github.com/daaku/docker@v1.5.0/pkg/iptables/iptables.go (about)

     1  package iptables
     2  
     3  import (
     4  	"errors"
     5  	"fmt"
     6  	"net"
     7  	"os/exec"
     8  	"regexp"
     9  	"strconv"
    10  	"strings"
    11  
    12  	log "github.com/Sirupsen/logrus"
    13  )
    14  
    15  type Action string
    16  type Table string
    17  
    18  const (
    19  	Append Action = "-A"
    20  	Delete Action = "-D"
    21  	Insert Action = "-I"
    22  	Nat    Table  = "nat"
    23  	Filter Table  = "filter"
    24  )
    25  
    26  var (
    27  	iptablesPath        string
    28  	supportsXlock       = false
    29  	ErrIptablesNotFound = errors.New("Iptables not found")
    30  )
    31  
    32  type Chain struct {
    33  	Name   string
    34  	Bridge string
    35  	Table  Table
    36  }
    37  
    38  type ChainError struct {
    39  	Chain  string
    40  	Output []byte
    41  }
    42  
    43  func (e *ChainError) Error() string {
    44  	return fmt.Sprintf("Error iptables %s: %s", e.Chain, string(e.Output))
    45  }
    46  
    47  func initCheck() error {
    48  
    49  	if iptablesPath == "" {
    50  		path, err := exec.LookPath("iptables")
    51  		if err != nil {
    52  			return ErrIptablesNotFound
    53  		}
    54  		iptablesPath = path
    55  		supportsXlock = exec.Command(iptablesPath, "--wait", "-L", "-n").Run() == nil
    56  	}
    57  	return nil
    58  }
    59  
    60  func NewChain(name, bridge string, table Table) (*Chain, error) {
    61  	c := &Chain{
    62  		Name:   name,
    63  		Bridge: bridge,
    64  		Table:  table,
    65  	}
    66  
    67  	if string(c.Table) == "" {
    68  		c.Table = Filter
    69  	}
    70  
    71  	// Add chain if it doesn't exist
    72  	if _, err := Raw("-t", string(c.Table), "-n", "-L", c.Name); err != nil {
    73  		if output, err := Raw("-t", string(c.Table), "-N", c.Name); err != nil {
    74  			return nil, err
    75  		} else if len(output) != 0 {
    76  			return nil, fmt.Errorf("Could not create %s/%s chain: %s", c.Table, c.Name, output)
    77  		}
    78  	}
    79  
    80  	switch table {
    81  	case Nat:
    82  		preroute := []string{
    83  			"-m", "addrtype",
    84  			"--dst-type", "LOCAL"}
    85  		if !Exists(preroute...) {
    86  			if err := c.Prerouting(Append, preroute...); err != nil {
    87  				return nil, fmt.Errorf("Failed to inject docker in PREROUTING chain: %s", err)
    88  			}
    89  		}
    90  		output := []string{
    91  			"-m", "addrtype",
    92  			"--dst-type", "LOCAL",
    93  			"!", "--dst", "127.0.0.0/8"}
    94  		if !Exists(output...) {
    95  			if err := c.Output(Append, output...); err != nil {
    96  				return nil, fmt.Errorf("Failed to inject docker in OUTPUT chain: %s", err)
    97  			}
    98  		}
    99  	case Filter:
   100  		link := []string{"FORWARD",
   101  			"-o", c.Bridge,
   102  			"-j", c.Name}
   103  		if !Exists(link...) {
   104  			insert := append([]string{string(Insert)}, link...)
   105  			if output, err := Raw(insert...); err != nil {
   106  				return nil, err
   107  			} else if len(output) != 0 {
   108  				return nil, fmt.Errorf("Could not create linking rule to %s/%s: %s", c.Table, c.Name, output)
   109  			}
   110  		}
   111  	}
   112  	return c, nil
   113  }
   114  
   115  func RemoveExistingChain(name string, table Table) error {
   116  	c := &Chain{
   117  		Name:  name,
   118  		Table: table,
   119  	}
   120  	if string(c.Table) == "" {
   121  		c.Table = Filter
   122  	}
   123  	return c.Remove()
   124  }
   125  
   126  // Add forwarding rule to 'filter' table and corresponding nat rule to 'nat' table
   127  func (c *Chain) Forward(action Action, ip net.IP, port int, proto, destAddr string, destPort int) error {
   128  	daddr := ip.String()
   129  	if ip.IsUnspecified() {
   130  		// iptables interprets "0.0.0.0" as "0.0.0.0/32", whereas we
   131  		// want "0.0.0.0/0". "0/0" is correctly interpreted as "any
   132  		// value" by both iptables and ip6tables.
   133  		daddr = "0/0"
   134  	}
   135  	if output, err := Raw("-t", string(Nat), string(action), c.Name,
   136  		"-p", proto,
   137  		"-d", daddr,
   138  		"--dport", strconv.Itoa(port),
   139  		"!", "-i", c.Bridge,
   140  		"-j", "DNAT",
   141  		"--to-destination", net.JoinHostPort(destAddr, strconv.Itoa(destPort))); err != nil {
   142  		return err
   143  	} else if len(output) != 0 {
   144  		return &ChainError{Chain: "FORWARD", Output: output}
   145  	}
   146  
   147  	if output, err := Raw("-t", string(Filter), string(action), c.Name,
   148  		"!", "-i", c.Bridge,
   149  		"-o", c.Bridge,
   150  		"-p", proto,
   151  		"-d", destAddr,
   152  		"--dport", strconv.Itoa(destPort),
   153  		"-j", "ACCEPT"); err != nil {
   154  		return err
   155  	} else if len(output) != 0 {
   156  		return &ChainError{Chain: "FORWARD", Output: output}
   157  	}
   158  
   159  	if output, err := Raw("-t", string(Nat), string(action), "POSTROUTING",
   160  		"-p", proto,
   161  		"-s", destAddr,
   162  		"-d", destAddr,
   163  		"--dport", strconv.Itoa(destPort),
   164  		"-j", "MASQUERADE"); err != nil {
   165  		return err
   166  	} else if len(output) != 0 {
   167  		return &ChainError{Chain: "FORWARD", Output: output}
   168  	}
   169  
   170  	return nil
   171  }
   172  
   173  // Add reciprocal ACCEPT rule for two supplied IP addresses.
