IPSet支持IPv6

This commit is contained in:
刘祥超
2022-03-16 20:47:55 +08:00
parent 469a3ea979
commit 14abce08c3
2 changed files with 141 additions and 65 deletions

View File

@@ -62,29 +62,39 @@ func (this *IPSetAction) Init(config *firewallconfigs.FirewallActionConfig) erro
if err != nil { if err != nil {
return err return err
} }
{
cmd := exec.Command(path, "create", this.config.WhiteName, "hash:ip", "timeout", "0", "maxelem", "1000000") // ipv4
stderr := bytes.NewBuffer([]byte{}) for _, listName := range []string{this.config.WhiteName, this.config.BlackName} {
if len(listName) == 0 {
continue
}
var cmd = exec.Command(path, "create", listName, "hash:ip", "timeout", "0", "maxelem", "1000000")
var stderr = bytes.NewBuffer([]byte{})
cmd.Stderr = stderr cmd.Stderr = stderr
err := cmd.Run() err := cmd.Run()
if err != nil { if err != nil {
output := stderr.Bytes() var output = stderr.Bytes()
if !bytes.Contains(output, []byte("already exists")) { if !bytes.Contains(output, []byte("already exists")) {
return errors.New("create ipset '" + this.config.WhiteName + "': " + err.Error() + ", output: " + string(output)) return errors.New("create ipset '" + listName + "': " + err.Error() + ", output: " + string(output))
} else { } else {
err = nil err = nil
} }
} }
} }
{
cmd := exec.Command(path, "create", this.config.BlackName, "hash:ip", "timeout", "0", "maxelem", "1000000") // ipv6
stderr := bytes.NewBuffer([]byte{}) for _, listName := range []string{this.config.WhiteNameIPv6, this.config.BlackNameIPv6} {
if len(listName) == 0 {
continue
}
var cmd = exec.Command(path, "create", listName, "hash:ip", "family", "inet6", "timeout", "0", "maxelem", "1000000")
var stderr = bytes.NewBuffer([]byte{})
cmd.Stderr = stderr cmd.Stderr = stderr
err := cmd.Run() err := cmd.Run()
if err != nil { if err != nil {
output := stderr.Bytes() var output = stderr.Bytes()
if !bytes.Contains(output, []byte("already exists")) { if !bytes.Contains(output, []byte("already exists")) {
return errors.New("create ipset '" + this.config.BlackName + "': " + err.Error() + ", output: " + string(output)) return errors.New("create ipset '" + listName + "': " + err.Error() + ", output: " + string(output))
} else { } else {
err = nil err = nil
} }
@@ -99,8 +109,12 @@ func (this *IPSetAction) Init(config *firewallconfigs.FirewallActionConfig) erro
return err return err
} }
{ // ipv4
cmd := exec.Command(path, "--permanent", "--new-ipset="+this.config.WhiteName, "--type=hash:ip", "--option=timeout=0", "--option=maxelem=1000000") for _, listName := range []string{this.config.WhiteName, this.config.BlackName} {
if len(listName) == 0 {
continue
}
cmd := exec.Command(path, "--permanent", "--new-ipset="+listName, "--type=hash:ip", "--option=timeout=0", "--option=maxelem=1000000")
stderr := bytes.NewBuffer([]byte{}) stderr := bytes.NewBuffer([]byte{})
cmd.Stderr = stderr cmd.Stderr = stderr
err := cmd.Run() err := cmd.Run()
@@ -109,45 +123,57 @@ func (this *IPSetAction) Init(config *firewallconfigs.FirewallActionConfig) erro
if bytes.Contains(output, []byte("NAME_CONFLICT")) { if bytes.Contains(output, []byte("NAME_CONFLICT")) {
err = nil err = nil
} else { } else {
return errors.New("firewall-cmd add ipset '" + this.config.WhiteName + "': " + err.Error() + ", output: " + string(output)) return errors.New("firewall-cmd add ipset '" + listName + "': " + err.Error() + ", output: " + string(output))
} }
} }
} }
{ // ipv6
cmd := exec.Command(path, "--permanent", "--add-rich-rule=rule source ipset='"+this.config.WhiteName+"' accept") for _, listName := range []string{this.config.WhiteNameIPv6, this.config.BlackNameIPv6} {
stderr := bytes.NewBuffer([]byte{}) if len(listName) == 0 {
cmd.Stderr = stderr continue
err := cmd.Run()
if err != nil {
output := stderr.Bytes()
return errors.New("firewall-cmd add rich rule '" + this.config.WhiteName + "': " + err.Error() + ", output: " + string(output))
} }
