
|
|
|
|
|
|
|
|
|
virFirewallStartTransaction(fw, 0);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-A", "INPUT",
|
|
|
|
"--source-host", "192.168.122.128",
|
|
|
|
"--jump", "REJECT", NULL);
|
|
|
|
|
|
|
|
virFirewallAddRule(fw, VIR_FIREWALL_LAYER_IPV4,
|
|
|
|
"-A", "INPUT",
|
|
|
|
"--source-host", "!192.168.122.1",
|
|
|
|
"--jump", "REJECT", NULL);
|
|
|
|
|
|
|
|
if (virFirewallApply(fw) < 0)
|
|
|
|
goto cleanup;
|
|
|
|
|
|
|
|
actual = virBufferCurrentContent(&cmdbuf);
|
|
|
|
|
|
|
|
if (expectedLineError) {
|
|
|
|
fprintf(stderr, "Got some unexpected query data\n");
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (STRNEQ_NULLABLE(expected, actual)) {
|
2018-12-04 17:08:14 +00:00
|
|
|
fprintf(stderr, "Unexpected command execution\n");
|
2016-05-26 15:01:51 +00:00
|
|
|
virTestDifference(stderr, expected, actual);
|
2013-03-04 16:30:40 +00:00
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = 0;
|
|
|
|
cleanup:
|
|
|
|
fwBuf = NULL;
|
|
|
|
virCommandSetDryRun(NULL, NULL, NULL);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2017-04-07 14:11:14 +00:00
|
|
|
static bool
|
|
|
|
hasNetfilterTools(void)
|
|
|
|
{
|
|
|
|
return virFileIsExecutable(IPTABLES_PATH) &&
|
|
|
|
virFileIsExecutable(IP6TABLES_PATH) &&
|
|
|
|
virFileIsExecutable(EBTABLES_PATH);
|
|
|
|
}
|
|
|
|
|
2013-03-04 16:30:40 +00:00
|
|
|
static int
|
|
|
|
mymain(void)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
|
|
|
|
2017-04-07 14:11:14 +00:00
|
|
|
if (!hasNetfilterTools()) {
|
|
|
|
fprintf(stderr, "iptables/ip6tables/ebtables tools not present");
|
|
|
|
return EXIT_AM_SKIP;
|
|
|
|
}
|
|
|
|
|
2017-11-03 12:09:47 +00:00
|
|
|
# define RUN_TEST_DIRECT(name, method) \
|
|
|
|
do { \
|
|
|
|
struct testFirewallData data; \
|
|
|
|
data.tryBackend = VIR_FIREWALL_BACKEND_AUTOMATIC; \
|
|
|
|
data.expectBackend = VIR_FIREWALL_BACKEND_DIRECT; \
|
|
|
|
data.fwDisabled = true; \
|
|
|
|
if (virTestRun(name " auto direct", method, &data) < 0) \
|
|
|
|
ret = -1; \
|
|
|
|
data.tryBackend = VIR_FIREWALL_BACKEND_DIRECT; \
|
|
|
|
data.expectBackend = VIR_FIREWALL_BACKEND_DIRECT; \
|
|
|
|
data.fwDisabled = true; \
|
|
|
|
if (virTestRun(name " manual direct", method, &data) < 0) \
|
|
|
|
ret = -1; \
|
2013-03-04 16:30:40 +00:00
|
|
|
} while (0)
|
|
|
|
|
2020-09-15 12:00:53 +00:00
|
|
|
# define RUN_TEST_FIREWALLD(name, method) \
|
2017-11-03 12:09:47 +00:00
|
|
|
do { \
|
|
|
|
struct testFirewallData data; \
|
|
|
|
data.tryBackend = VIR_FIREWALL_BACKEND_AUTOMATIC; \
|
|
|
|
data.expectBackend = VIR_FIREWALL_BACKEND_FIREWALLD; \
|
|
|
|
data.fwDisabled = false; \
|
|
|
|
if (virTestRun(name " auto firewalld", method, &data) < 0) \
|
|
|
|
ret = -1; \
|
|
|
|
data.tryBackend = VIR_FIREWALL_BACKEND_FIREWALLD; \
|
|
|
|
data.expectBackend = VIR_FIREWALL_BACKEND_FIREWALLD; \
|
|
|
|
data.fwDisabled = false; \
|
|
|
|
if (virTestRun(name " manual firewalld", method, &data) < 0) \
|
|
|
|
ret = -1; \
|
2013-03-04 16:30:40 +00:00
|
|
|
} while (0)
|
|
|
|
|
2020-09-15 12:00:53 +00:00
|
|
|
# define RUN_TEST(name, method) \
|
2017-11-03 12:09:47 +00:00
|
|
|
RUN_TEST_DIRECT(name, method); \
|
2013-03-04 16:30:40 +00:00
|
|
|
RUN_TEST_FIREWALLD(name, method)
|
|
|
|
|
2014-12-23 05:10:55 +00:00
|
|
|
virFirewallSetLockOverride(true);
|
|
|
|
|
2013-03-04 16:30:40 +00:00
|
|
|
RUN_TEST("single group", testFirewallSingleGroup);
|
|
|
|
RUN_TEST("remove rule", testFirewallRemoveRule);
|
|
|
|
RUN_TEST("many groups", testFirewallManyGroups);
|
|
|
|
RUN_TEST("ignore fail group", testFirewallIgnoreFailGroup);
|
|
|
|
RUN_TEST("ignore fail rule", testFirewallIgnoreFailRule);
|
|
|
|
RUN_TEST("no rollback", testFirewallNoRollback);
|
|
|
|
RUN_TEST("single rollback", testFirewallSingleRollback);
|
|
|
|
RUN_TEST("many rollback", testFirewallManyRollback);
|
|
|
|
RUN_TEST("chained rollback", testFirewallChainedRollback);
|
|
|
|
RUN_TEST("query transaction", testFirewallQuery);
|
|
|
|
|
|
|
|
return ret == 0 ? EXIT_SUCCESS : EXIT_FAILURE;
|
|
|
|
}
|
|
|
|
|
2020-09-15 12:00:53 +00:00
|
|
|
VIR_TEST_MAIN_PRELOAD(mymain, VIR_TEST_MOCK("virgdbus"))
|
2014-05-01 18:43:58 +00:00
|
|
|
|
|
|
|
#else /* ! defined (__linux__) */
|
|
|
|
|
|
|
|
int main(void)
|
|
|
|
{
|
|
|
|
return EXIT_AM_SKIP;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* ! defined(__linux__) */
|