   174  // Traffic is allowed from ip1 to ip2 and vice-versa
   175  func (c *Chain) Link(action Action, ip1, ip2 net.IP, port int, proto string) error {
   176  	if output, err := Raw("-t", string(Filter), string(action), c.Name,
   177  		"-i", c.Bridge, "-o", c.Bridge,
   178  		"-p", proto,
   179  		"-s", ip1.String(),
   180  		"-d", ip2.String(),
   181  		"--dport", strconv.Itoa(port),
   182  		"-j", "ACCEPT"); err != nil {
   183  		return err
   184  	} else if len(output) != 0 {
   185  		return fmt.Errorf("Error iptables forward: %s", output)
   186  	}
   187  	if output, err := Raw("-t", string(Filter), string(action), c.Name,
   188  		"-i", c.Bridge, "-o", c.Bridge,
   189  		"-p", proto,
   190  		"-s", ip2.String(),
   191  		"-d", ip1.String(),
   192  		"--sport", strconv.Itoa(port),
   193  		"-j", "ACCEPT"); err != nil {
   194  		return err
   195  	} else if len(output) != 0 {
   196  		return fmt.Errorf("Error iptables forward: %s", output)
   197  	}
   198  	return nil
   199  }
   200  
   201  // Add linking rule to nat/PREROUTING chain.
   202  func (c *Chain) Prerouting(action Action, args ...string) error {
   203  	a := []string{"-t", string(Nat), string(action), "PREROUTING"}
   204  	if len(args) > 0 {
   205  		a = append(a, args...)
   206  	}
   207  	if output, err := Raw(append(a, "-j", c.Name)...); err != nil {
   208  		return err
   209  	} else if len(output) != 0 {
   210  		return &ChainError{Chain: "PREROUTING", Output: output}
   211  	}
   212  	return nil
   213  }
   214  
   215  // Add linking rule to an OUTPUT chain
   216  func (c *Chain) Output(action Action, args ...string) error {
   217  	a := []string{"-t", string(c.Table), string(action), "OUTPUT"}
   218  	if len(args) > 0 {
   219  		a = append(a, args...)
   220  	}
   221  	if output, err := Raw(append(a, "-j", c.Name)...); err != nil {
   222  		return err
   223  	} else if len(output) != 0 {
   224  		return &ChainError{Chain: "OUTPUT", Output: output}
   225  	}
   226  	return nil
   227  }
   228  
   229  func (c *Chain) Remove() error {
   230  	// Ignore errors - This could mean the chains were never set up
   231  	if c.Table == Nat {
   232  		c.Prerouting(Delete, "-m", "addrtype", "--dst-type", "LOCAL")
   233  		c.Output(Delete, "-m", "addrtype", "--dst-type", "LOCAL", "!", "--dst", "127.0.0.0/8")
   234  		c.Output(Delete, "-m", "addrtype", "--dst-type", "LOCAL") // Created in versions <= 0.1.6
   235  
   236  		c.Prerouting(Delete)
   237  		c.Output(Delete)
   238  	}
   239  	Raw("-t", string(c.Table), "-F", c.Name)
   240  	Raw("-t", string(c.Table), "-X", c.Name)
   241  	return nil
   242  }
   243  
   244  // Check if a rule exists
   245  func Exists(args ...string) bool {
   246  	// iptables -C, --check option was added in v.1.4.11
   247  	// http://ftp.netfilter.org/pub/iptables/changes-iptables-1.4.11.txt
   248  
   249  	// try -C
   250  	// if exit status is 0 then return true, the rule exists
   251  	if _, err := Raw(append([]string{"-C"}, args...)...); err == nil {
   252  		return true
   253  	}
   254  
   255  	// parse iptables-save for the rule
   256  	rule := strings.Replace(strings.Join(args, " "), "-t nat ", "", -1)
   257  	existingRules, _ := exec.Command("iptables-save").Output()
   258  
   259  	// regex to replace ips in rule
   260  	// because MASQUERADE rule will not be exactly what was passed
   261  	re := regexp.MustCompile(`[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\/[0-9]{1,2}`)
   262  
   263  	return strings.Contains(
   264  		re.ReplaceAllString(string(existingRules), "?"),
   265  		re.ReplaceAllString(rule, "?"),
   266  	)
   267  }
   268  
   269  // Call 'iptables' system command, passing supplied arguments
   270  func Raw(args ...string) ([]byte, error) {
   271  
   272  	if err := initCheck(); err != nil {
   273  		return nil, err
   274  	}
   275  	if supportsXlock {
   276  		args = append([]string{"--wait"}, args...)
   277  	}
   278  
   279  	log.Debugf("%s, %v", iptablesPath, args)
   280  
   281  	output, err := exec.Command(iptablesPath, args...).CombinedOutput()
   282  	if err != nil {
   283  		return nil, fmt.Errorf("iptables failed: iptables %v: %s (%s)", strings.Join(args, " "), output, err)
   284  	}
   285  
   286  	// ignore iptables' message about xtables lock
   287  	if strings.Contains(string(output), "waiting for it to exit") {
   288  		output = []byte("")
   289  	}
   290  
   291  	return output, err
   292  }