xref: /freebsd/tests/sys/netpfil/pf/utils.subr (revision ae07a5805b1906f29e786f415d67bef334557bd3)
1# Utility functions
2##
3# SPDX-License-Identifier: BSD-2-Clause
4#
5# Copyright (c) 2017 Kristof Provost <kp@FreeBSD.org>
6# Copyright (c) 2023 Kajetan Staszkiewicz <vegeta@tuxpowered.net>
7#
8# Redistribution and use in source and binary forms, with or without
9# modification, are permitted provided that the following conditions
10# are met:
11# 1. Redistributions of source code must retain the above copyright
12#    notice, this list of conditions and the following disclaimer.
13# 2. Redistributions in binary form must reproduce the above copyright
14#    notice, this list of conditions and the following disclaimer in the
15#    documentation and/or other materials provided with the distribution.
16#
17# THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
18# ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20# ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
21# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23# OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26# OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27# SUCH DAMAGE.
28
29. $(atf_get_srcdir)/../../common/vnet.subr
30common_dir=$(atf_get_srcdir)/../common
31
32pft_onerror()
33{
34	status=$?
35
36	echo "Debug log."
37	echo "=========="
38	echo "Test exit status: $?"
39	echo
40
41	if [ -f created_jails.lst ]; then
42		for jailname in `cat created_jails.lst`
43		do
44			echo "Jail ${jailname}"
45			echo "----------------"
46			jexec ${jailname} ifconfig
47			jexec ${jailname} netstat -rn
48			jexec ${jailname} pfctl -sa -v
49		done
50	fi
51
52	echo "Created interfaces:"
53	echo "-------------------"
54	cat created_interfaces.lst
55
56	echo "Host interfaces:"
57	echo "----------------"
58	ifconfig
59}
60
61pft_init()
62{
63	if [ "$1" == "debug" ]
64	then
65		trap pft_onerror EXIT
66	fi
67
68	vnet_init
69
70	if [ ! -c /dev/pf ]; then
71		atf_skip "This test requires pf"
72	fi
73}
74
75pfsynct_init()
76{
77	pft_init
78
79	if ! kldstat -q -m pfsync; then
80		atf_skip "This test requires pfsync"
81	fi
82}
83
84pflog_init()
85{
86	pft_init
87
88	if ! kldstat -q -m pflog; then
89		atf_skip "This test requires pflog"
90	fi
91}
92
93pflow_init()
94{
95	pft_init
96
97	if ! kldstat -q -m pflow; then
98		atf_skip "This test requires pflow"
99	fi
100}
101
102dummynet_init()
103{
104	pft_init
105
106	if ! kldstat -q -m dummynet; then
107		atf_skip "This test requires dummynet"
108	fi
109}
110
111pft_set_rules()
112{
113	jname=$1
114	shift
115
116	if [ $jname == "noflush" ];
117	then
118		jname=$1
119		shift
120	else
121		# Flush all states, rules, fragments, ...
122		jexec ${jname} pfctl -F all
123	fi
124
125	while [ $# -gt 0 ]; do
126		printf "$1\n"
127		shift
128	done | jexec ${jname} pfctl -f -
129	if [ $? -ne 0 ];
130	then
131		atf_fail "Failed to set PF rules in ${jname}"
132	fi
133}
134
135pft_cleanup()
136{
137	vnet_cleanup
138}
139
140pfsynct_cleanup()
141{
142	pft_cleanup
143}
144
145is_altq_supported()
146{
147	sysctl -q kern.features.altq >/dev/null || \
148	    atf_skip "Test requires ALTQ"
149
150	while [ -n "$1" ]
151	do
152		sysctl -q kern.features.altq.${1} >/dev/null || \
153		    atf_skip "Test required ALTQ_${1}"
154		shift
155	done
156}
157
158altq_init()
159{
160	pft_init
161	is_altq_supported
162}
163
164altq_cleanup()
165{
166	pft_cleanup
167}
168
169# Create a bare router jail.
170# This function lacks target configuration.
171setup_router_ipv4()
172{
173	pft_init
174
175	epair_tester=$(vnet_mkepair)
176	epair_server=$(vnet_mkepair)
177
178	net_tester=192.0.2.0/24
179	net_tester_mask=24
180	net_tester_host_router=192.0.2.1
181	net_tester_host_tester=192.0.2.2
182
183	net_server=198.51.100.0/24
184	net_server_mask=24
185	net_server_host_router=198.51.100.1
186	net_server_host_server=198.51.100.2
187
188	vnet_mkjail router ${epair_tester}b ${epair_server}a
189
190	ifconfig ${epair_tester}a ${net_tester_host_tester}/${net_tester_mask} up
191	route add -net ${net_server} ${net_tester_host_router}
192
193	jexec router ifconfig ${epair_tester}b ${net_tester_host_router}/${net_tester_mask} up
194	jexec router sysctl net.inet.ip.forwarding=1
195	jexec router ifconfig ${epair_server}a ${net_server_host_router}/${net_server_mask} up
196
197	jexec router pfctl -e
198}
199
200# Create a router jail.
