netfilter-devel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [PATCH libnftnl] examples: selective rule dumping
@ 2016-07-20 13:36 jalvarez
  2016-07-20 18:05 ` Pablo Neira Ayuso
  0 siblings, 1 reply; 8+ messages in thread
From: jalvarez @ 2016-07-20 13:36 UTC (permalink / raw)
  To: netfilter-devel; +Cc: Pablo Neira Ayuso

Add example (based on nft-get-rule.c) to demonstrate selective rule 
dumping when table and / or chain attributes are set in a rule dump request.
Used to test the changes made in "[PATCH nf-next] netfilter: nf_tables: 
allow to filter out rules by table and chain" 
(http://marc.info/?t=146237901200004&r=1&w=2).

Signed-off-by: Josue Alvarez <jalvarez@toulouse.viveris.com>
--
diff --git a/examples/Makefile.am b/examples/Makefile.am
index e002d36..73450c2 100644
--- a/examples/Makefile.am
+++ b/examples/Makefile.am
@@ -13,6 +13,7 @@ check_PROGRAMS = nft-table-add        \
           nft-rule-parse-add    \
           nft-rule-del        \
           nft-rule-get        \
+         nft-rule-selective-get    \
           nft-events        \
           nft-set-add        \
           nft-set-parse-add    \
@@ -40,6 +41,9 @@ nft_table_del_LDADD = ../src/libnftnl.la ${LIBMNL_LIBS}
  nft_table_get_SOURCES = nft-table-get.c
  nft_table_get_LDADD = ../src/libnftnl.la ${LIBMNL_LIBS}

+nft_rule_selective_get_SOURCES = nft-rule-selective-get.c
+nft_rule_selective_get_LDADD = ../src/libnftnl.la ${LIBMNL_LIBS}
+
  nft_chain_add_SOURCES = nft-chain-add.c
  nft_chain_add_LDADD = ../src/libnftnl.la ${LIBMNL_LIBS}

