2020-05-14 03:17:19 +01:00
|
|
|
// Copyright (c) 2020 Tailscale Inc & AUTHORS All rights reserved.
|
|
|
|
// Use of this source code is governed by a BSD-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
|
|
|
package router
|
|
|
|
|
|
|
|
import (
|
|
|
|
"errors"
|
|
|
|
"fmt"
|
|
|
|
"math/rand"
|
2021-02-18 06:11:59 +00:00
|
|
|
"os"
|
2020-05-14 03:17:19 +01:00
|
|
|
"sort"
|
|
|
|
"strings"
|
2021-02-18 06:11:59 +00:00
|
|
|
"sync/atomic"
|
2020-05-14 03:17:19 +01:00
|
|
|
"testing"
|
|
|
|
|
|
|
|
"github.com/google/go-cmp/cmp"
|
2021-10-28 05:36:29 +01:00
|
|
|
"github.com/vishvananda/netlink"
|
2021-05-25 20:42:22 +01:00
|
|
|
"golang.zx2c4.com/wireguard/tun"
|
2020-05-14 03:17:19 +01:00
|
|
|
"inet.af/netaddr"
|
2021-09-07 23:17:39 +01:00
|
|
|
"tailscale.com/tstest"
|
2021-07-20 21:28:06 +01:00
|
|
|
"tailscale.com/types/logger"
|
|
|
|
"tailscale.com/wgengine/monitor"
|
2020-05-14 03:17:19 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
func TestRouterStates(t *testing.T) {
|
2020-05-28 08:44:09 +01:00
|
|
|
basic := `
|
2020-09-22 01:49:44 +01:00
|
|
|
ip rule add -4 pref 5210 fwmark 0x80000 table main
|
|
|
|
ip rule add -4 pref 5230 fwmark 0x80000 table default
|
|
|
|
ip rule add -4 pref 5250 fwmark 0x80000 type unreachable
|
|
|
|
ip rule add -4 pref 5270 table 52
|
|
|
|
ip rule add -6 pref 5210 fwmark 0x80000 table main
|
|
|
|
ip rule add -6 pref 5230 fwmark 0x80000 table default
|
|
|
|
ip rule add -6 pref 5250 fwmark 0x80000 type unreachable
|
|
|
|
ip rule add -6 pref 5270 table 52
|
2020-05-28 08:44:09 +01:00
|
|
|
`
|
2020-05-14 03:17:19 +01:00
|
|
|
states := []struct {
|
|
|
|
name string
|
|
|
|
in *Config
|
|
|
|
want string
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
name: "no config",
|
|
|
|
in: nil,
|
|
|
|
want: `
|
2020-05-28 08:44:09 +01:00
|
|
|
up` + basic,
|
2020-05-14 03:17:19 +01:00
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "local addr only",
|
|
|
|
in: &Config{
|
2020-05-15 03:07:06 +01:00
|
|
|
LocalAddrs: mustCIDRs("100.101.102.103/10"),
|
2021-02-04 21:12:42 +00:00
|
|
|
NetfilterMode: netfilterOff,
|
2020-05-14 03:17:19 +01:00
|
|
|
},
|
|
|
|
want: `
|
|
|
|
up
|
2020-05-28 08:44:09 +01:00
|
|
|
ip addr add 100.101.102.103/10 dev tailscale0` + basic,
|
2020-05-14 03:17:19 +01:00
|
|
|
},
|
|
|
|
|
|
|
|
{
|
|
|
|
name: "addr and routes",
|
|
|
|
in: &Config{
|
2020-05-15 03:07:06 +01:00
|
|
|
LocalAddrs: mustCIDRs("100.101.102.103/10"),
|
|
|
|
Routes: mustCIDRs("100.100.100.100/32", "192.168.16.0/24"),
|
2021-02-04 21:12:42 +00:00
|
|
|
NetfilterMode: netfilterOff,
|
2020-05-14 03:17:19 +01:00
|
|
|
},
|
|
|
|
want: `
|
|
|
|
up
|
|
|
|
ip addr add 100.101.102.103/10 dev tailscale0
|
2020-07-22 19:08:08 +01:00
|
|
|
ip route add 100.100.100.100/32 dev tailscale0 table 52
|
|
|
|
ip route add 192.168.16.0/24 dev tailscale0 table 52` + basic,
|
2020-05-14 03:17:19 +01:00
|
|
|
},
|
|
|
|
|
|
|
|
{
|
|
|
|
name: "addr and routes and subnet routes",
|
|
|
|
in: &Config{
|
2020-05-15 03:07:06 +01:00
|
|
|
LocalAddrs: mustCIDRs("100.101.102.103/10"),
|
|
|
|
Routes: mustCIDRs("100.100.100.100/32", "192.168.16.0/24"),
|
|
|
|
SubnetRoutes: mustCIDRs("200.0.0.0/8"),
|
2021-02-04 21:12:42 +00:00
|
|
|
NetfilterMode: netfilterOff,
|
2020-05-14 03:17:19 +01:00
|
|
|
},
|
|
|
|
want: `
|
|
|
|
up
|
|
|
|
ip addr add 100.101.102.103/10 dev tailscale0
|
2020-07-22 19:08:08 +01:00
|
|
|
ip route add 100.100.100.100/32 dev tailscale0 table 52
|
|
|
|
ip route add 192.168.16.0/24 dev tailscale0 table 52` + basic,
|
2020-05-14 03:17:19 +01:00
|
|
|
},
|
|
|
|
|
|
|
|
{
|
|
|
|
name: "addr and routes and subnet routes with netfilter",
|
|
|
|
in: &Config{
|
|
|
|
LocalAddrs: mustCIDRs("100.101.102.104/10"),
|
|
|
|
Routes: mustCIDRs("100.100.100.100/32", "10.0.0.0/8"),
|
|
|
|
SubnetRoutes: mustCIDRs("200.0.0.0/8"),
|
|
|
|