201# The target for tests does not exist but a static ARP entry does
202# so packets to it can be properly routed.
203setup_router_dummy_ipv4()
204{
205	setup_router_ipv4
206	jexec router arp -s ${net_server_host_server} 00:01:02:03:04:05
207	ifconfig ${epair_server}b up
208}
209
210# Create a router and a server jail.
211# The server is capable of responding to pings from the tester.
212setup_router_server_ipv4()
213{
214	setup_router_ipv4
215	vnet_mkjail server ${epair_server}b
216	jexec server ifconfig ${epair_server}b ${net_server_host_server}/${net_server_mask} up
217	jexec server route add -net ${net_tester} ${net_server_host_router}
218	inetd_conf=$(mktemp)
219	echo "discard stream tcp nowait root internal" > $inetd_conf
220	jexec server inetd -p ${PWD}/inetd.pid $inetd_conf
221}
222
223# Create a bare router jail.
224# This function lacks target configuration.
225setup_router_ipv6()
226{
227	pft_init
228
229	epair_tester=$(vnet_mkepair)
230	epair_server=$(vnet_mkepair)
231
232	net_tester=2001:db8:42::/64
233	net_tester_mask=64
234	net_tester_host_router=2001:db8:42::1
235	net_tester_host_tester=2001:db8:42::2
236
237	net_server=2001:db8:43::/64
238	net_server_mask=64
239	net_server_host_router=2001:db8:43::1
240	net_server_host_server=2001:db8:43::2
241
242	vnet_mkjail router ${epair_tester}b ${epair_server}a
243
244	ifconfig ${epair_tester}a inet6 ${net_tester_host_tester}/${net_tester_mask}up no_dad
245	route add -6 ${net_server} ${net_tester_host_router}
246
247	jexec router ifconfig ${epair_tester}b inet6 ${net_tester_host_router}/${net_tester_mask} up no_dad
248	jexec router sysctl net.inet6.ip6.forwarding=1
249	jexec router ifconfig ${epair_server}a inet6 ${net_server_host_router}/${net_server_mask} up no_dad
250
251	jexec router pfctl -e
252}
253
254# Create a router jail.
255# The target for tests does not exist but a static NDP entry does
256# so packets to it can be properly routed.
257setup_router_dummy_ipv6()
258{
259	setup_router_ipv6
260	jexec router ndp -s ${net_server_host_server} 00:01:02:03:04:05
261	ifconfig ${epair_server}b up
262}
263
264# Create a router and a server jail.
265# The server is capable of responding to pings from tester.
266setup_router_server_ipv6()
267{
268	setup_router_ipv6
269	vnet_mkjail server ${epair_server}b
270	jexec server ifconfig ${epair_server}b inet6 ${net_server_host_server}/${net_server_mask} up no_dad
271	jexec server route add -6 ${net_tester} ${net_server_host_router}
272	inetd_conf=$(mktemp)
273	echo "discard stream tcp6 nowait root internal" > $inetd_conf
274	jexec server inetd -p ${PWD}/inetd.pid $inetd_conf
275}
276
277# Create a router and 2 server jails for nat64 and rfc5549 test cases.
278# The router is connected to servers, both are dual-stack, and to the
279# tester jail. All links are dual stack.
280setup_router_server_nat64()
281{
282	pft_init
283
284	epair_tester=$(vnet_mkepair)
285	epair_server1=$(vnet_mkepair)
286	epair_server2=$(vnet_mkepair)
287
288	# Funny how IPv4 address space is to small to even assign nice /24
289	# prefixes on all needed networks. On IPv6 we have a separate /64 for
290	# each link, loopback server, and client/SNAT pool. On IPv4 we must
291	# use small /28 prefixes, so even though we define all networks
292	# as variables we can't easily use them in tests if additional addresses
293	# are needed.
294
295	# IP addresses which can be used by the tester jail.
296	# Can be used as SNAT or as source with pft_ping.py. It is up to
297	# the test code to make them accessible from router.
298	net_clients_4=203.0.113
299	net_clients_4_mask=24
300	net_clients_6=2001:db8:44
301	net_clients_6_mask=64
302
303	# IP addresses on loopback interfaces of both servers. They can be
304	# accessed using the route-to targtet.
