Add insert/replace (#86)
This commit is contained in:
parent
2228941ec5
commit
c4896ab7c6
148
nftables_test.go
148
nftables_test.go
|
@ -112,6 +112,154 @@ func cleanupSystemNFTConn(t *testing.T, newNS netns.NsHandle) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestRuleOperations(t *testing.T) {
|
||||||
|
|
||||||
|
// Create a new network namespace to test these operations,
|
||||||
|
// and tear down the namespace at test completion.
|
||||||
|
c, newNS := openSystemNFTConn(t)
|
||||||
|
defer cleanupSystemNFTConn(t, newNS)
|
||||||
|
// Clear all rules at the beginning + end of the test.
|
||||||
|
c.FlushRuleset()
|
||||||
|
defer c.FlushRuleset()
|
||||||
|
|
||||||
|
filter := c.AddTable(&nftables.Table{
|
||||||
|
Family: nftables.TableFamilyIPv4,
|
||||||
|
Name: "filter",
|
||||||
|
})
|
||||||
|
|
||||||
|
prerouting := c.AddChain(&nftables.Chain{
|
||||||
|
Name: "base-chain",
|
||||||
|
Table: filter,
|
||||||
|
Type: nftables.ChainTypeFilter,
|
||||||
|
Hooknum: nftables.ChainHookPrerouting,
|
||||||
|
Priority: nftables.ChainPriorityFilter,
|
||||||
|
})
|
||||||
|
|
||||||
|
c.AddRule(&nftables.Rule{
|
||||||
|
Table: filter,
|
||||||
|
Chain: prerouting,
|
||||||
|
Exprs: []expr.Any{
|
||||||
|
&expr.Verdict{
|
||||||
|
// [ immediate reg 0 drop ]
|
||||||
|
Kind: expr.VerdictDrop,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
})
|
||||||
|
|
||||||
|
c.AddRule(&nftables.Rule{
|
||||||
|
Table: filter,
|
||||||
|
Chain: prerouting,
|
||||||
|
Exprs: []expr.Any{
|
||||||
|
&expr.Verdict{
|
||||||
|
// [ immediate reg 0 drop ]
|
||||||
|
Kind: expr.VerdictDrop,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
})
|
||||||
|
|
||||||
|
c.InsertRule(&nftables.Rule{
|
||||||
|
Table: filter,
|
||||||
|
Chain: prerouting,
|
||||||
|
Exprs: []expr.Any{
|
||||||
|
&expr.Verdict{
|
||||||
|
// [ immediate reg 0 accept ]
|
||||||
|
Kind: expr.VerdictAccept,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
})
|
||||||
|
|
||||||
|
c.InsertRule(&nftables.Rule{
|
||||||
|
Table: filter,
|
||||||
|
Chain: prerouting,
|
||||||
|
Exprs: []expr.Any{
|
||||||
|
&expr.Verdict{
|
||||||
|
// [ immediate reg 0 queue ]
|
||||||
|
Kind: expr.VerdictQueue,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
})
|
||||||
|
|
||||||
|
if err := c.Flush(); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
rules, _ := c.GetRule(filter, prerouting)
|
||||||
|
|
||||||
|
want := []expr.VerdictKind{
|
||||||
|
expr.VerdictQueue,
|
||||||
|
expr.VerdictAccept,
|
||||||
|
expr.VerdictDrop,
|
||||||
|
expr.VerdictDrop,
|
||||||
|
}
|
||||||
|
|
||||||
|
for i, r := range rules {
|
||||||
|
rr, _ := r.Exprs[0].(*expr.Verdict)
|
||||||
|
|
||||||
|
if rr.Kind != want[i] {
|
||||||
|
t.Fatalf("bad verdict kind at %d", i)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
c.ReplaceRule(&nftables.Rule{
|
||||||
|
Table: filter,
|
||||||
|
Chain: prerouting,
|
||||||
|
Handle: rules[2].Handle,
|
||||||
|
Exprs: []expr.Any{
|
||||||
|
&expr.Verdict{
|
||||||
|
// [ immediate reg 0 accept ]
|
||||||
|
Kind: expr.VerdictAccept,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
})
|
||||||
|
|
||||||
|
c.AddRule(&nftables.Rule{
|
||||||
|
Table: filter,
|
||||||
|
Chain: prerouting,
|
||||||
|
Position: rules[2].Handle,
|
||||||
|
Exprs: []expr.Any{
|
||||||
|
&expr.Verdict{
|
||||||
|
// [ immediate reg 0 drop ]
|
||||||
|
Kind: expr.VerdictDrop,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
})
|
||||||
|
|
||||||
|
c.InsertRule(&nftables.Rule{