SNATSubnetRoutes: true,
|
2021-02-04 21:12:42 +00:00
|
|
|
NetfilterMode: netfilterOn,
|
2020-05-14 03:17:19 +01:00
|
|
|
},
|
|
|
|
want: `
|
|
|
|
up
|
|
|
|
ip addr add 100.101.102.104/10 dev tailscale0
|
2020-07-22 19:08:08 +01:00
|
|
|
ip route add 10.0.0.0/8 dev tailscale0 table 52
|
|
|
|
ip route add 100.100.100.100/32 dev tailscale0 table 52` + basic +
|
2020-09-22 01:49:44 +01:00
|
|
|
`v4/filter/FORWARD -j ts-forward
|
|
|
|
v4/filter/INPUT -j ts-input
|
|
|
|
v4/filter/ts-forward -i tailscale0 -j MARK --set-mark 0x40000
|
|
|
|
v4/filter/ts-forward -m mark --mark 0x40000 -j ACCEPT
|
|
|
|
v4/filter/ts-forward -o tailscale0 -s 100.64.0.0/10 -j DROP
|
|
|
|
v4/filter/ts-forward -o tailscale0 -j ACCEPT
|
|
|
|
v4/filter/ts-input -i lo -s 100.101.102.104 -j ACCEPT
|
|
|
|
v4/filter/ts-input ! -i tailscale0 -s 100.115.92.0/23 -j RETURN
|
|
|
|
v4/filter/ts-input ! -i tailscale0 -s 100.64.0.0/10 -j DROP
|
|
|
|
v4/nat/POSTROUTING -j ts-postrouting
|
|
|
|
v4/nat/ts-postrouting -m mark --mark 0x40000 -j MASQUERADE
|
|
|
|
v6/filter/FORWARD -j ts-forward
|
|
|
|
v6/filter/INPUT -j ts-input
|
|
|
|
v6/filter/ts-forward -i tailscale0 -j MARK --set-mark 0x40000
|
|
|
|
v6/filter/ts-forward -m mark --mark 0x40000 -j ACCEPT
|
|
|
|
v6/filter/ts-forward -o tailscale0 -j ACCEPT
|
|
|
|
v6/nat/POSTROUTING -j ts-postrouting
|
|
|
|
v6/nat/ts-postrouting -m mark --mark 0x40000 -j MASQUERADE
|
2020-05-14 03:17:19 +01:00
|
|
|
`,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "addr and routes with netfilter",
|
|
|
|
in: &Config{
|
|
|
|
LocalAddrs: mustCIDRs("100.101.102.104/10"),
|
|
|
|
Routes: mustCIDRs("100.100.100.100/32", "10.0.0.0/8"),
|
2021-02-04 21:12:42 +00:00
|
|
|
NetfilterMode: netfilterOn,
|
2020-05-14 03:17:19 +01:00
|
|
|
},
|
|
|
|
want: `
|
|
|
|
up
|
|
|
|
ip addr add 100.101.102.104/10 dev tailscale0
|
2020-07-22 19:08:08 +01:00
|
|
|
ip route add 10.0.0.0/8 dev tailscale0 table 52
|
|
|
|
ip route add 100.100.100.100/32 dev tailscale0 table 52` + basic +
|
2020-09-22 01:49:44 +01:00
|
|
|
`v4/filter/FORWARD -j ts-forward
|
|
|
|
v4/filter/INPUT -j ts-input
|
|
|
|
v4/filter/ts-forward -i tailscale0 -j MARK --set-mark 0x40000
|
|
|
|
v4/filter/ts-forward -m mark --mark 0x40000 -j ACCEPT
|
|
|
|
v4/filter/ts-forward -o tailscale0 -s 100.64.0.0/10 -j DROP
|
|
|
|
v4/filter/ts-forward -o tailscale0 -j ACCEPT
|
|
|
|
v4/filter/ts-input -i lo -s 100.101.102.104 -j ACCEPT
|
|
|
|
v4/filter/ts-input ! -i tailscale0 -s 100.115.92.0/23 -j RETURN
|
|
|
|
v4/filter/ts-input ! -i tailscale0 -s 100.64.0.0/10 -j DROP
|
|
|
|
v4/nat/POSTROUTING -j ts-postrouting
|
|
|
|
v6/filter/FORWARD -j ts-forward
|
|
|
|
v6/filter/INPUT -j ts-input
|
|
|
|
v6/filter/ts-forward -i tailscale0 -j MARK --set-mark 0x40000
|
|
|
|
v6/filter/ts-forward -m mark --mark 0x40000 -j ACCEPT
|
|
|
|
v6/filter/ts-forward -o tailscale0 -j ACCEPT
|
|
|
|
v6/nat/POSTROUTING -j ts-postrouting
|
2020-05-14 03:17:19 +01:00
|
|
|
`,
|
|
|
|
},
|
|
|
|
|
|
|
|
{
|
|
|
|
name: "addr and routes and subnet routes with netfilter but no SNAT",
|
|
|
|
in: &Config{
|
|
|
|
LocalAddrs: mustCIDRs("100.101.102.104/10"),
|
|
|
|
Routes: mustCIDRs("100.100.100.100/32", "10.0.0.0/8"),
|
|
|
|
SubnetRoutes: mustCIDRs("200.0.0.0/8"),
|
|
|
|
SNATSubnetRoutes: false,
|
2021-02-04 21:12:42 +00:00
|
|
|
NetfilterMode: netfilterOn,
|
2020-05-14 03:17:19 +01:00
|
|
|
},
|
|
|
|
want: `
|
|
|
|
up
|
|
|
|
ip addr add 100.101.102.104/10 dev tailscale0
|
2020-07-22 19:08:08 +01:00
|
|
|
ip route add 10.0.0.0/8 dev tailscale0 table 52
|
|
|
|
ip route add 100.100.100.100/32 dev tailscale0 table 52` + basic +
|
2020-09-22 01:49:44 +01:00
|
|
|
`v4/filter/FORWARD -j ts-forward
|
|
|
|
v4/filter/INPUT -j ts-input
|
|
|
|
v4/filter/ts-forward -i tailscale0 -j MARK --set-mark 0x40000
|
|
|
|
v4/filter/ts-forward -m mark --mark 0x40000 -j ACCEPT
|
|
|
|