} cmd := exec.Command(path, "--permanent", "--new-ipset="+listName, "--type=hash:ip", "--option=family=inet6", "--option=timeout=0", "--option=maxelem=1000000")
{
cmd := exec.Command(path, "--permanent", "--new-ipset="+this.config.BlackName, "--type=hash:ip", "--option=timeout=0", "--option=maxelem=1000000")
stderr := bytes.NewBuffer([]byte{}) stderr := bytes.NewBuffer([]byte{})
cmd.Stderr = stderr cmd.Stderr = stderr
err := cmd.Run() err := cmd.Run()
if err != nil { if err != nil {
output := stderr.Bytes() var output = stderr.Bytes()
if bytes.Contains(output, []byte("NAME_CONFLICT")) { if bytes.Contains(output, []byte("NAME_CONFLICT")) {
err = nil err = nil
} else { } else {
return errors.New("firewall-cmd add ipset '" + this.config.BlackName + "': " + err.Error() + ", output: " + string(output)) return errors.New("firewall-cmd add ipset '" + listName + "': " + err.Error() + ", output: " + string(output))
} }
} }
} }
{ // accept
cmd := exec.Command(path, "--permanent", "--add-rich-rule=rule source ipset='"+this.config.BlackName+"' reject") for _, listName := range []string{this.config.WhiteName, this.config.WhiteNameIPv6} {
stderr := bytes.NewBuffer([]byte{}) if len(listName) == 0 {
continue
}
var cmd = exec.Command(path, "--permanent", "--add-rich-rule=rule source ipset='"+listName+"' accept")
var stderr = bytes.NewBuffer([]byte{})
cmd.Stderr = stderr cmd.Stderr = stderr
err := cmd.Run() err := cmd.Run()
if err != nil { if err != nil {
output := stderr.Bytes() var output = stderr.Bytes()
return errors.New("firewall-cmd add rich rule '" + this.config.WhiteName + "': " + err.Error() + ", output: " + string(output)) return errors.New("firewall-cmd add rich rule '" + listName + "': " + err.Error() + ", output: " + string(output))
}
}
// reject
for _, listName := range []string{this.config.BlackName, this.config.BlackNameIPv6} {
if len(listName) == 0 {
continue
}
var cmd = exec.Command(path, "--permanent", "--add-rich-rule=rule source ipset='"+listName+"' reject")
var stderr = bytes.NewBuffer([]byte{})
cmd.Stderr = stderr
err := cmd.Run()
if err != nil {
var output = stderr.Bytes()
return errors.New("firewall-cmd add rich rule '" + listName + "': " + err.Error() + ", output: " + string(output))
} }
} }
@@ -158,7 +184,7 @@ func (this *IPSetAction) Init(config *firewallconfigs.FirewallActionConfig) erro
cmd.Stderr = stderr cmd.Stderr = stderr
err := cmd.Run() err := cmd.Run()
if err != nil { if err != nil {
output := stderr.Bytes() var output = stderr.Bytes()
return errors.New("firewall-cmd reload: " + err.Error() + ", output: " + string(output)) return errors.New("firewall-cmd reload: " + err.Error() + ", output: " + string(output))
} }
} }
@@ -171,38 +197,48 @@ func (this *IPSetAction) Init(config *firewallconfigs.FirewallActionConfig) erro
return err return err
} }
{ // accept
for _, listName := range []string{this.config.WhiteName, this.config.WhiteNameIPv6} {
if len(listName) == 0 {
continue
}
// 检查规则是否存在 // 检查规则是否存在
var cmd = exec.Command(path, "-C", "INPUT", "-m", "set", "--match-set", this.config.WhiteName, "src", "-j", "ACCEPT") var cmd = exec.Command(path, "-C", "INPUT", "-m", "set", "--match-set", listName, "src", "-j", "ACCEPT")
err := cmd.Run() err := cmd.Run()
var exists = err == nil var exists = err == nil
// 添加规则 // 添加规则
if !exists { if !exists {
var cmd = exec.Command(path, "-A", "INPUT", "-m", "set", "--match-set", this.config.WhiteName, "src", "-j", "ACCEPT") var cmd = exec.Command(path, "-A", "INPUT", "-m", "set", "--match-set", listName, "src", "-j", "ACCEPT")
stderr := bytes.NewBuffer([]byte{}) var stderr = bytes.NewBuffer([]byte{})
cmd.Stderr = stderr cmd.Stderr = stderr
err := cmd.Run() err := cmd.Run()
if err != nil { if err != nil {
output := stderr.Bytes() var output = stderr.Bytes()
return errors.New("iptables add rule: " + err.Error() + ", output: " + string(output)) return errors.New("iptables add rule: " + err.Error() + ", output: " + string(output))
