forked from kubernetes/kubernetes
-
Notifications
You must be signed in to change notification settings - Fork 1
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
pkg/util/iptables/testing: Add better IPTables rule-parsing helpers
There were previously some strange iptables-rule-parsing functions that were only used by two unit tests in pkg/proxy/ipvs. Get rid of them and replace them with some much better iptables-rule-parsing functions.
- Loading branch information
1 parent
2b3508e
commit f2fa103
Showing
4 changed files
with
468 additions
and
81 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,206 @@ | ||
/* | ||
Copyright 2022 The Kubernetes Authors. | ||
Licensed under the Apache License, Version 2.0 (the "License"); | ||
you may not use this file except in compliance with the License. | ||
You may obtain a copy of the License at | ||
http://www.apache.org/licenses/LICENSE-2.0 | ||
Unless required by applicable law or agreed to in writing, software | ||
distributed under the License is distributed on an "AS IS" BASIS, | ||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | ||
See the License for the specific language governing permissions and | ||
limitations under the License. | ||
*/ | ||
|
||
package testing | ||
|
||
import ( | ||
"fmt" | ||
"reflect" | ||
"regexp" | ||
"strings" | ||
|
||
"k8s.io/kubernetes/pkg/util/iptables" | ||
) | ||
|
||
// Rule represents a single parsed IPTables rule. (This currently covers all of the rule | ||
// types that we actually use in pkg/proxy/iptables or pkg/proxy/ipvs.) | ||
// | ||
// The parsing is mostly-automated based on type reflection. The `param` tag on a field | ||
// indicates the parameter whose value will be placed into that field. (The code assumes | ||
// that we don't use both the short and long forms of any parameter names (eg, "-s" vs | ||
// "--source"), which is currently true, but it could be extended if necessary.) The | ||
// `negatable` tag indicates if a parameter is allowed to be preceded by "!". | ||
// | ||
// Parameters that take a value are stored as type `*IPTablesValue`, which encapsulates a | ||
// string value and whether the rule was negated (ie, whether the rule requires that we | ||
// *match* or *don't match* that value). But string-valued parameters that can't be | ||
// negated use `IPTablesValue` rather than `string` too, just for API consistency. | ||
// | ||
// Parameters that don't take a value are stored as `*bool`, where the value is `nil` if | ||
// the parameter was not present, `&true` if the parameter was present, or `&false` if the | ||
// parameter was present but negated. | ||
// | ||
// Parsing skips over "-m MODULE" parameters because most parameters have unique names | ||
// anyway even ignoring the module name, and in the cases where they don't (eg "-m tcp | ||
// --sport" vs "-m udp --sport") the parameters are mutually-exclusive and it's more | ||
// convenient to store them in the same struct field anyway. | ||
type Rule struct { | ||
// Raw contains the original raw rule string | ||
Raw string | ||
|
||
Chain iptables.Chain `param:"-A"` | ||
Comment *IPTablesValue `param:"--comment"` | ||
|
||
Protocol *IPTablesValue `param:"-p" negatable:"true"` | ||
|
||
SourceAddress *IPTablesValue `param:"-s" negatable:"true"` | ||
SourceType *IPTablesValue `param:"--src-type" negatable:"true"` | ||
SourcePort *IPTablesValue `param:"--sport" negatable:"true"` | ||
|
||
DestinationAddress *IPTablesValue `param:"-d" negatable:"true"` | ||
DestinationType *IPTablesValue `param:"--dst-type" negatable:"true"` | ||
DestinationPort *IPTablesValue `param:"--dport" negatable:"true"` | ||
|
||
MatchSet *IPTablesValue `param:"--match-set" negatable:"true"` | ||
|
||
Jump *IPTablesValue `param:"-j"` | ||
RandomFully *bool `param:"--random-fully"` | ||
Probability *IPTablesValue `param:"--probability"` | ||
DNATDestination *IPTablesValue `param:"--to-destination"` | ||
|
||
// We don't actually use the values of these, but we care if they are present | ||
AffinityCheck *bool `param:"--rcheck" negatable:"true"` | ||
MarkCheck *IPTablesValue `param:"--mark" negatable:"true"` | ||
CTStateCheck *IPTablesValue `param:"--ctstate" negatable:"true"` | ||
|
||
// We don't currently care about any of these in the unit tests, but we expect | ||
// them to be present in some rules that we parse, so we define how to parse them. | ||