v4/filter/ts-forward -o tailscale0 -s 100.64.0.0/10 -j DROP
|
|
|
|
v4/filter/ts-forward -o tailscale0 -j ACCEPT
|
|
|
|
v4/filter/ts-input -i lo -s 100.101.102.104 -j ACCEPT
|
|
|
|
v4/filter/ts-input ! -i tailscale0 -s 100.115.92.0/23 -j RETURN
|
|
|
|
v4/filter/ts-input ! -i tailscale0 -s 100.64.0.0/10 -j DROP
|
|
|
|
v4/nat/POSTROUTING -j ts-postrouting
|
|
|
|
v6/filter/FORWARD -j ts-forward
|
|
|
|
v6/filter/INPUT -j ts-input
|
|
|
|
v6/filter/ts-forward -i tailscale0 -j MARK --set-mark 0x40000
|
|
|
|
v6/filter/ts-forward -m mark --mark 0x40000 -j ACCEPT
|
|
|
|
v6/filter/ts-forward -o tailscale0 -j ACCEPT
|
|
|
|
v6/nat/POSTROUTING -j ts-postrouting
|
2020-05-14 03:17:19 +01:00
|
|
|
`,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "addr and routes with netfilter",
|
|
|
|
in: &Config{
|
|
|
|
LocalAddrs: mustCIDRs("100.101.102.104/10"),
|
|
|
|
Routes: mustCIDRs("100.100.100.100/32", "10.0.0.0/8"),
|
2021-02-04 21:12:42 +00:00
|
|
|
NetfilterMode: netfilterOn,
|
2020-05-14 03:17:19 +01:00
|
|
|
},
|
|
|
|
want: `
|
|
|
|
up
|
|
|
|
ip addr add 100.101.102.104/10 dev tailscale0
|
2020-07-22 19:08:08 +01:00
|
|
|
ip route add 10.0.0.0/8 dev tailscale0 table 52
|
|
|
|
ip route add 100.100.100.100/32 dev tailscale0 table 52` + basic +
|
2020-09-22 01:49:44 +01:00
|
|
|
`v4/filter/FORWARD -j ts-forward
|
|
|
|
v4/filter/INPUT -j ts-input
|
|
|
|
v4/filter/ts-forward -i tailscale0 -j MARK --set-mark 0x40000
|
|
|
|
v4/filter/ts-forward -m mark --mark 0x40000 -j ACCEPT
|
|
|
|
v4/filter/ts-forward -o tailscale0 -s 100.64.0.0/10 -j DROP
|
|
|
|
v4/filter/ts-forward -o tailscale0 -j ACCEPT
|
|
|
|
v4/filter/ts-input -i lo -s 100.101.102.104 -j ACCEPT
|
|
|
|
v4/filter/ts-input ! -i tailscale0 -s 100.115.92.0/23 -j RETURN
|
|
|
|
v4/filter/ts-input ! -i tailscale0 -s 100.64.0.0/10 -j DROP
|
|
|
|
v4/nat/POSTROUTING -j ts-postrouting
|
|
|
|
v6/filter/FORWARD -j ts-forward
|
|
|
|
v6/filter/INPUT -j ts-input
|
|
|
|
v6/filter/ts-forward -i tailscale0 -j MARK --set-mark 0x40000
|
|
|
|
v6/filter/ts-forward -m mark --mark 0x40000 -j ACCEPT
|
|
|
|
v6/filter/ts-forward -o tailscale0 -j ACCEPT
|
|
|
|
v6/nat/POSTROUTING -j ts-postrouting
|
2020-05-14 03:17:19 +01:00
|
|
|
`,
|
|
|
|
},
|
|
|
|
|
|
|
|
{
|
|
|
|
name: "addr and routes with half netfilter",
|
|
|
|
in: &Config{
|
|
|
|
LocalAddrs: mustCIDRs("100.101.102.104/10"),
|
|
|
|
Routes: mustCIDRs("100.100.100.100/32", "10.0.0.0/8"),
|
2021-02-04 21:12:42 +00:00
|
|
|
NetfilterMode: netfilterNoDivert,
|
2020-05-14 03:17:19 +01:00
|
|
|
},
|
|
|
|
want: `
|
|
|
|
up
|
|
|
|
ip addr add 100.101.102.104/10 dev tailscale0
|
2020-07-22 19:08:08 +01:00
|
|
|
ip route add 10.0.0.0/8 dev tailscale0 table 52
|
|
|
|
ip route add 100.100.100.100/32 dev tailscale0 table 52` + basic +
|
2020-09-22 01:49:44 +01:00
|
|
|
`v4/filter/ts-forward -i tailscale0 -j MARK --set-mark 0x40000
|
|
|
|
v4/filter/ts-forward -m mark --mark 0x40000 -j ACCEPT
|
|
|
|
v4/filter/ts-forward -o tailscale0 -s 100.64.0.0/10 -j DROP
|
|
|
|
v4/filter/ts-forward -o tailscale0 -j ACCEPT
|
|
|
|
v4/filter/ts-input -i lo -s 100.101.102.104 -j ACCEPT
|
|
|
|
v4/filter/ts-input ! -i tailscale0 -s 100.115.92.0/23 -j RETURN
|
|
|
|
v4/filter/ts-input ! -i tailscale0 -s 100.64.0.0/10 -j DROP
|
|
|
|
v6/filter/ts-forward -i tailscale0 -j MARK --set-mark 0x40000
|
|
|
|
v6/filter/ts-forward -m mark --mark 0x40000 -j ACCEPT
|
|
|
|
v6/filter/ts-forward -o tailscale0 -j ACCEPT
|
2020-05-14 03:17:19 +01:00
|
|
|
`,
|
|
|
|
},
|
|
|
|
{
|
2020-05-28 08:44:09 +01:00
|
|
|
name: "addr and routes with netfilter2",
|
2020-05-14 03:17:19 +01:00
|
|
|
in: &Config{
|
|
|
|
LocalAddrs: mustCIDRs("100.101.102.104/10"),
|
|
|
|
Routes: mustCIDRs("100.100.100.100/32", "10.0.0.0/8"),
|
2021-02-04 21:12:42 +00:00
|
|
|
NetfilterMode: netfilterOn,
|
2020-05-14 03:17:19 +01:00
|
|
|
},
|
|
|
|
want: `
|
|
|
|
up
|
|
|
|
