kube-router/pkg/utils/iptables.go
2026-02-01 10:56:40 -06:00

236 lines
7.2 KiB
Go

package utils
import (
"bytes"
"fmt"
"os/exec"
"strings"
"k8s.io/klog/v2"
"github.com/coreos/go-iptables/iptables"
v1core "k8s.io/api/core/v1"
)
var hasWait bool
const (
ICMPv4Proto = "icmp"
ICMPv4Type = "--icmp-type"
ICMPv6Proto = "ipv6-icmp"
ICMPv6Type = "--icmpv6-type"
)
// IPTablesHandler interface based on the IPTables struct from github.com/coreos/go-iptables
// which allows to mock it.
//
//go:generate moq -out iptables_moq.go . IPTablesHandler
type IPTablesHandler interface {
Proto() iptables.Protocol
Exists(table, chain string, rulespec ...string) (bool, error)
Insert(table, chain string, pos int, rulespec ...string) error
Append(table, chain string, rulespec ...string) error
AppendUnique(table, chain string, rulespec ...string) error
Delete(table, chain string, rulespec ...string) error
DeleteIfExists(table, chain string, rulespec ...string) error
List(table, chain string) ([]string, error)
ListWithCounters(table, chain string) ([]string, error)
ListChains(table string) ([]string, error)
ChainExists(table, chain string) (bool, error)
Stats(table, chain string) ([][]string, error)
ParseStat(stat []string) (iptables.Stat, error)
StructuredStats(table, chain string) ([]iptables.Stat, error)
NewChain(table, chain string) error
ClearChain(table, chain string) error
RenameChain(table, oldChain, newChain string) error
DeleteChain(table, chain string) error
ClearAndDeleteChain(table, chain string) error
ClearAll() error
DeleteAll() error
ChangePolicy(table, chain, target string) error
HasRandomFully() bool
GetIptablesVersion() (int, int, int)
}
type ICMPRule struct {
IPTablesProto string
IPTablesType string
ICMPType string
Comment string
}
//nolint:gochecknoinits // This is actually a good usage of the init() function
func init() {
path, err := exec.LookPath("iptables-restore")
if err != nil {
return
}
args := []string{"iptables-restore", "--help"}
cmd := exec.Cmd{
Path: path,
Args: args,
}
cmdOutput, err := cmd.CombinedOutput()
if err != nil {
return
}
hasWait = strings.Contains(string(cmdOutput), "wait")
}
// SaveInto calls `iptables-save` for given table and stores result in a given buffer.
func SaveInto(iptablesBinary, table string, buffer *bytes.Buffer) error {
path, err := exec.LookPath(iptablesBinary)
if err != nil {
return err
}
stderrBuffer := bytes.NewBuffer(nil)
args := []string{iptablesBinary, "-t", table}
klog.V(9).Infof("running iptables command: path=`%s` args=%+v", path, args)
cmd := exec.Cmd{
Path: path,
Args: args,
Stdout: buffer,
Stderr: stderrBuffer,
}
if err := cmd.Run(); err != nil {
return fmt.Errorf("%v (%s)", err, stderrBuffer)
}
return nil
}
// AppendUnique ensures that rule is in chain only once in the buffer and that the occurrence is at the end of the
// buffer
func AppendUnique(buffer *bytes.Buffer, chain string, rule []string) {
// First we need to remove any previous instances of the rule that exist, so that we can be sure that our version
// is unique and appended to the very end of the buffer
rules := strings.Split(buffer.String(), "\n")
if len(rules) > 0 && rules[len(rules)-1] == "" {
rules = rules[:len(rules)-1]
}
buffer.Reset()
for _, foundRule := range rules {
if strings.Contains(foundRule, chain) && strings.Contains(foundRule, strings.Join(rule, " ")) {
continue
}
buffer.WriteString(foundRule + "\n")
}
// Now append the rule that we wanted to be unique
Append(buffer, chain, rule)
}
// Append appends rule to chain at the end of buffer
func Append(buffer *bytes.Buffer, chain string, rule []string) {
