2020-01-10 17:05:25 +00:00
|
|
|
// Copyright 2020 The gVisor Authors.
|
2020-01-09 23:38:28 +00:00
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
package iptables
|
|
|
|
|
|
|
|
import (
|
2020-01-10 17:05:25 +00:00
|
|
|
"fmt"
|
|
|
|
"net"
|
2020-01-09 23:38:28 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
2020-01-17 16:38:25 +00:00
|
|
|
redirectPort = 42
|
2020-01-09 23:38:28 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func init() {
|
2020-01-10 17:05:25 +00:00
|
|
|
RegisterTestCase(NATRedirectUDPPort{})
|
|
|
|
RegisterTestCase(NATDropUDP{})
|
2020-01-09 23:38:28 +00:00
|
|
|
}
|
|
|
|
|
2020-01-17 16:38:25 +00:00
|
|
|
// NATRedirectUDPPort tests that packets are redirected to different port.
|
2020-01-10 17:05:25 +00:00
|
|
|
type NATRedirectUDPPort struct{}
|
2020-01-09 23:38:28 +00:00
|
|
|
|
|
|
|
// Name implements TestCase.Name.
|
2020-01-10 17:05:25 +00:00
|
|
|
func (NATRedirectUDPPort) Name() string {
|
|
|
|
return "NATRedirectUDPPort"
|
2020-01-09 23:38:28 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// ContainerAction implements TestCase.ContainerAction.
|
2020-01-10 17:05:25 +00:00
|
|
|
func (NATRedirectUDPPort) ContainerAction(ip net.IP) error {
|
2020-02-18 23:24:59 +00:00
|
|
|
if err := natTable("-A", "PREROUTING", "-p", "udp", "-j", "REDIRECT", "--to-ports", fmt.Sprintf("%d", redirectPort)); err != nil {
|
2020-01-09 23:38:28 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := listenUDP(redirectPort, sendloopDuration); err != nil {
|
2020-01-10 17:05:25 +00:00
|
|
|
return fmt.Errorf("packets on port %d should be allowed, but encountered an error: %v", redirectPort, err)
|
2020-01-09 23:38:28 +00:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// LocalAction implements TestCase.LocalAction.
|
2020-01-10 17:05:25 +00:00
|
|
|
func (NATRedirectUDPPort) LocalAction(ip net.IP) error {
|
|
|
|
return sendUDPLoop(ip, acceptPort, sendloopDuration)
|
2020-01-09 23:38:28 +00:00
|
|
|
}
|
|
|
|
|
2020-01-10 17:05:25 +00:00
|
|
|
// NATDropUDP tests that packets are not received in ports other than redirect port.
|
|
|
|
type NATDropUDP struct{}
|
2020-01-09 23:38:28 +00:00
|
|
|
|
|
|
|
// Name implements TestCase.Name.
|
2020-01-10 17:05:25 +00:00
|
|
|
func (NATDropUDP) Name() string {
|
|
|
|
return "NATDropUDP"
|
2020-01-09 23:38:28 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// ContainerAction implements TestCase.ContainerAction.
|
2020-01-10 17:05:25 +00:00
|
|
|
func (NATDropUDP) ContainerAction(ip net.IP) error {
|
2020-02-18 23:24:59 +00:00
|
|
|
if err := natTable("-A", "PREROUTING", "-p", "udp", "-j", "REDIRECT", "--to-ports", fmt.Sprintf("%d", redirectPort)); err != nil {
|
2020-01-09 23:38:28 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := listenUDP(acceptPort, sendloopDuration); err == nil {
|
|
|
|
return fmt.Errorf("packets on port %d should have been redirected to port %d", acceptPort, redirectPort)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// LocalAction implements TestCase.LocalAction.
|
2020-01-10 17:05:25 +00:00
|
|
|
func (NATDropUDP) LocalAction(ip net.IP) error {
|
|
|
|
return sendUDPLoop(ip, acceptPort, sendloopDuration)
|
2020-01-09 23:38:28 +00:00
|
|
|
}
|