ip addr add 100.101.102.104/10 dev tailscale0
|
2020-07-22 19:08:08 +01:00
|
|
|
ip route add 10.0.0.0/8 dev tailscale0 table 52
|
|
|
|
ip route add 100.100.100.100/32 dev tailscale0 table 52` + basic +
|
2020-09-22 01:49:44 +01:00
|
|
|
`v4/filter/FORWARD -j ts-forward
|
|
|
|
v4/filter/INPUT -j ts-input
|
|
|
|
v4/filter/ts-forward -i tailscale0 -j MARK --set-mark 0x40000
|
|
|
|
v4/filter/ts-forward -m mark --mark 0x40000 -j ACCEPT
|
|
|
|
v4/filter/ts-forward -o tailscale0 -s 100.64.0.0/10 -j DROP
|
|
|
|
v4/filter/ts-forward -o tailscale0 -j ACCEPT
|
|
|
|
v4/filter/ts-input -i lo -s 100.101.102.104 -j ACCEPT
|
|
|
|
v4/filter/ts-input ! -i tailscale0 -s 100.115.92.0/23 -j RETURN
|
|
|
|
v4/filter/ts-input ! -i tailscale0 -s 100.64.0.0/10 -j DROP
|
|
|
|
v4/nat/POSTROUTING -j ts-postrouting
|
|
|
|
v6/filter/FORWARD -j ts-forward
|
|
|
|
v6/filter/INPUT -j ts-input
|
|
|
|
v6/filter/ts-forward -i tailscale0 -j MARK --set-mark 0x40000
|
|
|
|
v6/filter/ts-forward -m mark --mark 0x40000 -j ACCEPT
|
|
|
|
v6/filter/ts-forward -o tailscale0 -j ACCEPT
|
|
|
|
v6/nat/POSTROUTING -j ts-postrouting
|
2020-05-14 03:17:19 +01:00
|
|
|
`,
|
|
|
|
},
|
2021-04-08 23:56:51 +01:00
|
|
|
{
|
|
|
|
name: "addr, routes, and local routes with netfilter",
|
|
|
|
in: &Config{
|
|
|
|
LocalAddrs: mustCIDRs("100.101.102.104/10"),
|
|
|
|
Routes: mustCIDRs("100.100.100.100/32", "0.0.0.0/0"),
|
|
|
|
LocalRoutes: mustCIDRs("10.0.0.0/8"),
|
|
|
|
NetfilterMode: netfilterOn,
|
|
|
|
},
|
|
|
|
want: `
|
|
|
|
up
|
|
|
|
ip addr add 100.101.102.104/10 dev tailscale0
|
|
|
|
ip route add 0.0.0.0/0 dev tailscale0 table 52
|
|
|
|
ip route add 100.100.100.100/32 dev tailscale0 table 52
|
|
|
|
ip route add throw 10.0.0.0/8 table 52` + basic +
|
|
|
|
`v4/filter/FORWARD -j ts-forward
|
|
|
|
v4/filter/INPUT -j ts-input
|
|
|
|
v4/filter/ts-forward -i tailscale0 -j MARK --set-mark 0x40000
|
|
|
|
v4/filter/ts-forward -m mark --mark 0x40000 -j ACCEPT
|
|
|
|
v4/filter/ts-forward -o tailscale0 -s 100.64.0.0/10 -j DROP
|
|
|
|
v4/filter/ts-forward -o tailscale0 -j ACCEPT
|
|
|
|
v4/filter/ts-input -i lo -s 100.101.102.104 -j ACCEPT
|
|
|
|
v4/filter/ts-input ! -i tailscale0 -s 100.115.92.0/23 -j RETURN
|
|
|
|
v4/filter/ts-input ! -i tailscale0 -s 100.64.0.0/10 -j DROP
|
|
|
|
v4/nat/POSTROUTING -j ts-postrouting
|
|
|
|
v6/filter/FORWARD -j ts-forward
|
|
|
|
v6/filter/INPUT -j ts-input
|
|
|
|
v6/filter/ts-forward -i tailscale0 -j MARK --set-mark 0x40000
|
|
|
|
v6/filter/ts-forward -m mark --mark 0x40000 -j ACCEPT
|
|
|
|
v6/filter/ts-forward -o tailscale0 -j ACCEPT
|
|
|
|
v6/nat/POSTROUTING -j ts-postrouting
|
|
|
|
`,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "addr, routes, and local routes with no netfilter",
|
|
|
|
in: &Config{
|
|
|
|
LocalAddrs: mustCIDRs("100.101.102.104/10"),
|
|
|
|
Routes: mustCIDRs("100.100.100.100/32", "0.0.0.0/0"),
|
|
|
|
LocalRoutes: mustCIDRs("10.0.0.0/8", "192.168.0.0/24"),
|
|
|
|
NetfilterMode: netfilterOff,
|
|
|
|
},
|
|
|
|
want: `
|
|
|
|
up
|
|
|
|
ip addr add 100.101.102.104/10 dev tailscale0
|
|
|
|
ip route add 0.0.0.0/0 dev tailscale0 table 52
|
|
|
|
ip route add 100.100.100.100/32 dev tailscale0 table 52
|
|
|
|
ip route add throw 10.0.0.0/8 table 52
|
|
|
|
ip route add throw 192.168.0.0/24 table 52` + basic,
|
|
|
|
},
|
2020-05-14 03:17:19 +01:00
|
|
|
}
|
|
|
|
|
2021-07-20 21:28:06 +01:00
|
|
|
mon, err := monitor.New(logger.Discard)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
mon.Start()
|
|
|
|
defer mon.Close()
|
|
|
|
|
2020-05-14 03:17:19 +01:00
|
|
|
fake := NewFakeOS(t)
|
2021-07-20 21:28:06 +01:00
|
|
|
router, err := newUserspaceRouterAdvanced(t.Logf, "tailscale0", mon, fake.netfilter4, fake.netfilter6, fake, true, true)
|
2020-05-14 03:17:19 +01:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed to create router: %v", err)
|
|
|
|
}
|
|
|