AffinityName *IPTablesValue `param:"--name"` | ||
AffinitySeconds *IPTablesValue `param:"--seconds"` | ||
AffinitySet *bool `param:"--set" negatable:"true"` | ||
AffinityReap *bool `param:"--reap"` | ||
StatisticMode *IPTablesValue `param:"--mode"` | ||
} | ||
|
||
// IPTablesValue is a value of a parameter in an Rule, where the parameter is | ||
// possibly negated. | ||
type IPTablesValue struct { | ||
Negated bool | ||
Value string | ||
} | ||
|
||
// for debugging; otherwise %v will just print the pointer value | ||
func (v *IPTablesValue) String() string { | ||
if v.Negated { | ||
return fmt.Sprintf("NOT %q", v.Value) | ||
} else { | ||
return fmt.Sprintf("%q", v.Value) | ||
} | ||
} | ||
|
||
// Matches returns true if cmp equals / doesn't equal v.Value (depending on | ||
// v.Negated). | ||
func (v *IPTablesValue) Matches(cmp string) bool { | ||
if v.Negated { | ||
return v.Value != cmp | ||
} else { | ||
return v.Value == cmp | ||
} | ||
} | ||
|
||
// findParamField finds a field in value with the struct tag "param:${param}" and if found, | ||
// returns a pointer to the Value of that field, and the value of its "negatable" tag. | ||
func findParamField(value reflect.Value, param string) (*reflect.Value, bool) { | ||
typ := value.Type() | ||
for i := 0; i < typ.NumField(); i++ { | ||
field := typ.Field(i) | ||
if field.Tag.Get("param") == param { | ||
fValue := value.Field(i) | ||
return &fValue, field.Tag.Get("negatable") == "true" | ||
} | ||
} | ||
return nil, false | ||
} | ||
|
||
// wordRegex matches a single word or a quoted string (at the start of the string, or | ||
// preceded by whitespace) | ||
var wordRegex = regexp.MustCompile(`(?:^|\s)("[^"]*"|[^"]\S*)`) | ||
|
||
// Used by ParseRule | ||
var boolPtrType = reflect.PtrTo(reflect.TypeOf(true)) | ||
var ipTablesValuePtrType = reflect.TypeOf((*IPTablesValue)(nil)) | ||
|
||
// ParseRule parses rule. If strict is false, it will parse the recognized | ||
// parameters and ignore unrecognized ones. If it is true, parsing will fail if there are | ||
// unrecognized parameters. | ||
func ParseRule(rule string, strict bool) (*Rule, error) { | ||
parsed := &Rule{Raw: rule} | ||
|
||
// Split rule into "words" (where a quoted string is a single word). | ||
var words []string | ||
for _, match := range wordRegex.FindAllStringSubmatch(rule, -1) { | ||
words = append(words, strings.Trim(match[1], `"`)) | ||
} | ||
|
||
// The chain name must come first (and can't be the only thing there) | ||
if len(words) < 2 || words[0] != "-A" { | ||
return nil, fmt.Errorf(`bad iptables rule (does not start with "-A CHAIN")`) | ||
} else if len(words) < 3 { | ||
return nil, fmt.Errorf("bad iptables rule (no match rules)") | ||
} | ||
|
||
// For each word, see if it is a known iptables parameter, based on the struct | ||
// field tags in Rule. Note that in the non-strict case we implicitly assume that | ||
// no unrecognized parameter will take an argument that could be mistaken for | ||
// another parameter. | ||
v := reflect.ValueOf(parsed).Elem() | ||
negated := false | ||
for w := 0; w < len(words); { | ||
if words[w] == "-m" && w < len(words)-1 { | ||
// Skip "-m MODULE"; we don't pay attention to that since the | ||
// parameter names are unique enough anyway. | ||
w += 2 | ||
continue | ||
} | ||
|
||
if words[w] == "!" { | ||
negated = true | ||
w++ | ||
continue | ||
} | ||
|
||
// For everything else, see if it corresponds to a field of Rule | ||
if field, negatable := findParamField(v, words[w]); field != nil { | ||
if negated && !negatable { | ||
return nil, fmt.Errorf("cannot negate parameter %q", words[w]) | ||
} | ||
if field.Type() != boolPtrType && w == len(words)-1 { | ||
return nil, fmt.Errorf("parameter %q requires an argument", words[w]) | ||
} | ||
switch field.Type() { | ||
case boolPtrType: | ||
boolVal := !negated | ||
field.Set(reflect.ValueOf(&boolVal)) | ||
w++ | ||
case ipTablesValuePtrType: | ||
field.Set(reflect.ValueOf(&IPTablesValue{Negated: negated, Value: words[w+1]})) | ||
w += 2 | ||
default: | ||
field.SetString(words[w+1]) | ||
w += 2 | ||
} | ||
} else if strict { | ||
return nil, fmt.Errorf("unrecognized parameter %q", words[w]) | ||
} else { | ||
// skip | ||
w++ | ||
} | ||
|
||
negated = false | ||
} | ||
|
||
return parsed, nil | ||
} |
Oops, something went wrong.