mirror of
				https://github.com/tailscale/tailscale.git
				synced 2025-11-04 02:01:14 +01:00 
			
		
		
		
	Now cmd/derper doesn't depend on iptables, nftables, and netlink code :) But this is really just a cleanup step I noticed on the way to making tsnet applications able to not link all the OS router code which they don't use. Updates #17313 Change-Id: Ic7b4e04e3a9639fd198e9dbeb0f7bae22a4a47a9 Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
		
			
				
	
	
		
			367 lines
		
	
	
		
			12 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			367 lines
		
	
	
		
			12 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// Copyright (c) Tailscale Inc & AUTHORS
 | 
						|
// SPDX-License-Identifier: BSD-3-Clause
 | 
						|
 | 
						|
//go:build linux
 | 
						|
 | 
						|
package linuxfw
 | 
						|
 | 
						|
import (
 | 
						|
	"net/netip"
 | 
						|
	"strings"
 | 
						|
	"testing"
 | 
						|
 | 
						|
	"tailscale.com/net/tsaddr"
 | 
						|
	"tailscale.com/tsconst"
 | 
						|
)
 | 
						|
 | 
						|
var testIsNotExistErr = "exitcode:1"
 | 
						|
 | 
						|
func init() {
 | 
						|
	isNotExistError = func(e error) bool { return e.Error() == testIsNotExistErr }
 | 
						|
}
 | 
						|
 | 
						|
func TestAddAndDeleteChains(t *testing.T) {
 | 
						|
	iptr := newFakeIPTablesRunner()
 | 
						|
	err := iptr.AddChains()
 | 
						|
	if err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
 | 
						|
	// Check that the chains were created.
 | 
						|
	tsChains := []struct{ table, chain string }{ // table/chain
 | 
						|
		{"filter", "ts-input"},
 | 
						|
		{"filter", "ts-forward"},
 | 
						|
		{"nat", "ts-postrouting"},
 | 
						|
	}
 | 
						|
 | 
						|
	for _, proto := range []iptablesInterface{iptr.ipt4, iptr.ipt6} {
 | 
						|
		for _, tc := range tsChains {
 | 
						|
			// Exists returns error if the chain doesn't exist.
 | 
						|
			if _, err := proto.Exists(tc.table, tc.chain); err != nil {
 | 
						|
				t.Errorf("chain %s/%s doesn't exist", tc.table, tc.chain)
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	err = iptr.DelChains()
 | 
						|
	if err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
 | 
						|
	// Check that the chains were deleted.
 | 
						|
	for _, proto := range []iptablesInterface{iptr.ipt4, iptr.ipt6} {
 | 
						|
		for _, tc := range tsChains {
 | 
						|
			if _, err = proto.Exists(tc.table, tc.chain); err == nil {
 | 
						|
				t.Errorf("chain %s/%s still exists", tc.table, tc.chain)
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
}
 | 
						|
 | 
						|
func TestAddAndDeleteHooks(t *testing.T) {
 | 
						|
	iptr := newFakeIPTablesRunner()
 | 
						|
	// don't need to test what happens if the chains don't exist, because
 | 
						|
	// this is handled by fake iptables, in realife iptables would return error.
 | 
						|
	if err := iptr.AddChains(); err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
	defer iptr.DelChains()
 | 
						|
 | 
						|
	if err := iptr.AddHooks(); err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
 | 
						|
	// Check that the rules were created.
 | 
						|
	tsRules := []fakeRule{ // table/chain/rule
 | 
						|
		{"filter", "INPUT", []string{"-j", "ts-input"}},
 | 
						|