|
if err := router.Up(); err != nil {
|
|
|
|
t.Fatalf("failed to up router: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
testState := func(t *testing.T, i int) {
|
|
|
|
t.Helper()
|
|
|
|
if err := router.Set(states[i].in); err != nil {
|
|
|
|
t.Fatalf("failed to set router config: %v", err)
|
|
|
|
}
|
|
|
|
got := fake.String()
|
|
|
|
want := strings.TrimSpace(states[i].want)
|
|
|
|
if diff := cmp.Diff(got, want); diff != "" {
|
|
|
|
t.Fatalf("unexpected OS state (-got+want):\n%s", diff)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
for i, state := range states {
|
|
|
|
t.Run(state.name, func(t *testing.T) { testState(t, i) })
|
|
|
|
}
|
|
|
|
|
|
|
|
// Cycle through a bunch of states in pseudorandom order, to
|
|
|
|
// verify that we transition cleanly from state to state no matter
|
|
|
|
// the order.
|
|
|
|
for randRun := 0; randRun < 5*len(states); randRun++ {
|
|
|
|
i := rand.Intn(len(states))
|
|
|
|
state := states[i]
|
|
|
|
t.Run(state.name, func(t *testing.T) { testState(t, i) })
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-09-22 01:49:44 +01:00
|
|
|
type fakeNetfilter struct {
|
|
|
|
t *testing.T
|
|
|
|
n map[string][]string
|
2020-05-14 03:17:19 +01:00
|
|
|
}
|
|
|
|
|
2020-09-22 01:49:44 +01:00
|
|
|
func newNetfilter(t *testing.T) *fakeNetfilter {
|
|
|
|
return &fakeNetfilter{
|
2020-05-14 03:17:19 +01:00
|
|
|
t: t,
|
2020-09-22 01:49:44 +01:00
|
|
|
n: map[string][]string{
|
2020-05-14 03:17:19 +01:00
|
|
|
"filter/INPUT": nil,
|
|
|
|
"filter/OUTPUT": nil,
|
|
|
|
"filter/FORWARD": nil,
|
|
|
|
"nat/PREROUTING": nil,
|
|
|
|
"nat/OUTPUT": nil,
|
|
|
|
"nat/POSTROUTING": nil,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-09-22 01:49:44 +01:00
|
|
|
func (n *fakeNetfilter) Insert(table, chain string, pos int, args ...string) error {
|
2020-05-14 03:17:19 +01:00
|
|
|
k := table + "/" + chain
|
2020-09-22 01:49:44 +01:00
|
|
|
if rules, ok := n.n[k]; ok {
|
2020-05-14 03:17:19 +01:00
|
|
|
if pos > len(rules)+1 {
|
2020-09-22 01:49:44 +01:00
|
|
|
n.t.Errorf("bad position %d in %s", pos, k)
|
2020-05-14 03:17:19 +01:00
|
|
|
return errExec
|
|
|
|
}
|
|
|
|
rules = append(rules, "")
|
|
|
|
copy(rules[pos:], rules[pos-1:])
|
|
|
|
rules[pos-1] = strings.Join(args, " ")
|
2020-09-22 01:49:44 +01:00
|
|
|
n.n[k] = rules
|
2020-05-14 03:17:19 +01:00
|
|
|
} else {
|
2020-09-22 01:49:44 +01:00
|
|
|
n.t.Errorf("unknown table/chain %s", k)
|
2020-05-14 03:17:19 +01:00
|
|
|
return errExec
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-09-22 01:49:44 +01:00
|
|
|
func (n *fakeNetfilter) Append(table, chain string, args ...string) error {
|
2020-05-14 03:17:19 +01:00
|
|
|
k := table + "/" + chain
|
2020-09-22 01:49:44 +01:00
|
|
|
return n.Insert(table, chain, len(n.n[k])+1, args...)
|
2020-05-14 03:17:19 +01:00
|
|
|
}
|
|
|
|
|
2020-09-22 01:49:44 +01:00
|
|
|
func (n *fakeNetfilter) Exists(table, chain string, args ...string) (bool, error) {
|
2020-05-14 03:17:19 +01:00
|
|
|
k := table + "/" + chain
|
2020-09-22 01:49:44 +01:00
|
|
|
if rules, ok := n.n[k]; ok {
|
2020-05-14 03:17:19 +01:00
|
|
|
for _, rule := range rules {
|
|
|
|
if rule == strings.Join(args, " ") {
|
|
|
|
return true, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false, nil
|
|
|
|
} else {
|
2020-09-22 01:49:44 +01:00
|
|
|
n.t.Errorf("unknown table/chain %s", k)
|
2020-05-14 03:17:19 +01:00
|
|
|
return false, errExec
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-09-22 01:49:44 +01:00
|
|
|
func (n *fakeNetfilter) Delete(table, chain string, args ...string) error {
|
2020-05-14 03:17:19 +01:00
|
|
|
k := table + "/" + chain
|
2020-09-22 01:49:44 +01:00
|
|
|
if rules, ok := n.n[k]; ok {
|
2020-05-14 03:17:19 +01:00
|
|
|
for i, rule := range rules {
|
|
|
|
if rule == strings.Join(args, " ") {
|
|
|
|
rules = append(rules[:i], rules[i+1:]...)