} }
} }
} }
{ // reject
for _, listName := range []string{this.config.BlackName, this.config.BlackNameIPv6} {
if len(listName) == 0 {
continue
}
// 检查规则是否存在 // 检查规则是否存在
var cmd = exec.Command(path, "-C", "INPUT", "-m", "set", "--match-set", this.config.BlackName, "src", "-j", "REJECT") var cmd = exec.Command(path, "-C", "INPUT", "-m", "set", "--match-set", listName, "src", "-j", "REJECT")
err := cmd.Run() err := cmd.Run()
var exists = err == nil var exists = err == nil
if !exists { if !exists {
var cmd = exec.Command(path, "-A", "INPUT", "-m", "set", "--match-set", this.config.BlackName, "src", "-j", "REJECT") var cmd = exec.Command(path, "-A", "INPUT", "-m", "set", "--match-set", listName, "src", "-j", "REJECT")
stderr := bytes.NewBuffer([]byte{}) var stderr = bytes.NewBuffer([]byte{})
cmd.Stderr = stderr cmd.Stderr = stderr
err := cmd.Run() err := cmd.Run()
if err != nil { if err != nil {
output := stderr.Bytes() var output = stderr.Bytes()
return errors.New("iptables add rule: " + err.Error() + ", output: " + string(output)) return errors.New("iptables add rule: " + err.Error() + ", output: " + string(output))
} }
} }
@@ -236,7 +272,7 @@ func (this *IPSetAction) runAction(action string, listType IPListType, item *pb.
return nil return nil
} }
for _, cidr := range cidrList { for _, cidr := range cidrList {
index := strings.Index(cidr, "/") var index = strings.Index(cidr, "/")
if index <= 0 { if index <= 0 {
continue continue
} }
@@ -256,26 +292,40 @@ func (this *IPSetAction) runAction(action string, listType IPListType, item *pb.
return nil return nil
} }
func (this *IPSetAction) SetConfig(config *firewallconfigs.FirewallActionIPSetConfig) {
this.config = config
}
func (this *IPSetAction) runActionSingleIP(action string, listType IPListType, item *pb.IPItem) error { func (this *IPSetAction) runActionSingleIP(action string, listType IPListType, item *pb.IPItem) error {
if item.Type == "all" { if item.Type == "all" {
return nil return nil
} }
listName := "" var listName = ""
var isIPv6 = strings.Contains(item.IpFrom, ":")
switch listType { switch listType {
case IPListTypeWhite: case IPListTypeWhite:
listName = this.config.WhiteName if isIPv6 {
listName = this.config.WhiteNameIPv6
} else {
listName = this.config.WhiteName
}
case IPListTypeBlack: case IPListTypeBlack:
listName = this.config.BlackName if isIPv6 {
listName = this.config.BlackNameIPv6
} else {
listName = this.config.BlackName
}
default: default:
// 不支持的类型 // 不支持的类型
return nil return nil
} }
if len(listName) == 0 { if len(listName) == 0 {
return errors.New("empty list name for '" + listType + "'") return nil
} }
path := this.config.Path var path = this.config.Path
var err error var err error
if len(path) == 0 { if len(path) == 0 {
path, err = exec.LookPath("ipset") path, err = exec.LookPath("ipset")
@@ -290,7 +340,7 @@ func (this *IPSetAction) runActionSingleIP(action string, listType IPListType, i
} }
// ipset add edge_ip_list 192.168.2.32 timeout 30 // ipset add edge_ip_list 192.168.2.32 timeout 30
args := []string{} var args = []string{}
switch action { switch action {
case "addItem": case "addItem":
args = append(args, "add") args = append(args, "add")
@@ -300,7 +350,7 @@ func (this *IPSetAction) runActionSingleIP(action string, listType IPListType, i
args = append(args, listName, item.IpFrom) args = append(args, listName, item.IpFrom)
if action == "addItem" { if action == "addItem" {
timestamp := time.Now().Unix() var timestamp = time.Now().Unix()
if item.ExpiredAt > timestamp { if item.ExpiredAt > timestamp {
args = append(args, "timeout", strconv.FormatInt(item.ExpiredAt-timestamp, 10)) args = append(args, "timeout", strconv.FormatInt(item.ExpiredAt-timestamp, 10))
} }
@@ -312,7 +362,7 @@ func (this *IPSetAction) runActionSingleIP(action string, listType IPListType, i
} }
this.errorBuf.Reset() this.errorBuf.Reset()
cmd := exec.Command(path, args...) var cmd = exec.Command(path, args...)