		{"filter", "FORWARD", []string{"-j", "ts-forward"}},
 | 
						|
		{"nat", "POSTROUTING", []string{"-j", "ts-postrouting"}},
 | 
						|
	}
 | 
						|
 | 
						|
	for _, proto := range []iptablesInterface{iptr.ipt4, iptr.ipt6} {
 | 
						|
		for _, tr := range tsRules {
 | 
						|
			if exists, err := proto.Exists(tr.table, tr.chain, tr.args...); err != nil {
 | 
						|
				t.Fatal(err)
 | 
						|
			} else if !exists {
 | 
						|
				t.Errorf("rule %s/%s/%s doesn't exist", tr.table, tr.chain, strings.Join(tr.args, " "))
 | 
						|
			}
 | 
						|
			// check if the rule is at front of the chain
 | 
						|
			if proto.(*fakeIPTables).n[tr.table+"/"+tr.chain][0] != strings.Join(tr.args, " ") {
 | 
						|
				t.Errorf("v4 rule %s/%s/%s is not at the top", tr.table, tr.chain, strings.Join(tr.args, " "))
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	if err := iptr.DelHooks(t.Logf); err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
 | 
						|
	// Check that the rules were deleted.
 | 
						|
	for _, proto := range []iptablesInterface{iptr.ipt4, iptr.ipt6} {
 | 
						|
		for _, tr := range tsRules {
 | 
						|
			if exists, err := proto.Exists(tr.table, tr.chain, tr.args...); err != nil {
 | 
						|
				t.Fatal(err)
 | 
						|
			} else if exists {
 | 
						|
				t.Errorf("rule %s/%s/%s still exists", tr.table, tr.chain, strings.Join(tr.args, " "))
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	if err := iptr.AddHooks(); err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestAddAndDeleteBase(t *testing.T) {
 | 
						|
	iptr := newFakeIPTablesRunner()
 | 
						|
	tunname := "tun0"
 | 
						|
	if err := iptr.AddChains(); err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
 | 
						|
	if err := iptr.AddBase(tunname); err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
 | 
						|
	// Check that the rules were created.
 | 
						|
	tsRulesV4 := []fakeRule{ // table/chain/rule
 | 
						|
		{"filter", "ts-input", []string{"!", "-i", tunname, "-s", tsaddr.ChromeOSVMRange().String(), "-j", "RETURN"}},
 | 
						|
		{"filter", "ts-input", []string{"!", "-i", tunname, "-s", tsaddr.CGNATRange().String(), "-j", "DROP"}},
 | 
						|
		{"filter", "ts-forward", []string{"-o", tunname, "-s", tsaddr.CGNATRange().String(), "-j", "DROP"}},
 | 
						|
	}
 | 
						|
 | 
						|
	tsRulesCommon := []fakeRule{ // table/chain/rule
 | 
						|
		{"filter", "ts-input", []string{"-i", tunname, "-j", "ACCEPT"}},
 | 
						|
		{"filter", "ts-forward", []string{"-i", tunname, "-j", "MARK", "--set-mark", tsconst.LinuxSubnetRouteMark + "/" + tsconst.LinuxFwmarkMask}},
 | 
						|
		{"filter", "ts-forward", []string{"-m", "mark", "--mark", tsconst.LinuxSubnetRouteMark + "/" + tsconst.LinuxFwmarkMask, "-j", "ACCEPT"}},
 | 
						|
		{"filter", "ts-forward", []string{"-o", tunname, "-j", "ACCEPT"}},
 | 
						|
	}
 | 
						|
 | 
						|
	// check that the rules were created for ipt4
 | 
						|
	for _, tr := range append(tsRulesV4, tsRulesCommon...) {
 | 
						|
		if exists, err := iptr.ipt4.Exists(tr.table, tr.chain, tr.args...); err != nil {
 | 
						|
			t.Fatal(err)
 | 
						|
		} else if !exists {
 | 
						|
			t.Errorf("rule %s/%s/%s doesn't exist", tr.table, tr.chain, strings.Join(tr.args, " "))