|
2020-09-22 01:49:44 +01:00
|
|
|
n.n[k] = rules
|
2020-05-14 03:17:19 +01:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
2020-09-22 01:49:44 +01:00
|
|
|
n.t.Errorf("delete of unknown rule %q from %s", strings.Join(args, " "), k)
|
2020-05-14 03:17:19 +01:00
|
|
|
return errExec
|
|
|
|
} else {
|
2020-09-22 01:49:44 +01:00
|
|
|
n.t.Errorf("unknown table/chain %s", k)
|
2020-05-14 03:17:19 +01:00
|
|
|
return errExec
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-09-22 01:49:44 +01:00
|
|
|
func (n *fakeNetfilter) ClearChain(table, chain string) error {
|
2020-05-14 03:17:19 +01:00
|
|
|
k := table + "/" + chain
|
2020-09-22 01:49:44 +01:00
|
|
|
if _, ok := n.n[k]; ok {
|
|
|
|
n.n[k] = nil
|
2020-05-14 03:17:19 +01:00
|
|
|
return nil
|
|
|
|
} else {
|
2020-09-22 01:49:44 +01:00
|
|
|
n.t.Logf("note: ClearChain: unknown table/chain %s", k)
|
2020-05-28 10:44:44 +01:00
|
|
|
return errors.New("exitcode:1")
|
2020-05-14 03:17:19 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-09-22 01:49:44 +01:00
|
|
|
func (n *fakeNetfilter) NewChain(table, chain string) error {
|
2020-05-14 03:17:19 +01:00
|
|
|
k := table + "/" + chain
|
2020-09-22 01:49:44 +01:00
|
|
|
if _, ok := n.n[k]; ok {
|
|
|
|
n.t.Errorf("table/chain %s already exists", k)
|
2020-05-14 03:17:19 +01:00
|
|
|
return errExec
|
|
|
|
}
|
2020-09-22 01:49:44 +01:00
|
|
|
n.n[k] = nil
|
2020-05-14 03:17:19 +01:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-09-22 01:49:44 +01:00
|
|
|
func (n *fakeNetfilter) DeleteChain(table, chain string) error {
|
2020-05-14 03:17:19 +01:00
|
|
|
k := table + "/" + chain
|
2020-09-22 01:49:44 +01:00
|
|
|
if rules, ok := n.n[k]; ok {
|
2020-05-14 03:17:19 +01:00
|
|
|
if len(rules) != 0 {
|
2020-09-22 01:49:44 +01:00
|
|
|
n.t.Errorf("%s is not empty", k)
|
2020-05-14 03:17:19 +01:00
|
|
|
return errExec
|
|
|
|
}
|
2020-09-22 01:49:44 +01:00
|
|
|
delete(n.n, k)
|
2020-05-14 03:17:19 +01:00
|
|
|
return nil
|
|
|
|
} else {
|
2020-09-22 01:49:44 +01:00
|
|
|
n.t.Errorf("%s does not exist", k)
|
2020-05-14 03:17:19 +01:00
|
|
|
return errExec
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-09-22 01:49:44 +01:00
|
|
|
// fakeOS implements commandRunner and provides v4 and v6
|
|
|
|
// netfilterRunners, but captures changes without touching the OS.
|
|
|
|
type fakeOS struct {
|
|
|
|
t *testing.T
|
|
|
|
up bool
|
|
|
|
ips []string
|
|
|
|
routes []string
|
|
|
|
rules []string
|
|
|
|
netfilter4 *fakeNetfilter
|
|
|
|
netfilter6 *fakeNetfilter
|
|
|
|
}
|
|
|
|
|
|
|
|
func NewFakeOS(t *testing.T) *fakeOS {
|
|
|
|
return &fakeOS{
|
|
|
|
t: t,
|
|
|
|
netfilter4: newNetfilter(t),
|
|
|
|
netfilter6: newNetfilter(t),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
var errExec = errors.New("execution failed")
|
|
|
|
|
|
|
|
func (o *fakeOS) String() string {
|
|
|
|
var b strings.Builder
|
|
|
|
if o.up {
|
|
|
|
b.WriteString("up\n")
|
|
|
|
} else {
|
|
|
|
b.WriteString("down\n")
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, ip := range o.ips {
|
|
|
|
fmt.Fprintf(&b, "ip addr add %s\n", ip)
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, route := range o.routes {
|
|
|
|
fmt.Fprintf(&b, "ip route add %s\n", route)
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, rule := range o.rules {
|
|
|
|
fmt.Fprintf(&b, "ip rule add %s\n", rule)
|
|
|
|
}
|
|
|
|
|
|
|
|
var chains []string
|
|
|
|
for chain := range o.netfilter4.n {
|
|
|
|
chains = append(chains, chain)
|
|
|
|
}
|
|
|
|
sort.Strings(chains)
|
|
|
|
for _, chain := range chains {
|
|
|
|
for _, rule := range o.netfilter4.n[chain] {
|
|
|
|
fmt.Fprintf(&b, "v4/%s %s\n", chain, rule)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
chains = nil
|
|
|
|
for chain := range o.netfilter6.n {
|
|
|
|
chains = append(chains, chain)
|
|
|
|
}
|
|
|
|
sort.Strings(chains)
|
|
|
|
for _, chain := range chains {
|
|
|
|
for _, rule := range o.netfilter6.n[chain] {
|
|
|
|
fmt.Fprintf(&b, "v6/%s %s\n", chain, rule)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return b.String()[:len(b.String())-1]
|
|
|
|
}
|
|
|
|
|
2020-05-14 03:17:19 +01:00
|
|
|
func (o *fakeOS) run(args ...string) error {
|
|
|
|
unexpected := func() error {
|
|
|
|
o.t.Errorf("unexpected invocation %q", strings.Join(args, " "))
|
|
|
|
return errors.New("unrecognized invocation")
|
|
|
|
}
|
|
|
|
if args[0] != "ip" {
|
|
|
|
return unexpected()
|
|
|
|
}
|
|
|
|
|
2020-09-22 01:49:44 +01:00
|
|
|
if len(args) == 2 && args[1] == "rule" {
|
|
|
|
// naked invocation of `ip rule` is a feature test. Return
|
|
|
|
// successfully.