|
||||||
|
Table: filter,
|
||||||
|
Chain: prerouting,
|
||||||
|
Position: rules[2].Handle,
|
||||||
|
Exprs: []expr.Any{
|
||||||
|
&expr.Verdict{
|
||||||
|
// [ immediate reg 0 queue ]
|
||||||
|
Kind: expr.VerdictQueue,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
})
|
||||||
|
|
||||||
|
if err := c.Flush(); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
rules, _ = c.GetRule(filter, prerouting)
|
||||||
|
|
||||||
|
want = []expr.VerdictKind{
|
||||||
|
expr.VerdictQueue,
|
||||||
|
expr.VerdictAccept,
|
||||||
|
expr.VerdictQueue,
|
||||||
|
expr.VerdictAccept,
|
||||||
|
expr.VerdictDrop,
|
||||||
|
expr.VerdictDrop,
|
||||||
|
}
|
||||||
|
|
||||||
|
for i, r := range rules {
|
||||||
|
rr, _ := r.Exprs[0].(*expr.Verdict)
|
||||||
|
|
||||||
|
if rr.Kind != want[i] {
|
||||||
|
t.Fatalf("bad verdict kind at %d", i)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
func TestConfigureNAT(t *testing.T) {
|
func TestConfigureNAT(t *testing.T) {
|
||||||
// The want byte sequences come from stracing nft(8), e.g.:
|
// The want byte sequences come from stracing nft(8), e.g.:
|
||||||
// strace -f -v -x -s 2048 -eraw=sendto nft add table ip nat
|
// strace -f -v -x -s 2048 -eraw=sendto nft add table ip nat
|
||||||
|
|
66
rule.go
66
rule.go
|
@ -26,6 +26,15 @@ import (
|
||||||
|
|
||||||
var ruleHeaderType = netlink.HeaderType((unix.NFNL_SUBSYS_NFTABLES << 8) | unix.NFT_MSG_NEWRULE)
|
var ruleHeaderType = netlink.HeaderType((unix.NFNL_SUBSYS_NFTABLES << 8) | unix.NFT_MSG_NEWRULE)
|
||||||
|
|
||||||
|
type ruleOperation uint32
|
||||||
|
|
||||||
|
// Possible PayloadOperationType values.
|
||||||
|
const (
|
||||||
|
operationAdd ruleOperation = iota
|
||||||
|
operationInsert
|
||||||
|
operationReplace
|
||||||
|
)
|
||||||
|
|
||||||
// A Rule does something with a packet. See also
|
// A Rule does something with a packet. See also
|
||||||
// https://wiki.nftables.org/wiki-nftables/index.php/Simple_rule_management
|
// https://wiki.nftables.org/wiki-nftables/index.php/Simple_rule_management
|
||||||
type Rule struct {
|
type Rule struct {
|
||||||
|
@ -82,7 +91,7 @@ func (cc *Conn) GetRule(t *Table, c *Chain) ([]*Rule, error) {
|
||||||
}
|
}
|
||||||
|
|
||||||
// AddRule adds the specified Rule
|
// AddRule adds the specified Rule
|
||||||
func (cc *Conn) AddRule(r *Rule) *Rule {
|
func (cc *Conn) newRule(r *Rule, op ruleOperation) *Rule {
|
||||||
cc.Lock()
|
cc.Lock()
|
||||||
defer cc.Unlock()
|
defer cc.Unlock()
|
||||||
exprAttrs := make([]netlink.Attribute, len(r.Exprs))
|
exprAttrs := make([]netlink.Attribute, len(r.Exprs))
|
||||||
|
@ -92,12 +101,24 @@ func (cc *Conn) AddRule(r *Rule) *Rule {
|
||||||
Data: cc.marshalExpr(expr),
|
Data: cc.marshalExpr(expr),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
data := cc.marshalAttr([]netlink.Attribute{
|
data := cc.marshalAttr([]netlink.Attribute{
|
||||||
{Type: unix.NFTA_RULE_TABLE, Data: []byte(r.Table.Name + "\x00")},
|
{Type: unix.NFTA_RULE_TABLE, Data: []byte(r.Table.Name + "\x00")},
|
||||||
{Type: unix.NFTA_RULE_CHAIN, Data: []byte(r.Chain.Name + "\x00")},
|
{Type: unix.NFTA_RULE_CHAIN, Data: []byte(r.Chain.Name + "\x00")},
|
||||||
{Type: unix.NLA_F_NESTED | unix.NFTA_RULE_EXPRESSIONS, Data: cc.marshalAttr(exprAttrs)},
|
|
||||||
})
|
})
|
||||||
|
|
||||||
|
if r.Handle != 0 {
|
||||||
|
data = append(data, cc.marshalAttr([]netlink.Attribute{
|
||||||
|
{Type: unix.NFTA_RULE_HANDLE, Data: binaryutil.BigEndian.PutUint64(r.Handle)},
|
||||||
|
})...)