diff --git a/examples/nft-rule-selective-get.c 
b/examples/nft-rule-selective-get.c
new file mode 100644
index 0000000..a1b82c1
--- /dev/null
+++ b/examples/nft-rule-selective-get.c
@@ -0,0 +1,164 @@
+/*
+ * (C) 2012 by Pablo Neira Ayuso <pablo@netfilter.org>
+ *
+ * This program is free software; you can redistribute it and/or modify it
+ * under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 2 of the License, or
+ * (at your option) any later version.
+ *
+ * This software has been sponsored by Sophos Astaro 
<http://www.sophos.com>
+ */
+
+#include <stdlib.h>
+#include <time.h>
+#include <string.h>
+#include <netinet/in.h>
+
+#include <linux/netfilter.h>
+#include <linux/netfilter/nf_tables.h>
+
+#include <libmnl/libmnl.h>
+#include <libnftnl/rule.h>
+
+static int table_cb(const struct nlmsghdr *nlh, void *data)
+{
+    struct nftnl_rule *t;
+    char buf[4096];
+    uint32_t *type = data;
+
+    t = nftnl_rule_alloc();
+    if (t == NULL) {
+        perror("OOM");
+        goto err;
+    }
+
+    if (nftnl_rule_nlmsg_parse(nlh, t) < 0) {
+        perror("nftnl_rule_nlmsg_parse");
+        goto err_free;
+    }
+
+    nftnl_rule_snprintf(buf, sizeof(buf), t, *type, 0);
+    printf("%s\n", buf);
+
+err_free:
+    nftnl_rule_free(t);
+err:
+    return MNL_CB_OK;
+}
+
+static struct nftnl_rule *setup_rule(uint8_t family, const char *table,
+                   const char *chain, const char *handle)
+{
+    struct nftnl_rule *r = NULL;
+    uint8_t proto;
+    uint16_t dport;
+    uint64_t handle_num;
+
+    r = nftnl_rule_alloc();
+    if (r == NULL) {
+        perror("OOM");
+        exit(EXIT_FAILURE);
+    }
+
+    if (table != NULL)
+        nftnl_rule_set(r, NFTNL_RULE_TABLE, table);
+
+    if (chain != NULL)
+        nftnl_rule_set(r, NFTNL_RULE_CHAIN, chain);
+
+    nftnl_rule_set_u32(r, NFTNL_RULE_FAMILY, family);
+
+    if (handle != NULL) {
+        handle_num = atoll(handle);
+        nftnl_rule_set_u64(r, NFTNL_RULE_POSITION, handle_num);
+    }
+
+    return r;
+}
+
+int main(int argc, char *argv[])
+{
+    struct mnl_socket *nl;
+    char buf[MNL_SOCKET_BUFFER_SIZE];
+    const char *table, *chain = NULL;
+    struct nlmsghdr *nlh;
+    uint32_t portid, seq, type = NFTNL_OUTPUT_DEFAULT;
+    struct nftnl_rule *t, *r = NULL;
+    int ret, family;
+
+    if (argc < 2 || argc > 4) {
+        fprintf(stderr, "Usage: %s <family> [<table>] [<chain>]\n",
+            argv[0]);
+        exit(EXIT_FAILURE);
+    }
+
+    if (strcmp(argv[1], "ip") == 0)
+        family = NFPROTO_IPV4;
+    else if (strcmp(argv[1], "ip6") == 0)
+        family = NFPROTO_IPV6;
+    else if (strcmp(argv[1], "bridge") == 0)
+        family = NFPROTO_BRIDGE;
+    else if (strcmp(argv[1], "arp") == 0)
+        family = NFPROTO_ARP;
+    else if (strcmp(argv[1], "unspec") == 0)
+        family = NFPROTO_UNSPEC;
+    else {
+        fprintf(stderr, "Unknown family: ip, ip6, bridge, arp, unspec\n");
+        exit(EXIT_FAILURE);
+    }
+
+    if (argc > 2)
+        table = argv[2];
+
+    if (argc > 3)
+        chain = argv[3];
+
+    /* XXX requires table, chain and handle attributes for selective get */
+
+    t = nftnl_rule_alloc();
+    if (t == NULL) {
+        perror("OOM");
+        exit(EXIT_FAILURE);
+    }
+
+    r = setup_rule(family, table, chain, NULL);
+
+    seq = time(NULL);
+    nlh = nftnl_rule_nlmsg_build_hdr(buf, NFT_MSG_GETRULE, family,
+                    NLM_F_DUMP, seq);
+
+    nftnl_rule_nlmsg_build_payload(nlh, r);
+
+
+    nl = mnl_socket_open(NETLINK_NETFILTER);
+    if (nl == NULL) {
+        perror("mnl_socket_open");
+        exit(EXIT_FAILURE);
+    }
+
+    if (mnl_socket_bind(nl, 0, MNL_SOCKET_AUTOPID) < 0) {
+        perror("mnl_socket_bind");
+        exit(EXIT_FAILURE);
+    }
+    portid = mnl_socket_get_portid(nl);
+
+    if (mnl_socket_sendto(nl, nlh, nlh->nlmsg_len) < 0) {
+        perror("mnl_socket_send");
+        exit(EXIT_FAILURE);
+    }
+
+    ret = mnl_socket_recvfrom(nl, buf, sizeof(buf));
+    while (ret > 0) {
+        ret = mnl_cb_run(buf, ret, seq, portid, table_cb, &type);
+        if (ret <= 0)
+            break;
+        ret = mnl_socket_recvfrom(nl, buf, sizeof(buf));
+    }
+    if (ret == -1) {
+        perror("error");
+        exit(EXIT_FAILURE);
+    }
+    mnl_socket_close(nl);
+
+    return EXIT_SUCCESS;
+}

^ permalink raw reply related	[flat|nested] 8+ messages in thread

* Re: [PATCH libnftnl] examples: selective rule dumping
  2016-07-20 13:36 [PATCH libnftnl] examples: selective rule dumping jalvarez
@ 2016-07-20 18:05 ` Pablo Neira Ayuso
  2016-07-21  8:03   ` jalvarez
  0 siblings, 1 reply; 8+ messages in thread
From: Pablo Neira Ayuso @ 2016-07-20 18:05 UTC (permalink / raw)
  To: jalvarez; +Cc: netfilter-devel