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
family := ""
|
2020-05-14 03:17:19 +01:00
|
|
|
rest := strings.Join(args[3:], " ")
|
2020-09-22 01:49:44 +01:00
|
|
|
if args[1] == "-4" || args[1] == "-6" {
|
|
|
|
family = args[1]
|
|
|
|
copy(args[1:], args[2:])
|
|
|
|
args = args[:len(args)-1]
|
|
|
|
rest = family + " " + strings.Join(args[3:], " ")
|
|
|
|
}
|
2020-05-14 03:17:19 +01:00
|
|
|
|
|
|
|
var l *[]string
|
|
|
|
switch args[1] {
|
|
|
|
case "link":
|
|
|
|
got := strings.Join(args[2:], " ")
|
|
|
|
switch got {
|
2020-05-28 08:44:09 +01:00
|
|
|
case "set dev tailscale0 up":
|
2020-05-14 03:17:19 +01:00
|
|
|
o.up = true
|
2020-05-28 08:44:09 +01:00
|
|
|
case "set dev tailscale0 down":
|
2020-05-14 03:17:19 +01:00
|
|
|
o.up = false
|
|
|
|
default:
|
|
|
|
return unexpected()
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
case "addr":
|
|
|
|
l = &o.ips
|
|
|
|
case "route":
|
|
|
|
l = &o.routes
|
|
|
|
case "rule":
|
|
|
|
l = &o.rules
|
|
|
|
default:
|
|
|
|
return unexpected()
|
|
|
|
}
|
|
|
|
|
|
|
|
switch args[2] {
|
|
|
|
case "add":
|
|
|
|
for _, el := range *l {
|
|
|
|
if el == rest {
|
|
|
|
o.t.Errorf("can't add %q, already present", rest)
|
|
|
|
return errors.New("already exists")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
*l = append(*l, rest)
|
|
|
|
sort.Strings(*l)
|
|
|
|
case "del":
|
|
|
|
found := false
|
|
|
|
for i, el := range *l {
|
|
|
|
if el == rest {
|
|
|
|
found = true
|
|
|
|
*l = append((*l)[:i], (*l)[i+1:]...)
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !found {
|
2020-05-28 08:44:09 +01:00
|
|
|
o.t.Logf("note: can't delete %q, not present", rest)
|
|
|
|
// 'ip rule del' exits with code 2 when a row is
|
|
|
|
// missing. We don't want to consider that an error,
|
|
|
|
// for cleanup purposes.
|
|
|
|
|
|
|
|
// TODO(apenwarr): this is a hack.
|
|
|
|
// I'd like to return an exec.ExitError(2) here, but
|
|
|
|
// I can't, because the ExitCode is implemented in
|
|
|
|
// os.ProcessState, which is an opaque object I can't
|
|
|
|
// instantiate or modify. Go's 75 levels of abstraction
|
|
|
|
// between me and an 8-bit int are really paying off
|
|
|
|
// here, as you can see.
|
|
|
|
return errors.New("exitcode:2")
|
2020-05-14 03:17:19 +01:00
|
|
|
}
|
|
|
|
default:
|
|
|
|
return unexpected()
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (o *fakeOS) output(args ...string) ([]byte, error) {
|
|
|
|
want := "ip rule list priority 10000"
|
|
|
|
got := strings.Join(args, " ")
|
|
|
|
if got != want {
|
|
|
|
o.t.Errorf("unexpected command that wants output: %v", got)
|
|
|
|
return nil, errExec
|
|
|
|
}
|
|
|
|
|
|
|
|
var ret []string
|
|
|
|
for _, rule := range o.rules {
|
|
|
|
if strings.Contains(rule, "10000") {
|
|
|
|
ret = append(ret, rule)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return []byte(strings.Join(ret, "\n")), nil
|
|
|
|
}
|
2021-02-18 06:11:59 +00:00
|
|
|
|
|
|
|
var tunTestNum int64
|
|
|
|
|
|
|
|
func createTestTUN(t *testing.T) tun.Device {
|
|
|
|
const minimalMTU = 1280
|
|
|
|
tunName := fmt.Sprintf("tuntest%d", atomic.AddInt64(&tunTestNum, 1))
|
|
|
|
tun, err := tun.CreateTUN(tunName, minimalMTU)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("CreateTUN(%q): %v", tunName, err)
|
|
|
|
}
|
|
|
|
return tun
|
|
|
|
}
|
|
|
|
|
2021-10-28 23:22:03 +01:00
|
|
|
type linuxTest struct {
|
|
|
|
tun tun.Device
|
|
|
|
mon *monitor.Mon
|
|
|
|
r *linuxRouter
|
|
|
|
logOutput tstest.MemLogger
|
|
|
|
}
|
|
|
|
|
|
|
|
func (lt *linuxTest) Close() error {
|
|
|
|
if lt.tun != nil {
|
|
|
|
lt.tun.Close()
|
|
|
|
}
|
|
|
|
if lt.mon != nil {
|
|
|
|
lt.mon.Close()
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func newLinuxRootTest(t *testing.T) *linuxTest {
|
2021-02-18 06:11:59 +00:00
|
|
|
if os.Getuid() != 0 {
|
|
|
|
t.Skip("test requires root")
|
|
|
|
}
|
|
|
|
|
2021-10-28 23:22:03 +01:00
|
|
|
lt := new(linuxTest)
|
|
|
|
lt.tun = createTestTUN(t)
|
|
|
|
|
|
|
|
logf := lt.logOutput.Logf
|
2021-02-18 06:11:59 +00:00
|
|
|
|
2021-07-20 21:28:06 +01:00
|
|
|
mon, err := monitor.New(logger.Discard)
|
|
|
|
if err != nil {
|
2021-10-28 23:22:03 +01:00
|
|
|
lt.Close()
|
2021-07-20 21:28:06 +01:00