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	// check that the rules were created for ipt6
 | 
						|
	for _, tr := range tsRulesCommon {
 | 
						|
		if exists, err := iptr.ipt6.Exists(tr.table, tr.chain, tr.args...); err != nil {
 | 
						|
			t.Fatal(err)
 | 
						|
		} else if !exists {
 | 
						|
			t.Errorf("rule %s/%s/%s doesn't exist", tr.table, tr.chain, strings.Join(tr.args, " "))
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	if err := iptr.DelBase(); err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
 | 
						|
	// Check that the rules were deleted.
 | 
						|
	for _, proto := range []iptablesInterface{iptr.ipt4, iptr.ipt6} {
 | 
						|
		for _, tr := range append(tsRulesV4, tsRulesCommon...) {
 | 
						|
			if exists, err := proto.Exists(tr.table, tr.chain, tr.args...); err != nil {
 | 
						|
				t.Fatal(err)
 | 
						|
			} else if exists {
 | 
						|
				t.Errorf("rule %s/%s/%s still exists", tr.table, tr.chain, strings.Join(tr.args, " "))
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	if err := iptr.DelChains(); err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestAddAndDelLoopbackRule(t *testing.T) {
 | 
						|
	iptr := newFakeIPTablesRunner()
 | 
						|
	// We don't need to test for malformed addresses, AddLoopbackRule
 | 
						|
	// takes in a netip.Addr, which is already valid.
 | 
						|
	fakeAddrV4 := netip.MustParseAddr("192.168.0.2")
 | 
						|
	fakeAddrV6 := netip.MustParseAddr("2001:db8::2")
 | 
						|
 | 
						|
	if err := iptr.AddChains(); err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
	if err := iptr.AddLoopbackRule(fakeAddrV4); err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
	if err := iptr.AddLoopbackRule(fakeAddrV6); err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
 | 
						|
	// Check that the rules were created.
 | 
						|
	tsRulesV4 := fakeRule{ // table/chain/rule
 | 
						|
		"filter", "ts-input", []string{"-i", "lo", "-s", fakeAddrV4.String(), "-j", "ACCEPT"}}
 | 
						|
 | 
						|
	tsRulesV6 := fakeRule{ // table/chain/rule
 | 
						|
		"filter", "ts-input", []string{"-i", "lo", "-s", fakeAddrV6.String(), "-j", "ACCEPT"}}
 | 
						|
 | 
						|
	// check that the rules were created for ipt4 and ipt6
 | 
						|
	if exist, err := iptr.ipt4.Exists(tsRulesV4.table, tsRulesV4.chain, tsRulesV4.args...); err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	} else if !exist {
 | 
						|
		t.Errorf("rule %s/%s/%s doesn't exist", tsRulesV4.table, tsRulesV4.chain, strings.Join(tsRulesV4.args, " "))
 | 
						|
	}
 | 
						|
	if exist, err := iptr.ipt6.Exists(tsRulesV6.table, tsRulesV6.chain, tsRulesV6.args...); err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	} else if !exist {
 | 
						|
		t.Errorf("rule %s/%s/%s doesn't exist", tsRulesV6.table, tsRulesV6.chain, strings.Join(tsRulesV6.args, " "))
 | 
						|
	}
 | 
						|
 | 
						|
	// check that the rule is at the top
 | 
						|
	chain := "filter/ts-input"
 | 
						|
	if iptr.ipt4.(*fakeIPTables).n[chain][0] != strings.Join(tsRulesV4.args, " ") {
 | 
						|
		t.Errorf("v4 rule %s/%s/%s is not at the top", tsRulesV4.table, tsRulesV4.chain, strings.Join(tsRulesV4.args, " "))
 | 
						|
	}
 | 
						|
	if iptr.ipt6.(*fakeIPTables).n[chain][0] != strings.Join(tsRulesV6.args, " ") {
 | 