On Wed, Jul 20, 2016 at 03:36:58PM +0200, jalvarez wrote:
> Add example (based on nft-get-rule.c) to demonstrate selective rule dumping
> when table and / or chain attributes are set in a rule dump request.
> Used to test the changes made in "[PATCH nf-next] netfilter: nf_tables:
> allow to filter out rules by table and chain"
> (http://marc.info/?t=146237901200004&r=1&w=2).
> 
> Signed-off-by: Josue Alvarez <jalvarez@toulouse.viveris.com>
> --
> diff --git a/examples/Makefile.am b/examples/Makefile.am
> index e002d36..73450c2 100644
> --- a/examples/Makefile.am
> +++ b/examples/Makefile.am
> @@ -13,6 +13,7 @@ check_PROGRAMS = nft-table-add        \
>           nft-rule-parse-add    \
>           nft-rule-del        \
>           nft-rule-get        \
> +         nft-rule-selective-get    \

Would you rework this to integrate these changes into nft-rule-get?
I'd suggest you make the invocation look like this below.

        Usage: nft-rule-get <family> [<table> <chain>] [<xml|json>]

So table and chain must be specified at the same time to keep it
simple, it is less flexible than what we actually support but I think
this is fine for an example.

Thanks.

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: [PATCH libnftnl] examples: selective rule dumping
  2016-07-20 18:05 ` Pablo Neira Ayuso
@ 2016-07-21  8:03   ` jalvarez
  2016-07-21 13:36     ` Pablo Neira Ayuso
  0 siblings, 1 reply; 8+ messages in thread
From: jalvarez @ 2016-07-21  8:03 UTC (permalink / raw)
  To: Pablo Neira Ayuso; +Cc: netfilter-devel

On 20/07/2016 20:05, Pablo Neira Ayuso wrote:
> On Wed, Jul 20, 2016 at 03:36:58PM +0200, jalvarez wrote:
>> Add example (based on nft-get-rule.c) to demonstrate selective rule dumping
>> when table and / or chain attributes are set in a rule dump request.
>> Used to test the changes made in "[PATCH nf-next] netfilter: nf_tables:
>> allow to filter out rules by table and chain"
>> (http://marc.info/?t=146237901200004&r=1&w=2).
>>
>> Signed-off-by: Josue Alvarez <jalvarez@toulouse.viveris.com>
>> --
>> diff --git a/examples/Makefile.am b/examples/Makefile.am
>> index e002d36..73450c2 100644
>> --- a/examples/Makefile.am
>> +++ b/examples/Makefile.am
>> @@ -13,6 +13,7 @@ check_PROGRAMS = nft-table-add        \
>>            nft-rule-parse-add    \
>>            nft-rule-del        \
>>            nft-rule-get        \
>> +         nft-rule-selective-get    \
> Would you rework this to integrate these changes into nft-rule-get?
> I'd suggest you make the invocation look like this below.
>
>          Usage: nft-rule-get <family> [<table> <chain>] [<xml|json>]
>
> So table and chain must be specified at the same time to keep it
> simple, it is less flexible than what we actually support but I think
> this is fine for an example.
>
> Thanks.
Here are the changes then.
I didn't put it in nft-rule-get.c at first to avoid breaking the 
expected behavior of the example.

--
diff --git a/examples/nft-rule-get.c b/examples/nft-rule-get.c
index 54bee73..4a491af 100644
--- a/examples/nft-rule-get.c
+++ b/examples/nft-rule-get.c
@@ -46,17 +46,50 @@ err:
      return MNL_CB_OK;
  }

+static struct nftnl_rule *setup_rule(uint8_t family, const char *table,
+                   const char *chain, const char *handle)
+{
+    struct nftnl_rule *r = NULL;
+    uint8_t proto;
+    uint16_t dport;
+    uint64_t handle_num;
+
+    r = nftnl_rule_alloc();
+    if (r == NULL) {
+        perror("OOM");
+        exit(EXIT_FAILURE);
+    }
+
+    if (table != NULL)
+        nftnl_rule_set(r, NFTNL_RULE_TABLE, table);
+
+    if (chain != NULL)
+        nftnl_rule_set(r, NFTNL_RULE_CHAIN, chain);
+
+    nftnl_rule_set_u32(r, NFTNL_RULE_FAMILY, family);
+
+    if (handle != NULL) {
+        handle_num = atoll(handle);
+        nftnl_rule_set_u64(r, NFTNL_RULE_POSITION, handle_num);
+    }
+
+    return r;
+}
+
+
+
  int main(int argc, char *argv[])
  {
      struct mnl_socket *nl;
      char buf[MNL_SOCKET_BUFFER_SIZE];
      struct nlmsghdr *nlh;
+    const char *table = NULL, *chain = NULL;
      uint32_t portid, seq, type = NFTNL_OUTPUT_DEFAULT;
-    struct nftnl_rule *t = NULL;
+    struct nftnl_rule *t, *r = NULL;
      int ret, family;