ruleStr := strings.Join(append(append([]string{"-A", chain}, rule...), "\n"), " ")
buffer.WriteString(ruleStr)
}
// IPTablesSaveRestorer interface that defines functions to save and restore tables
type IPTablesSaveRestorer interface {
SaveInto(table string, buffer *bytes.Buffer) error
Restore(table string, data []byte) error
}
// IPTablesSaveRestore struct stores shell commands to save and restore iptables state
type IPTablesSaveRestore struct {
saveCmd string
restoreCmd string
}
// NewIPTablesSaveRestore returns an IPTablesSaveRestore
// with apparopriate commands based on ipFamily (IPv4 or IPv6)
func NewIPTablesSaveRestore(ipFamily v1core.IPFamily) *IPTablesSaveRestore {
//nolint:exhaustive // we don't need exhaustive searching for IP Families
switch ipFamily {
case v1core.IPv6Protocol:
return &IPTablesSaveRestore{
saveCmd: "ip6tables-save",
restoreCmd: "ip6tables-restore",
}
case v1core.IPv4Protocol:
fallthrough
default:
return &IPTablesSaveRestore{
saveCmd: "iptables-save",
restoreCmd: "iptables-restore",
}
}
}
func (i *IPTablesSaveRestore) exec(cmdName string, args []string, data []byte, stdoutBuffer *bytes.Buffer) error {
path, err := exec.LookPath(cmdName)
if err != nil {
return err
}
stderrBuffer := bytes.NewBuffer(nil)
cmd := exec.Cmd{
Path: path,
Args: append([]string{cmdName}, args...),
Stderr: stderrBuffer,
}
if data != nil {
cmd.Stdin = bytes.NewBuffer(data)
}
if stdoutBuffer != nil {
cmd.Stdout = stdoutBuffer
}
if err := cmd.Run(); err != nil {
return fmt.Errorf("failed to call %s: %v (%s)", cmdName, err, stderrBuffer)
}
return nil
}
// SaveInto saves the content of iptables table into buffer
func (i *IPTablesSaveRestore) SaveInto(table string, buffer *bytes.Buffer) error {
return i.exec(i.saveCmd, []string{"-t", table}, nil, buffer)
}
// Restore updates table with the content of data
func (i *IPTablesSaveRestore) Restore(table string, data []byte) error {
var args []string
if hasWait {
args = []string{"--wait", "-T", table}
} else {
args = []string{"-T", table}
}
return i.exec(i.restoreCmd, args, data, nil)
}
// CommonICMPRules returns a list of common ICMP rules that should always be allowed for given IP family
func CommonICMPRules(family v1core.IPFamily) []ICMPRule {
// Allow various types of ICMP that are important for routing
// This first block applies to both IPv4 and IPv6 type rules
var icmpProto, icmpType string
if family == v1core.IPv6Protocol {
icmpProto = ICMPv6Proto
icmpType = ICMPv6Type
} else {
icmpProto = ICMPv4Proto
icmpType = ICMPv4Type
}
icmpRules := []ICMPRule{
{icmpProto, icmpType, "echo-request", "allow icmp echo requests"},
// destination-unreachable here is also responsible for handling / allowing PMTU
// (https://en.wikipedia.org/wiki/Path_MTU_Discovery) responses
{icmpProto, icmpType, "destination-unreachable", "allow icmp destination unreachable messages"},
{icmpProto, icmpType, "time-exceeded", "allow icmp time exceeded messages"},
}
if family == v1core.IPv6Protocol {
// Neighbor discovery packets are especially crucial here as without them pods will not communicate properly
// over IPv6. Neighbor discovery packets are essentially like ARP for IPv4 which was always allowed under.
// previous kube-router versions.
icmpRules = append(icmpRules, []ICMPRule{
{ICMPv6Proto, ICMPv6Type, "neighbor-solicitation", "allow icmp neighbor solicitation messages"},
{ICMPv6Proto, ICMPv6Type, "neighbor-advertisement", "allow icmp neighbor advertisement messages"},
{ICMPv6Proto, ICMPv6Type, "echo-reply", "allow icmp echo reply messages"},
}...)
}
return icmpRules
}