						|
		t.Errorf("v6 rule %s/%s/%s is not at the top", tsRulesV6.table, tsRulesV6.chain, strings.Join(tsRulesV6.args, " "))
 | 
						|
	}
 | 
						|
 | 
						|
	// delete the rules
 | 
						|
	if err := iptr.DelLoopbackRule(fakeAddrV4); err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
	if err := iptr.DelLoopbackRule(fakeAddrV6); err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
 | 
						|
	// Check that the rules were deleted.
 | 
						|
	if exist, err := iptr.ipt4.Exists(tsRulesV4.table, tsRulesV4.chain, tsRulesV4.args...); err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	} else if exist {
 | 
						|
		t.Errorf("rule %s/%s/%s still exists", tsRulesV4.table, tsRulesV4.chain, strings.Join(tsRulesV4.args, " "))
 | 
						|
	}
 | 
						|
 | 
						|
	if exist, err := iptr.ipt6.Exists(tsRulesV6.table, tsRulesV6.chain, tsRulesV6.args...); err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	} else if exist {
 | 
						|
		t.Errorf("rule %s/%s/%s still exists", tsRulesV6.table, tsRulesV6.chain, strings.Join(tsRulesV6.args, " "))
 | 
						|
	}
 | 
						|
 | 
						|
	if err := iptr.DelChains(); err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestAddAndDelSNATRule(t *testing.T) {
 | 
						|
	iptr := newFakeIPTablesRunner()
 | 
						|
 | 
						|
	if err := iptr.AddChains(); err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
 | 
						|
	rule := fakeRule{ // table/chain/rule
 | 
						|
		"nat", "ts-postrouting", []string{"-m", "mark", "--mark", tsconst.LinuxSubnetRouteMark + "/" + tsconst.LinuxFwmarkMask, "-j", "MASQUERADE"},
 | 
						|
	}
 | 
						|
 | 
						|
	// Add SNAT rule
 | 
						|
	if err := iptr.AddSNATRule(); err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
 | 
						|
	// Check that the rule was created for ipt4 and ipt6
 | 
						|
	for _, proto := range []iptablesInterface{iptr.ipt4, iptr.ipt6} {
 | 
						|
		if exist, err := proto.Exists(rule.table, rule.chain, rule.args...); err != nil {
 | 
						|
			t.Fatal(err)
 | 
						|
		} else if !exist {
 | 
						|
			t.Errorf("rule %s/%s/%s doesn't exist", rule.table, rule.chain, strings.Join(rule.args, " "))
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	// Delete SNAT rule
 | 
						|
	if err := iptr.DelSNATRule(); err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
 | 
						|
	// Check that the rule was deleted for ipt4 and ipt6
 | 
						|
	for _, proto := range []iptablesInterface{iptr.ipt4, iptr.ipt6} {
 | 
						|
		if exist, err := proto.Exists(rule.table, rule.chain, rule.args...); err != nil {
 | 
						|
			t.Fatal(err)
 | 
						|
		} else if exist {
 | 
						|
			t.Errorf("rule %s/%s/%s still exists", rule.table, rule.chain, strings.Join(rule.args, " "))
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	if err := iptr.DelChains(); err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestEnsureSNATForDst_ipt(t *testing.T) {
 | 
						|
	ip1, ip2, ip3 := netip.MustParseAddr("100.99.99.99"), netip.MustParseAddr("100.88.88.88"), netip.MustParseAddr("100.77.77.77")
 | 
						|
	iptr := newFakeIPTablesRunner()
 | 
						|
 | 
						|
	// 1. A new rule gets added
 | 
						|
	mustCreateSNATRule_ipt(t, iptr, ip1, ip2)
 | 
						|
	checkSNATRule_ipt(t, iptr, ip1, ip2)
 | 
						|
	checkSNATRuleCount(t, iptr, ip1, 1)