|
||||||
|
}
|
||||||
|
|
||||||
|
data = append(data, cc.marshalAttr([]netlink.Attribute{
|
||||||
|
{Type: unix.NLA_F_NESTED | unix.NFTA_RULE_EXPRESSIONS, Data: cc.marshalAttr(exprAttrs)},
|
||||||
|
})...)
|
||||||
|
|
||||||
msgData := []byte{}
|
msgData := []byte{}
|
||||||
|
|
||||||
msgData = append(msgData, data...)
|
msgData = append(msgData, data...)
|
||||||
var flags netlink.HeaderFlags
|
var flags netlink.HeaderFlags
|
||||||
if r.UserData != nil {
|
if r.UserData != nil {
|
||||||
|
@ -105,21 +126,20 @@ func (cc *Conn) AddRule(r *Rule) *Rule {
|
||||||
{Type: unix.NFTA_RULE_USERDATA, Data: r.UserData},
|
{Type: unix.NFTA_RULE_USERDATA, Data: r.UserData},
|
||||||
})...)
|
})...)
|
||||||
}
|
}
|
||||||
if r.Handle != 0 {
|
|
||||||
|
switch op {
|
||||||
|
case operationAdd:
|
||||||
|
flags = netlink.Request | netlink.Acknowledge | netlink.Create | unix.NLM_F_ECHO | unix.NLM_F_APPEND
|
||||||
|
case operationInsert:
|
||||||
|
flags = netlink.Request | netlink.Acknowledge | netlink.Create | unix.NLM_F_ECHO
|
||||||
|
case operationReplace:
|
||||||
flags = netlink.Request | netlink.Acknowledge | netlink.Replace | unix.NLM_F_ECHO | unix.NLM_F_REPLACE
|
flags = netlink.Request | netlink.Acknowledge | netlink.Replace | unix.NLM_F_ECHO | unix.NLM_F_REPLACE
|
||||||
msgData = append(msgData, cc.marshalAttr([]netlink.Attribute{
|
}
|
||||||
{Type: unix.NFTA_RULE_HANDLE, Data: binaryutil.BigEndian.PutUint64(r.Handle)},
|
|
||||||
})...)
|
if r.Position != 0 {
|
||||||
} else if r.Position != 0 {
|
|
||||||
// when a rule's position is specified, it becomes nft insert rule operation
|
|
||||||
msgData = append(msgData, cc.marshalAttr([]netlink.Attribute{
|
msgData = append(msgData, cc.marshalAttr([]netlink.Attribute{
|
||||||
{Type: unix.NFTA_RULE_POSITION, Data: binaryutil.BigEndian.PutUint64(r.Position)},
|
{Type: unix.NFTA_RULE_POSITION, Data: binaryutil.BigEndian.PutUint64(r.Position)},
|
||||||
})...)
|
})...)
|
||||||
// when a rule's position is specified, it becomes nft insert rule operation
|
|
||||||
flags = netlink.Request | netlink.Acknowledge | netlink.Create | unix.NLM_F_ECHO
|
|
||||||
} else {
|
|
||||||
// unix.NLM_F_APPEND is added when nft add rule operation is executed.
|
|
||||||
flags = netlink.Request | netlink.Acknowledge | netlink.Create | unix.NLM_F_ECHO | unix.NLM_F_APPEND
|
|
||||||
}
|
}
|
||||||
|
|
||||||
cc.messages = append(cc.messages, netlink.Message{
|
cc.messages = append(cc.messages, netlink.Message{
|
||||||
|
@ -133,6 +153,26 @@ func (cc *Conn) AddRule(r *Rule) *Rule {
|
||||||
return r
|
return r
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (cc *Conn) ReplaceRule(r *Rule) *Rule {
|
||||||
|
return cc.newRule(r, operationReplace)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (cc *Conn) AddRule(r *Rule) *Rule {
|
||||||
|
if r.Handle != 0 {
|
||||||
|
return cc.newRule(r, operationReplace)
|
||||||
|
}
|
||||||
|
|
||||||
|
return cc.newRule(r, operationAdd)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (cc *Conn) InsertRule(r *Rule) *Rule {
|
||||||
|
if r.Handle != 0 {
|
||||||
|
return cc.newRule(r, operationReplace)
|
||||||
|
}
|
||||||
|
|
||||||
|
return cc.newRule(r, operationInsert)
|
||||||
|
}
|
||||||
|
|
||||||
// DelRule deletes the specified Rule, rule's handle cannot be 0
|
// DelRule deletes the specified Rule, rule's handle cannot be 0
|
||||||
func (cc *Conn) DelRule(r *Rule) error {
|
func (cc *Conn) DelRule(r *Rule) error {
|
||||||
cc.Lock()
|
cc.Lock()
|
||||||
|
|
Loading…
Reference in New Issue