305	host_server_4=192.0.2.100
306	host_server_6=2001:db8:4203::100
307
308	net_tester_4=198.51.100
309	net_tester_4_mask=28
310	net_tester_4_host_router=198.51.100.1
311	net_tester_4_host_tester=198.51.100.2
312
313	net_tester_6=2001:db8:4200
314	net_tester_6_mask=64
315	net_tester_6_host_router=2001:db8:4200::1
316	net_tester_6_host_tester=2001:db8:4200::2
317
318	net_server1_4=198.51.100
319	net_server1_4_mask=28
320	net_server1_4_host_router=198.51.100.17
321	net_server1_4_host_server=198.51.100.18
322
323	net_server1_6=2001:db8:4201
324	net_server1_6_mask=64
325	net_server1_6_host_router=2001:db8:4201::1
326	net_server1_6_host_server=2001:db8:4201::2
327
328	net_server2_4=198.51.100
329	net_server2_4_mask=28
330	net_server2_4_host_router=198.51.100.33
331	net_server2_4_host_server=198.51.100.34
332
333	net_server2_6=2001:db8:4202
334	net_server2_6_mask=64
335	net_server2_6_host_router=2001:db8:4202::1
336	net_server2_6_host_server=2001:db8:4202::2
337
338	vnet_mkjail router ${epair_tester}b ${epair_server1}a ${epair_server2}a
339	jexec router ifconfig ${epair_tester}b inet  ${net_tester_4_host_router}/${net_tester_4_mask} up
340	jexec router ifconfig ${epair_tester}b inet6 ${net_tester_6_host_router}/${net_tester_6_mask} up no_dad
341	jexec router ifconfig ${epair_server1}a inet  ${net_server1_4_host_router}/${net_server1_4_mask} up
342	jexec router ifconfig ${epair_server1}a inet6 ${net_server1_6_host_router}/${net_server1_6_mask} up no_dad
343	jexec router ifconfig ${epair_server2}a inet  ${net_server2_4_host_router}/${net_server2_4_mask} up
344	jexec router ifconfig ${epair_server2}a inet6 ${net_server2_6_host_router}/${net_server2_6_mask} up no_dad
345	jexec router sysctl net.inet.ip.forwarding=1
346	jexec router sysctl net.inet6.ip6.forwarding=1
347	jexec router pfctl -e
348
349	ifconfig ${epair_tester}a inet  ${net_tester_4_host_tester}/${net_tester_4_mask} up
350	ifconfig ${epair_tester}a inet6 ${net_tester_6_host_tester}/${net_tester_6_mask} up no_dad
351	route add    0.0.0.0/0 ${net_tester_4_host_router}
352	route add -6 ::/0      ${net_tester_6_host_router}
353
354	inetd_conf=$(mktemp)
355	echo "discard stream tcp46 nowait root internal" >> $inetd_conf
356
357	vnet_mkjail server1 ${epair_server1}b
358	jexec server1 /etc/rc.d/netif start lo0
359	jexec server1 ifconfig ${epair_server1}b inet  ${net_server1_4_host_server}/${net_server1_4_mask} up
360	jexec server1 ifconfig ${epair_server1}b inet6 ${net_server1_6_host_server}/${net_server1_6_mask} up no_dad
361	jexec server1 ifconfig lo0                     ${host_server_4}/32  alias
362	jexec server1 ifconfig lo0               inet6 ${host_server_6}/128 alias
363	jexec server1 inetd -p ${PWD}/inetd_1.pid $inetd_conf
364	jexec server1 route add    0.0.0.0/0 ${net_server1_4_host_router}
365
366	jexec server1 route add -6 ::/0      ${net_server1_6_host_router}
367	vnet_mkjail server2 ${epair_server2}b
368	jexec server2 /etc/rc.d/netif start lo0
369	jexec server2 ifconfig ${epair_server2}b inet  ${net_server2_4_host_server}/${net_server2_4_mask} up
370	jexec server2 ifconfig ${epair_server2}b inet6 ${net_server2_6_host_server}/${net_server2_6_mask} up no_dad
371	jexec server2 ifconfig lo0                     ${host_server_4}/32  alias
372	jexec server2 ifconfig lo0               inet6 ${host_server_6}/128 alias
373	jexec server2 inetd -p ${PWD}/inetd_2.pid $inetd_conf
374	jexec server2 route add    0.0.0.0/0 ${net_server2_4_host_router}
375	jexec server2 route add -6 ::/0      ${net_server2_6_host_router}
376}
377
378# Ping the dummy static NDP target.
379# Check for pings being forwarded through the router towards the target.
380ping_dummy_check_request()
381{
382	exit_condition=$1
383	shift
384	params=$@
385	atf_check -s ${exit_condition} ${common_dir}/pft_ping.py \
386	    --sendif ${epair_tester}a \
387	    --to ${net_server_host_server} \
388	    --recvif ${epair_server}b \
389	$params
390}
391
392# Ping the server jail.
393# Check for responses coming back throught the router back to the tester.
394ping_server_check_reply()
395{
396	exit_condition=$1
397	shift
398	params=$@
399	atf_check -s ${exit_condition} ${common_dir}/pft_ping.py \
400	    --sendif ${epair_tester}a \
401	    --to ${net_server_host_server} \
402	    --replyif ${epair_tester}a \
403	$params
404}
405
406normalize_pfctl_s()
407{
408	# `pfctl -s[rsS]` output is divided into sections. Each rule, state or
409	# source node starts with the beginning of a line and next lines with leading
410	# spaces are various parameters of said rule, state or source node.
411	# Convert it into a single line per entry, and remove multiple spaces,
412	# so that regular expressions for matching them in tests can be simpler.
413	awk '{ if ($0 ~ /^[^ ]/ && NR > 1) print(""); gsub(/ +/, " ", $0); printf("%s", $0); } END {print("");}'
414}
415