From 0061c0ce4443395a258a99c70e1c1a7d0435e84e Mon Sep 17 00:00:00 2001 From: Juliano Martinez Date: Mon, 18 Jun 2012 11:00:45 -0300 Subject: [PATCH] Added iptables_manager ( based on openstack/linux_net.py ) This module will be the base library to implement security groups and generic firewall. It is an independent iptables module, made to be easy to package if used by agents and also inside quantum Using quantum.agent.linux.utils Added support to root_helper Change-Id: Iaa29322477fc2e753b52dc4f01e7c4a561110638 --- quantum/agent/linux/iptables_manager.py | 342 ++++++++++++++++++++ quantum/rootwrap/iptables-firewall-agent.py | 34 ++ quantum/rootwrap/wrapper.py | 3 +- quantum/tests/unit/test_iptables_manager.py | 294 +++++++++++++++++ 4 files changed, 672 insertions(+), 1 deletion(-) create mode 100755 quantum/agent/linux/iptables_manager.py create mode 100755 quantum/rootwrap/iptables-firewall-agent.py create mode 100755 quantum/tests/unit/test_iptables_manager.py diff --git a/quantum/agent/linux/iptables_manager.py b/quantum/agent/linux/iptables_manager.py new file mode 100755 index 000000000..fa865b35b --- /dev/null +++ b/quantum/agent/linux/iptables_manager.py @@ -0,0 +1,342 @@ +# vim: tabstop=4 shiftwidth=4 softtabstop=4 + +# Copyright 2012 Locaweb. +# All Rights Reserved. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# @author: Juliano Martinez, Locaweb. +# based on +# https://github.com/openstack/nova/blob/master/nova/network/linux_net.py + +"""Implements iptables rules using linux utilities.""" + +import ConfigParser +import inspect +import logging +import os +import subprocess + +from quantum.agent.linux import utils + +LOG = logging.getLogger(__name__) +# NOTE(vish): Iptables supports chain names of up to 28 characters, and we +# add up to 12 characters to binary_name which is used as a prefix, +# so we limit it to 16 characters. +# (max_chain_name_length - len('-POSTROUTING') == 16) +binary_name = os.path.basename(inspect.stack()[-1][1])[:16] + + +class IptablesRule(object): + """An iptables rule. + + You shouldn't need to use this class directly, it's only used by + IptablesManager. + + """ + + def __init__(self, chain, rule, wrap=True, top=False): + self.chain = chain + self.rule = rule + self.wrap = wrap + self.top = top + + def __eq__(self, other): + return ((self.chain == other.chain) and + (self.rule == other.rule) and + (self.top == other.top) and + (self.wrap == other.wrap)) + + def __ne__(self, other): + return not self == other + + def __str__(self): + if self.wrap: + chain = '%s-%s' % (binary_name, self.chain) + else: + chain = self.chain + return '-A %s %s' % (chain, self.rule) + + +class IptablesTable(object): + """An iptables table.""" + + def __init__(self): + self.rules = [] + self.chains = set() + self.unwrapped_chains = set() + + def add_chain(self, name, wrap=True): + """Adds a named chain to the table. + + The chain name is wrapped to be unique for the component creating + it, so different components of Nova can safely create identically + named chains without interfering with one another. + + At the moment, its wrapped name is -, + so if nova-compute creates a chain named 'OUTPUT', it'll actually + end up named 'nova-compute-OUTPUT'. + + """ + if wrap: + self.chains.add(name) + else: + self.unwrapped_chains.add(name) + + def remove_chain(self, name, wrap=True): + """Remove named chain. + + This removal "cascades". All rule in the chain are removed, as are + all rules in other chains that jump to it. + + If the chain is not found, this is merely logged. + + """ + if wrap: + chain_set = self.chains + else: + chain_set = self.unwrapped_chains + + if name not in chain_set: + LOG.warn(('Attempted to remove chain %s which does not exist'), + name) + return + + chain_set.remove(name) + self.rules = filter(lambda r: r.chain != name, self.rules) + + if wrap: + jump_snippet = '-j %s-%s' % (binary_name, name) + else: + jump_snippet = '-j %s' % (name,) + + self.rules = filter(lambda r: jump_snippet not in r.rule, self.rules) + + def add_rule(self, chain, rule, wrap=True, top=False): + """Add a rule to the table. + + This is just like what you'd feed to iptables, just without + the '-A ' bit at the start. + + However, if you need to jump to one of your wrapped chains, + prepend its name with a '$' which will ensure the wrapping + is applied correctly. + + """ + if wrap and chain not in self.chains: + raise LookupError(('Unknown chain: %r') % chain) + + if '$' in rule: + rule = ' '.join(map(self._wrap_target_chain, rule.split(' '))) + + self.rules.append(IptablesRule(chain, rule, wrap, top)) + + def _wrap_target_chain(self, s): + if s.startswith('$'): + return '%s-%s' % (binary_name, s[1:]) + return s + + def remove_rule(self, chain, rule, wrap=True, top=False): + """Remove a rule from a chain. + + Note: The rule must be exactly identical to the one that was added. + You cannot switch arguments around like you can with the iptables + CLI tool. + + """ + try: + self.rules.remove(IptablesRule(chain, rule, wrap, top)) + except ValueError: + LOG.warn(('Tried to remove rule that was not there:' + ' %(chain)r %(rule)r %(wrap)r %(top)r'), + {'chain': chain, 'rule': rule, + 'top': top, 'wrap': wrap}) + + def empty_chain(self, chain, wrap=True): + """Remove all rules from a chain.""" + chained_rules = [rule for rule in self.rules + if rule.chain == chain and rule.wrap == wrap] + for rule in chained_rules: + self.rules.remove(rule) + + +class IptablesManager(object): + """Wrapper for iptables. + + See IptablesTable for some usage docs + + A number of chains are set up to begin with. + + First, quantum-filter-top. It's added at the top of FORWARD and OUTPUT. Its + name is not wrapped, so it's shared between the various nova workers. It's + intended for rules that need to live at the top of the FORWARD and OUTPUT + chains. It's in both the ipv4 and ipv6 set of tables. + + For ipv4 and ipv6, the built-in INPUT, OUTPUT, and FORWARD filter chains + are wrapped, meaning that the "real" INPUT chain has a rule that jumps to + the wrapped INPUT chain, etc. Additionally, there's a wrapped chain named + "local" which is jumped to from quantum-filter-top. + + For ipv4, the built-in PREROUTING, OUTPUT, and POSTROUTING nat chains are + wrapped in the same was as the built-in filter chains. Additionally, + there's a snat chain that is applied after the POSTROUTING chain. + + """ + + def __init__(self, _execute=None, state_less=False, + root_helper=None, use_ipv6=False): + if _execute: + self.execute = _execute + else: + self.execute = utils.execute + + self.use_ipv6 = use_ipv6 + self.root_helper = root_helper + + self.ipv4 = {'filter': IptablesTable()} + self.ipv6 = {'filter': IptablesTable()} + + # Add a quantum-filter-top chain. It's intended to be shared + # among the various nova components. It sits at the very top + # of FORWARD and OUTPUT. + for tables in [self.ipv4, self.ipv6]: + tables['filter'].add_chain('quantum-filter-top', wrap=False) + tables['filter'].add_rule('FORWARD', '-j quantum-filter-top', + wrap=False, top=True) + tables['filter'].add_rule('OUTPUT', '-j quantum-filter-top', + wrap=False, top=True) + + tables['filter'].add_chain('local') + tables['filter'].add_rule('quantum-filter-top', '-j $local', + wrap=False) + + # Wrap the built-in chains + builtin_chains = {4: {'filter': ['INPUT', 'OUTPUT', 'FORWARD']}, + 6: {'filter': ['INPUT', 'OUTPUT', 'FORWARD']}} + + if not state_less: + self.ipv4.update({'nat': IptablesTable()}) + builtin_chains[4].update({'nat': ['PREROUTING', + 'OUTPUT', 'POSTROUTING']}) + + for ip_version in builtin_chains: + if ip_version == 4: + tables = self.ipv4 + elif ip_version == 6: + tables = self.ipv6 + + for table, chains in builtin_chains[ip_version].iteritems(): + for chain in chains: + tables[table].add_chain(chain) + tables[table].add_rule(chain, '-j $%s' % + (chain), wrap=False) + + if not state_less: + # Add a quantum-postrouting-bottom chain. It's intended to be + # shared among the various nova components. We set it as the last + # chain of POSTROUTING chain. + self.ipv4['nat'].add_chain('quantum-postrouting-bottom', + wrap=False) + self.ipv4['nat'].add_rule('POSTROUTING', + '-j quantum-postrouting-bottom', + wrap=False) + + # We add a snat chain to the shared quantum-postrouting-bottom + # chain so that it's applied last. + self.ipv4['nat'].add_chain('snat') + self.ipv4['nat'].add_rule('quantum-postrouting-bottom', + '-j $snat', wrap=False) + + # And then we add a float-snat chain and jump to first thing in + # the snat chain. + self.ipv4['nat'].add_chain('float-snat') + self.ipv4['nat'].add_rule('snat', '-j $float-snat') + + def apply(self): + """Apply the current in-memory set of iptables rules. + + This will blow away any rules left over from previous runs of the + same component of Nova, and replace them with our current set of + rules. This happens atomically, thanks to iptables-restore. + + """ + s = [('/sbin/iptables', self.ipv4)] + if self.use_ipv6: + s += [('ip6tables', self.ipv6)] + + for cmd, tables in s: + for table in tables: + current_table = (self.execute(['%s-save' % cmd, '-t', table], + root_helper=self.root_helper)) + current_lines = current_table.split('\n') + new_filter = self._modify_rules(current_lines, + tables[table]) + self.execute(['%s-restore' % (cmd)], + process_input='\n'.join(new_filter), + root_helper=self.root_helper) + LOG.debug(("IPTablesManager.apply completed with success")) + + def _modify_rules(self, current_lines, table, binary=None): + unwrapped_chains = table.unwrapped_chains + chains = table.chains + rules = table.rules + + # Remove any trace of our rules + new_filter = filter(lambda line: binary_name + not in line, current_lines) + + seen_chains = False + rules_index = 0 + for rules_index, rule in enumerate(new_filter): + if not seen_chains: + if rule.startswith(':'): + seen_chains = True + else: + if not rule.startswith(':'): + break + + our_rules = [] + for rule in rules: + rule_str = str(rule) + if rule.top: + # rule.top == True means we want this rule to be at the top. + # Further down, we weed out duplicates from the bottom of the + # list, so here we remove the dupes ahead of time. + new_filter = filter(lambda s: s.strip() != rule_str.strip(), + new_filter) + our_rules += [rule_str] + + new_filter[rules_index:rules_index] = our_rules + + new_filter[rules_index:rules_index] = [':%s - [0:0]' % (name) + for name in unwrapped_chains] + new_filter[rules_index:rules_index] = [':%s-%s - [0:0]' % + (binary_name, name) + for name in chains] + + seen_lines = set() + + def _weed_out_duplicates(line): + line = line.strip() + if line in seen_lines: + return False + else: + seen_lines.add(line) + return True + + # We filter duplicates, letting the *last* occurrence take + # precedence. + new_filter.reverse() + new_filter = filter(_weed_out_duplicates, new_filter) + new_filter.reverse() + return new_filter diff --git a/quantum/rootwrap/iptables-firewall-agent.py b/quantum/rootwrap/iptables-firewall-agent.py new file mode 100755 index 000000000..83f714735 --- /dev/null +++ b/quantum/rootwrap/iptables-firewall-agent.py @@ -0,0 +1,34 @@ +# vim: tabstop=4 shiftwidth=4 softtabstop=4 + +# Copyright 2012 Locaweb. +# All Rights Reserved. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# @author: Juliano Martinez, Locaweb. + +from quantum.rootwrap import filters + +filterlist = [ + # quantum/agent/linux/iptables_manager.py + # "iptables-save", ... + filters.CommandFilter("/sbin/iptables-save", "root"), + filters.CommandFilter("/sbin/iptables-restore", "root"), + filters.CommandFilter("/sbin/ip6tables-save", "root"), + filters.CommandFilter("/sbin/ip6tables-restore", "root"), + + # quantum/agent/linux/iptables_manager.py + # "iptables", "-A", ... + filters.CommandFilter("/sbin/iptables", "root"), + filters.CommandFilter("/sbin/ip6tables", "root"), +] diff --git a/quantum/rootwrap/wrapper.py b/quantum/rootwrap/wrapper.py index 5ab8d7a3a..45c414f9f 100644 --- a/quantum/rootwrap/wrapper.py +++ b/quantum/rootwrap/wrapper.py @@ -22,7 +22,8 @@ import sys FILTERS_MODULES = ['quantum.rootwrap.linuxbridge-agent', 'quantum.rootwrap.openvswitch-agent', - 'quantum.rootwrap.ryu-agent'] + 'quantum.rootwrap.ryu-agent', + 'quantum.rootwrap.iptables-firewall-agent'] def load_filters(): diff --git a/quantum/tests/unit/test_iptables_manager.py b/quantum/tests/unit/test_iptables_manager.py new file mode 100755 index 000000000..33e4ed9c7 --- /dev/null +++ b/quantum/tests/unit/test_iptables_manager.py @@ -0,0 +1,294 @@ +# vim: tabstop=4 shiftwidth=4 softtabstop=4 + +# Copyright 2012 Locaweb. +# All Rights Reserved. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# +# @author: Juliano Martinez, Locaweb. + +import os +import inspect +import unittest + +import mox + +from quantum.agent.linux import iptables_manager + + +class IptablesManagerStateFulTestCase(unittest.TestCase): + + def setUp(self): + self.mox = mox.Mox() + self.root_helper = 'sudo' + self.iptables = (iptables_manager. + IptablesManager(root_helper=self.root_helper)) + self.mox.StubOutWithMock(self.iptables, "execute") + + def tearDown(self): + self.mox.UnsetStubs() + + def test_binary_name(self): + self.assertEqual(iptables_manager.binary_name, + os.path.basename(inspect.stack()[-1][1])[:16]) + + def test_add_and_remove_chain(self): + bn = iptables_manager.binary_name + self.iptables.execute(['/sbin/iptables-save', '-t', 'filter'], + root_helper=self.root_helper).AndReturn('') + + nat_dump = (':%s-OUTPUT - [0:0]\n:%s-snat - [0:0]\n:%s-PREROUTING -' + ' [0:0]\n:%s-float-snat - [0:0]\n:%s-POSTROUTING - [0:0]' + '\n:quantum-postrouting-bottom - [0:0]\n-A PREROUTING -j' + ' %s-PREROUTING\n-A OUTPUT -j %s-OUTPUT\n-A POSTROUTING ' + '-j %s-POSTROUTING\n-A POSTROUTING -j quantum-postroutin' + 'g-bottom\n-A quantum-postrouting-bottom -j %s-snat\n-A ' + '%s-snat -j %s-float-snat\n' % (bn, bn, bn, bn, bn, bn, + bn, bn, bn, bn, bn)) + + self.iptables.execute(['/sbin/iptables-restore'], + process_input=(':%s-FORWARD - [0:0]\n:%s-INPUT' + ' - [0:0]\n:%s-local - [0:0]\n:%s-filter - [0:' + '0]\n:%s-OUTPUT - [0:0]\n:quantum-filter-top -' + ' [0:0]\n-A FORWARD -j quantum-filter-top\n-A ' + 'OUTPUT -j quantum-filter-top\n-A quantum-filt' + 'er-top -j %s-local\n-A INPUT -j %s-INPUT\n-A ' + 'OUTPUT -j %s-OUTPUT\n-A FORWARD -j %s-FORWARD' + '\n' % (bn, bn, bn, bn, bn, bn, bn, bn, bn) + ), root_helper=self.root_helper).AndReturn(None) + + self.iptables.execute(['/sbin/iptables-save', '-t', 'nat'], + root_helper=self.root_helper).AndReturn('') + + self.iptables.execute(['/sbin/iptables-restore'], + process_input=nat_dump, + root_helper=self.root_helper).AndReturn(None) + + self.iptables.execute(['/sbin/iptables-save', '-t', 'filter'], + root_helper=self.root_helper).AndReturn('') + + self.iptables.execute(['/sbin/iptables-restore'], + process_input=(':%s-FORWARD - [0:0]\n:%s-INPUT' + ' - [0:0]\n:%s-local - [0:0]\n:%s-OUTPUT - [0:' + '0]\n:quantum-filter-top - [0:0]\n-A FORWARD -' + 'j quantum-filter-top\n-A OUTPUT -j quantum-fi' + 'lter-top\n-A quantum-filter-top -j %s-local\n' + '-A INPUT -j %s-INPUT\n-A OUTPUT -j %s-OUTPUT' + '\n-A FORWARD -j %s-FORWARD\n' % (bn, bn, bn, bn, + bn, bn, bn, bn)), root_helper=self.root_helper + ).AndReturn(None) + + self.iptables.execute(['/sbin/iptables-save', '-t', 'nat'], + root_helper=self.root_helper).AndReturn('') + + self.iptables.execute(['/sbin/iptables-restore'], + process_input=nat_dump, + root_helper=self.root_helper).AndReturn(None) + + self.mox.ReplayAll() + + self.iptables.ipv4['filter'].add_chain('filter') + self.iptables.apply() + + self.iptables.ipv4['filter'].remove_chain('filter') + self.iptables.apply() + + self.mox.VerifyAll() + + def test_add_filter_rule(self): + bn = iptables_manager.binary_name + self.iptables.execute(['/sbin/iptables-save', '-t', 'filter'], + root_helper=self.root_helper).AndReturn('') + + nat_dump = (':%s-OUTPUT - [0:0]\n:%s-snat - [0:0]\n:%s-PREROUTING -' + ' [0:0]\n:%s-float-snat - [0:0]\n:%s-POSTROUTING - [0:0]' + '\n:quantum-postrouting-bottom - [0:0]\n-A PREROUTING -j' + ' %s-PREROUTING\n-A OUTPUT -j %s-OUTPUT\n-A POSTROUTING ' + '-j %s-POSTROUTING\n-A POSTROUTING -j quantum-postroutin' + 'g-bottom\n-A quantum-postrouting-bottom -j %s-snat\n-A ' + '%s-snat -j %s-float-snat\n' % (bn, bn, bn, bn, bn, bn, + bn, bn, bn, bn, bn)) + + self.iptables.execute(['/sbin/iptables-restore'], + process_input=(':%s-FORWARD - [0:0]\n:%s-INPUT' + ' - [0:0]\n:%s-local - [0:0]\n:%s-filter - [0:' + '0]\n:%s-OUTPUT - [0:0]\n:quantum-filter-top -' + ' [0:0]\n-A FORWARD -j quantum-filter-top\n-A ' + 'OUTPUT -j quantum-filter-top\n-A quantum-filt' + 'er-top -j %s-local\n-A INPUT -j %s-INPUT\n-A ' + 'OUTPUT -j %s-OUTPUT\n-A FORWARD -j %s-FORWARD' + '\n-A %s-filter -j DROP\n-A %s-INPUT -s 0/0 -d' + ' 192.168.0.2 -j %s-filter\n' % (bn, bn, bn, bn, + bn, bn, bn, bn, bn, bn, bn, bn)), root_helper= + self.root_helper).AndReturn(None) + + self.iptables.execute(['/sbin/iptables-save', '-t', 'nat'], + root_helper=self.root_helper).AndReturn('') + + self.iptables.execute(['/sbin/iptables-restore'], + process_input=nat_dump, + root_helper=self.root_helper).AndReturn(None) + + self.iptables.execute(['/sbin/iptables-save', '-t', 'filter'], + root_helper=self.root_helper).AndReturn('') + + self.iptables.execute(['/sbin/iptables-restore'], + process_input=(':%s-FORWARD - [0:0]\n:%s-INPUT -' + ' [0:0]\n:%s-local - [0:0]\n:%s-OUTPUT - [0:0]\n' + ':quantum-filter-top - [0:0]\n-A FORWARD -j quan' + 'tum-filter-top\n-A OUTPUT -j quantum-filter-top' + '\n-A quantum-filter-top -j %s-local\n-A INPUT -' + 'j %s-INPUT\n-A OUTPUT -j %s-OUTPUT\n-A FORWARD ' + '-j %s-FORWARD\n' % (bn, bn, bn, bn, bn, bn, bn, + bn)), root_helper=self.root_helper + ).AndReturn(None) + + self.iptables.execute(['/sbin/iptables-save', '-t', 'nat'], + root_helper=self.root_helper).AndReturn('') + + self.iptables.execute(['/sbin/iptables-restore'], + process_input=nat_dump, + root_helper=self.root_helper).AndReturn(None) + + self.mox.ReplayAll() + + self.iptables.ipv4['filter'].add_chain('filter') + self.iptables.ipv4['filter'].add_rule('filter', '-j DROP') + self.iptables.ipv4['filter'].add_rule('INPUT', + '-s 0/0 -d 192.168.0.2 -j' + ' %s-filter' % + (iptables_manager.binary_name)) + self.iptables.apply() + + self.iptables.ipv4['filter'].remove_rule('filter', '-j DROP') + self.iptables.ipv4['filter'].remove_rule('INPUT', + '-s 0/0 -d 192.168.0.2 -j' + ' %s-filter' % + (iptables_manager. + binary_name)) + self.iptables.ipv4['filter'].remove_chain('filter') + + self.iptables.apply() + self.mox.VerifyAll() + + def test_add_nat_rule(self): + bn = iptables_manager.binary_name + + filter_dump = (':%s-FORWARD - [0:0]\n:%s-INPUT - [0:0]\n:%s-local - ' + '[0:0]\n:%s-OUTPUT - [0:0]\n:quantum-filter-top - [0:' + '0]\n-A FORWARD -j quantum-filter-top\n-A OUTPUT -j q' + 'uantum-filter-top\n-A quantum-filter-top -j %s-local' + '\n-A INPUT -j %s-INPUT\n-A OUTPUT -j %s-OUTPUT\n-A F' + 'ORWARD -j %s-FORWARD\n' % (bn, bn, bn, bn, bn, + bn, bn, bn)) + + self.iptables.execute(['/sbin/iptables-save', '-t', 'filter'], + root_helper=self.root_helper).AndReturn('') + + self.iptables.execute(['/sbin/iptables-restore'], + process_input=filter_dump, + root_helper=self.root_helper).AndReturn(None) + + self.iptables.execute(['/sbin/iptables-save', '-t', 'nat'], + root_helper=self.root_helper).AndReturn('') + + self.iptables.execute(['/sbin/iptables-restore'], + process_input=(':%s-float-snat - [0:0]\n:%s-POS' + 'TROUTING - [0:0]\n:%s-PREROUTING - [0:0]\n:%s-' + 'nat - [0:0]\n:%s-OUTPUT - [0:0]\n:%s-snat - [0' + ':0]\n:quantum-postrouting-bottom - [0:0]\n-A P' + 'REROUTING -j %s-PREROUTING\n-A OUTPUT -j %s-OU' + 'TPUT\n-A POSTROUTING -j %s-POSTROUTING\n-A POS' + 'TROUTING -j quantum-postrouting-bottom\n-A qua' + 'ntum-postrouting-bottom -j %s-snat\n-A %s-snat' + ' -j %s-float-snat\n-A %s-PREROUTING -d 192.168' + '.0.3 -j %s-nat\n-A %s-nat -p tcp --dport 8080 ' + '-j REDIRECT --to-port 80\n' % (bn, bn, bn, bn, + bn, bn, bn, bn, bn, bn, bn, bn, bn, bn, bn)), + root_helper=self.root_helper).AndReturn(None) + + self.iptables.execute(['/sbin/iptables-save', '-t', 'filter'], + root_helper=self.root_helper).AndReturn('') + + self.iptables.execute(['/sbin/iptables-restore'], + process_input=filter_dump, + root_helper=self.root_helper).AndReturn(None) + + self.iptables.execute(['/sbin/iptables-save', '-t', 'nat'], + root_helper=self.root_helper).AndReturn('') + + self.iptables.execute(['/sbin/iptables-restore'], + process_input=(':%s-float-snat - [0:0]\n:%s-POST' + 'ROUTING - [0:0]\n:%s-PREROUTING - [0:0]\n:%s-OU' + 'TPUT - [0:0]\n:%s-snat - [0:0]\n:quantum-postro' + 'uting-bottom - [0:0]\n-A PREROUTING -j %s-PRERO' + 'UTING\n-A OUTPUT -j %s-OUTPUT\n-A POSTROUTING -' + 'j %s-POSTROUTING\n-A POSTROUTING -j quantum-pos' + 'trouting-bottom\n-A quantum-postrouting-bottom ' + '-j %s-snat\n-A %s-snat -j %s-float-snat\n' % ( + bn, bn, bn, bn, bn, bn, bn, bn, bn, bn, bn) + ), root_helper=self.root_helper).AndReturn(None) + + self.mox.ReplayAll() + self.iptables.ipv4['nat'].add_chain('nat') + self.iptables.ipv4['nat'].add_rule('PREROUTING', + '-d 192.168.0.3 -j %s-nat' % + (iptables_manager.binary_name)) + self.iptables.ipv4['nat'].add_rule('nat', + '-p tcp --dport 8080' + + ' -j REDIRECT --to-port 80') + + self.iptables.apply() + + self.iptables.ipv4['nat'].remove_rule('nat', + '-p tcp --dport 8080 -j' + ' REDIRECT --to-port 80') + self.iptables.ipv4['nat'].remove_rule('PREROUTING', + '-d 192.168.0.3 -j %s-nat' % + (iptables_manager.binary_name)) + self.iptables.ipv4['nat'].remove_chain('nat') + + self.iptables.apply() + self.mox.VerifyAll() + + def test_add_rule_to_a_nonexistent_chain(self): + self.assertRaises(LookupError, self.iptables.ipv4['filter'].add_rule, + 'nonexistent', '-j DROP') + + def test_remove_nonexistent_chain(self): + self.mox.StubOutWithMock(iptables_manager, "LOG") + iptables_manager.LOG.warn(('Attempted to remove chain %s which does ' + 'not exist'), 'nonexistent') + self.mox.ReplayAll() + self.iptables.ipv4['filter'].remove_chain('nonexistent') + self.mox.VerifyAll() + + def test_remove_nonexistent_rule(self): + self.mox.StubOutWithMock(iptables_manager, "LOG") + iptables_manager.LOG.warn('Tried to remove rule that was not there: ' + '%(chain)r %(rule)r %(wrap)r %(top)r', + {'wrap': True, 'top': False, + 'rule': '-j DROP', + 'chain': 'nonexistent'}) + self.mox.ReplayAll() + self.iptables.ipv4['filter'].remove_rule('nonexistent', '-j DROP') + self.mox.VerifyAll() + + +class IptablesManagerStateLessTestCase(unittest.TestCase): + + def setUp(self): + self.iptables = (iptables_manager.IptablesManager(state_less=True)) + + def test_nat_not_found(self): + self.assertFalse('nat' in self.iptables.ipv4) -- 2.45.2