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
mon.Start()
|
2021-10-28 23:22:03 +01:00
|
|
|
lt.mon = mon
|
2021-07-20 21:28:06 +01:00
|
|
|
|
2021-10-28 23:22:03 +01:00
|
|
|
r, err := newUserspaceRouter(logf, lt.tun, mon)
|
2021-02-18 06:11:59 +00:00
|
|
|
if err != nil {
|
2021-10-28 23:22:03 +01:00
|
|
|
lt.Close()
|
2021-02-18 06:11:59 +00:00
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
lr := r.(*linuxRouter)
|
|
|
|
if err := lr.upInterface(); err != nil {
|
2021-10-28 23:22:03 +01:00
|
|
|
lt.Close()
|
2021-02-18 06:11:59 +00:00
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2021-10-28 23:22:03 +01:00
|
|
|
lt.r = lr
|
|
|
|
return lt
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestDelRouteIdempotent(t *testing.T) {
|
|
|
|
lt := newLinuxRootTest(t)
|
|
|
|
defer lt.Close()
|
|
|
|
|
2021-02-18 06:11:59 +00:00
|
|
|
for _, s := range []string{
|
|
|
|
"192.0.2.0/24", // RFC 5737
|
|
|
|
"2001:DB8::/32", // RFC 3849
|
|
|
|
} {
|
|
|
|
cidr := netaddr.MustParseIPPrefix(s)
|
2021-10-28 23:22:03 +01:00
|
|
|
if err := lt.r.addRoute(cidr); err != nil {
|
|
|
|
t.Error(err)
|
|
|
|
continue
|
2021-02-18 06:11:59 +00:00
|
|
|
}
|
|
|
|
for i := 0; i < 2; i++ {
|
2021-10-28 23:22:03 +01:00
|
|
|
if err := lt.r.delRoute(cidr); err != nil {
|
|
|
|
t.Errorf("delRoute(i=%d): %v", i, err)
|
2021-02-18 06:11:59 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if t.Failed() {
|
2021-10-28 23:22:03 +01:00
|
|
|
out := lt.logOutput.String()
|
2021-02-18 06:11:59 +00:00
|
|
|
t.Logf("Log output:\n%s", out)
|
|
|
|
}
|
|
|
|
}
|
2021-10-28 05:36:29 +01:00
|
|
|
|
2021-10-28 23:22:03 +01:00
|
|
|
func TestAddRemoveRules(t *testing.T) {
|
|
|
|
lt := newLinuxRootTest(t)
|
|
|
|
defer lt.Close()
|
|
|
|
r := lt.r
|
|
|
|
|
|
|
|
step := func(name string, f func() error) {
|
|
|
|
t.Logf("Doing %v ...", name)
|
|
|
|
if err := f(); err != nil {
|
|
|
|
t.Fatalf("%s: %v", name, err)
|
|
|
|
}
|
|
|
|
rules, err := netlink.RuleList(netlink.FAMILY_ALL)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
for _, r := range rules {
|
|
|
|
if r.Priority >= 5000 && r.Priority <= 5999 {
|
|
|
|
t.Logf("Rule: %+v", r)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
step("init_del_and_add", r.addIPRules)
|
|
|
|
step("dup_add", r.justAddIPRules)
|
|
|
|
step("del", r.delIPRules)
|
|
|
|
step("dup_del", r.delIPRules)
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2021-10-28 05:36:29 +01:00
|
|
|
func TestDebugListLinks(t *testing.T) {
|
|
|
|
links, err := netlink.LinkList()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
for _, ln := range links {
|
|
|
|
t.Logf("Link: %+v", ln)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestDebugListRoutes(t *testing.T) {
|
|
|
|
// We need to pass a non-nil route to RouteListFiltered, along
|
|
|
|
// with the netlink.RT_FILTER_TABLE bit set in the filter
|
|
|
|
// mask, otherwise it ignores non-main routes.
|
|
|
|
filter := &netlink.Route{}
|
|
|
|
routes, err := netlink.RouteListFiltered(netlink.FAMILY_ALL, filter, netlink.RT_FILTER_TABLE)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
for _, r := range routes {
|
|
|
|
t.Logf("Route: %+v", r)
|
|
|
|
}
|
|
|
|
}
|
2021-10-28 19:11:37 +01:00
|
|
|
|
|
|
|
var famName = map[int]string{
|
|
|
|
netlink.FAMILY_ALL: "all",
|
|
|
|
netlink.FAMILY_V4: "v4",
|
|
|
|
netlink.FAMILY_V6: "v6",
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestDebugListRules(t *testing.T) {
|
|
|
|
for _, fam := range []int{netlink.FAMILY_V4, netlink.FAMILY_V6, netlink.FAMILY_ALL} {
|
|
|
|
t.Run(famName[fam], func(t *testing.T) {
|
|
|
|
rules, err := netlink.RuleList(fam)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
for _, r := range rules {
|
|
|
|
t.Logf("Rule: %+v", r)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
2021-11-01 22:52:24 +00:00
|
|
|
|
|
|
|
func TestCheckIPRuleSupportsV6(t *testing.T) {
|
2021-11-19 19:17:03 +00:00
|
|
|
err := checkIPRuleSupportsV6(t.Logf)
|
2021-11-01 22:52:24 +00:00
|
|
|
if err != nil && os.Getuid() != 0 {
|
|
|
|
t.Skipf("skipping, error when not root: %v", err)
|
|
|
|
}
|
|
|
|
// Just log it. For interactive testing only.
|
|
|
|
// Some machines running our tests might not have IPv6.
|
|
|
|
t.Logf("Got: %v", err)
|
|
|
|
}
|