Files
moby/daemon/libnetwork/iptables/firewalld_test.go
2025-07-23 14:06:47 -04:00

120 lines
2.4 KiB
Go

//go:build linux
package iptables
import (
"net/netip"
"strconv"
"testing"
"github.com/godbus/dbus/v5"
)
func skipIfNoFirewalld(t *testing.T) {
t.Helper()
conn, err := dbus.SystemBus()
if err != nil {
t.Skipf("cannot connect to D-bus system bus: %v", err)
}
defer conn.Close()
var zone string
err = conn.Object(dbusInterface, dbusPath).Call(dbusInterface+".getDefaultZone", 0).Store(&zone)
if err != nil {
t.Skipf("firewalld is not running: %v", err)
}
}
func TestFirewalldInit(t *testing.T) {
skipIfNoFirewalld(t)
if err := firewalldInit(); err != nil {
t.Fatal(err)
}
}
func TestReloaded(t *testing.T) {
iptable := GetIptable(IPv4)
fwdChain, err := iptable.NewChain("FWD", Filter)
if err != nil {
t.Fatal(err)
}
defer fwdChain.Remove()
// This jump from the FORWARD chain prevents FWD from being deleted by
// "iptables -X", called from fwdChain.Remove().
err = iptable.EnsureJumpRule("filter", "FORWARD", "FWD")
if err != nil {
t.Fatal(err)
}
defer iptable.Raw("-D", "FORWARD", "-j", "FWD")
// copy-pasted from iptables_test:TestLink
ip1 := netip.MustParseAddr("192.168.1.1")
ip2 := netip.MustParseAddr("192.168.1.2")
const port = 1234
const proto = "tcp"
err = fwdChain.Link(Append, ip1, ip2, port, proto, bridgeName)
if err != nil {
t.Fatal(err)
} else {
// to be re-called again later
OnReloaded(func() { fwdChain.Link(Append, ip1, ip2, port, proto, bridgeName) })
}
rule1 := []string{
"-i", bridgeName,
"-o", bridgeName,
"-p", proto,
"-s", ip1.String(),
"-d", ip2.String(),
"--dport", strconv.Itoa(port),
"-j", "ACCEPT",
}
if !iptable.Exists(fwdChain.Table, fwdChain.Name, rule1...) {
t.Fatal("rule1 does not exist")
}
// flush all rules
fwdChain.Remove()
reloaded()
// make sure the rules have been recreated
if !iptable.Exists(fwdChain.Table, fwdChain.Name, rule1...) {
t.Fatal("rule1 hasn't been recreated")
}
}
func TestPassthrough(t *testing.T) {
skipIfNoFirewalld(t)
rule1 := []string{
"-A", "INPUT",
"-i", "lo",
"-p", "udp",
"--dport", "123",
"-j", "ACCEPT",
}
err := firewalldInit()
if err != nil {
t.Fatal(err)
}
_, err = passthrough(IPv4, rule1...)
if err != nil {
t.Fatal(err)
}
if !GetIptable(IPv4).Exists(Filter, rule1[1], rule1[2:]...) {
t.Fatal("rule1 does not exist")
}
rule1[0] = "-D"
_, err = passthrough(IPv4, rule1...)
if err != nil {
t.Fatal(err)
}
if GetIptable(IPv4).Exists(Filter, rule1[1], rule1[2:]...) {
t.Fatal("rule1 still exists")
}
}