cmd.Stderr = this.errorBuf cmd.Stderr = this.errorBuf
err = cmd.Run() err = cmd.Run()
if err != nil { if err != nil {

View File

@@ -1,15 +1,16 @@
package iplibrary package iplibrary_test
import ( import (
"github.com/TeaOSLab/EdgeCommon/pkg/rpc/pb" "github.com/TeaOSLab/EdgeCommon/pkg/rpc/pb"
"github.com/TeaOSLab/EdgeCommon/pkg/serverconfigs/firewallconfigs" "github.com/TeaOSLab/EdgeCommon/pkg/serverconfigs/firewallconfigs"
"github.com/TeaOSLab/EdgeNode/internal/iplibrary"
"github.com/iwind/TeaGo/maps" "github.com/iwind/TeaGo/maps"
"testing" "testing"
"time" "time"
) )
func TestIPSetAction_Init(t *testing.T) { func TestIPSetAction_Init(t *testing.T) {
action := NewIPSetAction() action := iplibrary.NewIPSetAction()
err := action.Init(&firewallconfigs.FirewallActionConfig{ err := action.Init(&firewallconfigs.FirewallActionConfig{
Params: maps.Map{ Params: maps.Map{
"path": "/usr/bin/iptables", "path": "/usr/bin/iptables",
@@ -24,14 +25,16 @@ func TestIPSetAction_Init(t *testing.T) {
} }
func TestIPSetAction_AddItem(t *testing.T) { func TestIPSetAction_AddItem(t *testing.T) {
action := NewIPSetAction() var action = iplibrary.NewIPSetAction()
action.config = &firewallconfigs.FirewallActionIPSetConfig{ action.SetConfig(&firewallconfigs.FirewallActionIPSetConfig{
Path: "/usr/bin/iptables", Path: "/usr/bin/iptables",
WhiteName: "white-list", WhiteName: "white-list",
BlackName: "black-list", BlackName: "black-list",
} WhiteNameIPv6: "white-list-ipv6",
BlackNameIPv6: "black-list-ipv6",
})
{ {
err := action.AddItem(IPListTypeWhite, &pb.IPItem{ err := action.AddItem(iplibrary.IPListTypeWhite, &pb.IPItem{
Type: "ipv4", Type: "ipv4",
Id: 1, Id: 1,
IpFrom: "192.168.1.100", IpFrom: "192.168.1.100",
@@ -42,9 +45,20 @@ func TestIPSetAction_AddItem(t *testing.T) {
} }
t.Log("ok") t.Log("ok")
} }
{ {
err := action.AddItem(IPListTypeBlack, &pb.IPItem{ err := action.AddItem(iplibrary.IPListTypeWhite, &pb.IPItem{
Type: "ipv4",
Id: 1,
IpFrom: "1:2:3:4",
ExpiredAt: time.Now().Unix() + 30,
})
if err != nil {
t.Fatal(err)
}
t.Log("ok")
}
{
err := action.AddItem(iplibrary.IPListTypeBlack, &pb.IPItem{
Type: "ipv4", Type: "ipv4",
Id: 1, Id: 1,
IpFrom: "192.168.1.100", IpFrom: "192.168.1.100",
@@ -55,10 +69,22 @@ func TestIPSetAction_AddItem(t *testing.T) {
} }
t.Log("ok") t.Log("ok")
} }
{
err := action.AddItem(iplibrary.IPListTypeBlack, &pb.IPItem{
Type: "ipv4",
Id: 1,
IpFrom: "1:2:3:4",
ExpiredAt: time.Now().Unix() + 30,
})
if err != nil {
t.Fatal(err)
}
t.Log("ok")
}
} }
func TestIPSetAction_DeleteItem(t *testing.T) { func TestIPSetAction_DeleteItem(t *testing.T) {
action := NewIPSetAction() action := iplibrary.NewIPSetAction()
err := action.Init(&firewallconfigs.FirewallActionConfig{ err := action.Init(&firewallconfigs.FirewallActionConfig{
Params: maps.Map{ Params: maps.Map{
"path": "/usr/bin/firewalld", "path": "/usr/bin/firewalld",
@@ -68,7 +94,7 @@ func TestIPSetAction_DeleteItem(t *testing.T) {
if err != nil { if err != nil {
t.Fatal(err) t.Fatal(err)
} }
err = action.DeleteItem(IPListTypeWhite, &pb.IPItem{ err = action.DeleteItem(iplibrary.IPListTypeWhite, &pb.IPItem{
Type: "ipv4", Type: "ipv4",
Id: 1, Id: 1,
IpFrom: "192.168.1.100", IpFrom: "192.168.1.100",