-    if (argc < 2 || argc > 3) {
-        fprintf(stderr, "Usage: %s <family> [xml|json]\n",
+    if (argc < 2 || argc > 5) {
+        fprintf(stderr, "Usage: %s <family> [<table> <chain>] 
[xml|json]\n",
              argv[0]);
          exit(EXIT_FAILURE);
      }
@@ -76,13 +109,20 @@ int main(int argc, char *argv[])
          exit(EXIT_FAILURE);
      }

-    if (argc == 3) {
-        if (strcmp(argv[2], "xml") == 0)
+    /* [xml|json] specified */
+    if (argc == 3 || argc == 5) {
+        if (strcmp(argv[argc - 1], "xml") == 0)
              type = NFTNL_OUTPUT_XML;
-        else if (strcmp(argv[2], "json") == 0)
+        else if (strcmp(argv[argc - 1], "json") == 0)
              type = NFTNL_OUTPUT_JSON;
      }

+    /* at least [<table> <chain>] specified */
+    if (argc >= 4) {
+        table = argv[2];
+        chain = argv[3];
+    }
+
      /* XXX requires table, chain and handle attributes for selective 
get */

      t = nftnl_rule_alloc();
@@ -95,6 +135,10 @@ int main(int argc, char *argv[])
      nlh = nftnl_rule_nlmsg_build_hdr(buf, NFT_MSG_GETRULE, family,
                      NLM_F_DUMP, seq);

+    r = setup_rule(family, table, chain, NULL);
+    nftnl_rule_nlmsg_build_payload(nlh, r);
+
+
      nl = mnl_socket_open(NETLINK_NETFILTER);
      if (nl == NULL) {
          perror("mnl_socket_open");

^ permalink raw reply related	[flat|nested] 8+ messages in thread

* Re: [PATCH libnftnl] examples: selective rule dumping
  2016-07-21  8:03   ` jalvarez
@ 2016-07-21 13:36     ` Pablo Neira Ayuso
  2016-07-21 14:59       ` Josue Alvarez
  0 siblings, 1 reply; 8+ messages in thread
From: Pablo Neira Ayuso @ 2016-07-21 13:36 UTC (permalink / raw)
  To: jalvarez; +Cc: netfilter-devel

On Thu, Jul 21, 2016 at 10:03:01AM +0200, jalvarez wrote:
> Here are the changes then.
> I didn't put it in nft-rule-get.c at first to avoid breaking the expected
> behavior of the example.

Thanks.

Problem with this patch: You MUA seems to mangle it, so both patch -p1
< patch and git am tell me that your patch is corrupted. I can also
see indents are converted to spaces instead of tabs.

I suggest you use git-send-email to deliver patches to the mailing
list to resolve this.

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: [PATCH libnftnl] examples: selective rule dumping
  2016-07-21 13:36     ` Pablo Neira Ayuso
@ 2016-07-21 14:59       ` Josue Alvarez
  2016-07-21 16:13         ` Pablo Neira Ayuso
  0 siblings, 1 reply; 8+ messages in thread
From: Josue Alvarez @ 2016-07-21 14:59 UTC (permalink / raw)
  To: pablo; +Cc: netfilter-devel, Josue Alvarez

---
 examples/nft-rule-get.c | 56 +++++++++++++++++++++++++++++++++++++++++++------
 1 file changed, 50 insertions(+), 6 deletions(-)

diff --git a/examples/nft-rule-get.c b/examples/nft-rule-get.c
index 54bee73..4a491af 100644
--- a/examples/nft-rule-get.c
+++ b/examples/nft-rule-get.c
@@ -46,17 +46,50 @@ err:
 	return MNL_CB_OK;
 }
 