 | 
						|
 | 
						|
	// 2. Another call to EnsureSNATForDst with the same src and dst does not result in another rule being added.
 | 
						|
	mustCreateSNATRule_ipt(t, iptr, ip1, ip2)
 | 
						|
	checkSNATRule_ipt(t, iptr, ip1, ip2)
 | 
						|
	checkSNATRuleCount(t, iptr, ip1, 1) // still just 1 rule
 | 
						|
 | 
						|
	// 3. Another call to EnsureSNATForDst with a different src and the same dst results in the earlier rule being
 | 
						|
	// deleted.
 | 
						|
	mustCreateSNATRule_ipt(t, iptr, ip3, ip2)
 | 
						|
	checkSNATRule_ipt(t, iptr, ip3, ip2)
 | 
						|
	checkSNATRuleCount(t, iptr, ip1, 1) // still just 1 rule
 | 
						|
 | 
						|
	// 4. Another call to EnsureSNATForDst with a different dst should not get the earlier rule deleted.
 | 
						|
	mustCreateSNATRule_ipt(t, iptr, ip3, ip1)
 | 
						|
	checkSNATRule_ipt(t, iptr, ip3, ip1)
 | 
						|
	checkSNATRuleCount(t, iptr, ip1, 2) // now 2 rules
 | 
						|
 | 
						|
	// 5. A call to EnsureSNATForDst with a match dst and a match port should not get deleted by EnsureSNATForDst for the same dst.
 | 
						|
	args := []string{"--destination", ip1.String(), "-j", "SNAT", "--to-source", "10.0.0.1"}
 | 
						|
	if err := iptr.getIPTByAddr(ip1).Insert("nat", "POSTROUTING", 1, args...); err != nil {
 | 
						|
		t.Fatalf("error adding SNAT rule: %v", err)
 | 
						|
	}
 | 
						|
	exists, err := iptr.getIPTByAddr(ip1).Exists("nat", "POSTROUTING", args...)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatalf("error checking if rule exists: %v", err)
 | 
						|
	}
 | 
						|
	if !exists {
 | 
						|
		t.Fatalf("SNAT rule for destination and port unexpectedly deleted")
 | 
						|
	}
 | 
						|
	mustCreateSNATRule_ipt(t, iptr, ip3, ip1)
 | 
						|
	checkSNATRuleCount(t, iptr, ip1, 3) // now 3 rules
 | 
						|
}
 | 
						|
 | 
						|
func mustCreateSNATRule_ipt(t *testing.T, iptr *iptablesRunner, src, dst netip.Addr) {
 | 
						|
	t.Helper()
 | 
						|
	if err := iptr.EnsureSNATForDst(src, dst); err != nil {
 | 
						|
		t.Fatalf("error ensuring SNAT rule: %v", err)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func checkSNATRule_ipt(t *testing.T, iptr *iptablesRunner, src, dst netip.Addr) {
 | 
						|
	t.Helper()
 | 
						|
	dstPrefix, err := dst.Prefix(32)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatalf("error converting addr to prefix: %v", err)
 | 
						|
	}
 | 
						|
	exists, err := iptr.getIPTByAddr(src).Exists("nat", "POSTROUTING", "-d", dstPrefix.String(), "-j", "SNAT", "--to-source", src.String())
 | 
						|
	if err != nil {
 | 
						|
		t.Fatalf("error checking if rule exists: %v", err)
 | 
						|
	}
 | 
						|
	if !exists {
 | 
						|
		t.Fatalf("SNAT rule for src %s dst %s should exist, but it does not", src, dst)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func checkSNATRuleCount(t *testing.T, iptr *iptablesRunner, ip netip.Addr, wantsRules int) {
 | 
						|
	t.Helper()
 | 
						|
	rules, err := iptr.getIPTByAddr(ip).List("nat", "POSTROUTING")
 | 
						|
	if err != nil {
 | 
						|
		t.Fatalf("error listing rules: %v", err)
 | 
						|
	}
 | 
						|
	if len(rules) != wantsRules {
 | 
						|
		t.Fatalf("wants %d rules, got %d", wantsRules, len(rules))
 | 
						|
	}
 | 
						|
}
 |