+static struct nftnl_rule *setup_rule(uint8_t family, const char *table,
+				   const char *chain, const char *handle)
+{
+	struct nftnl_rule *r = NULL;
+	uint8_t proto;
+	uint16_t dport;
+	uint64_t handle_num;
+
+	r = nftnl_rule_alloc();
+	if (r == NULL) {
+		perror("OOM");
+		exit(EXIT_FAILURE);
+	}
+
+	if (table != NULL)
+		nftnl_rule_set(r, NFTNL_RULE_TABLE, table);
+
+	if (chain != NULL)
+		nftnl_rule_set(r, NFTNL_RULE_CHAIN, chain);
+
+	nftnl_rule_set_u32(r, NFTNL_RULE_FAMILY, family);
+
+	if (handle != NULL) {
+		handle_num = atoll(handle);
+		nftnl_rule_set_u64(r, NFTNL_RULE_POSITION, handle_num);
+	}
+
+	return r;
+}
+
+
+
 int main(int argc, char *argv[])
 {
 	struct mnl_socket *nl;
 	char buf[MNL_SOCKET_BUFFER_SIZE];
 	struct nlmsghdr *nlh;
+	const char *table = NULL, *chain = NULL;
 	uint32_t portid, seq, type = NFTNL_OUTPUT_DEFAULT;
-	struct nftnl_rule *t = NULL;
+	struct nftnl_rule *t, *r = NULL;
 	int ret, family;
 
-	if (argc < 2 || argc > 3) {
-		fprintf(stderr, "Usage: %s <family> [xml|json]\n",
+	if (argc < 2 || argc > 5) {
+		fprintf(stderr, "Usage: %s <family> [<table> <chain>] [xml|json]\n",
 			argv[0]);
 		exit(EXIT_FAILURE);
 	}
@@ -76,13 +109,20 @@ int main(int argc, char *argv[])
 		exit(EXIT_FAILURE);
 	}
 
-	if (argc == 3) {
-		if (strcmp(argv[2], "xml") == 0)
+	/* [xml|json] specified */
+	if (argc == 3 || argc == 5) {
+		if (strcmp(argv[argc - 1], "xml") == 0)
 			type = NFTNL_OUTPUT_XML;
-		else if (strcmp(argv[2], "json") == 0)
+		else if (strcmp(argv[argc - 1], "json") == 0)
 			type = NFTNL_OUTPUT_JSON;
 	}
 
+	/* at least [<table> <chain>] specified */
+	if (argc >= 4) {
+		table = argv[2];
+		chain = argv[3];
+	}
+
 	/* XXX requires table, chain and handle attributes for selective get */
 
 	t = nftnl_rule_alloc();
@@ -95,6 +135,10 @@ int main(int argc, char *argv[])
 	nlh = nftnl_rule_nlmsg_build_hdr(buf, NFT_MSG_GETRULE, family,
 					NLM_F_DUMP, seq);
 
+	r = setup_rule(family, table, chain, NULL);
+	nftnl_rule_nlmsg_build_payload(nlh, r);
+
+
 	nl = mnl_socket_open(NETLINK_NETFILTER);
 	if (nl == NULL) {
 		perror("mnl_socket_open");
-- 
2.7.4


^ permalink raw reply related	[flat|nested] 8+ messages in thread

* Re: [PATCH libnftnl] examples: selective rule dumping
  2016-07-21 14:59       ` Josue Alvarez
@ 2016-07-21 16:13         ` Pablo Neira Ayuso
  2016-07-22  7:35           ` jalvarez
  0 siblings, 1 reply; 8+ messages in thread
From: Pablo Neira Ayuso @ 2016-07-21 16:13 UTC (permalink / raw)
  To: Josue Alvarez; +Cc: netfilter-devel

Please, send me your Signed-off-by: and a couple of lines with a
description.

No need to resend this patch, I'll amend this myself. But please
include it next time. Thanks.

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: [PATCH libnftnl] examples: selective rule dumping
  2016-07-21 16:13         ` Pablo Neira Ayuso
@ 2016-07-22  7:35           ` jalvarez
  2016-07-22  9:00             ` Pablo Neira Ayuso
  0 siblings, 1 reply; 8+ messages in thread
From: jalvarez @ 2016-07-22  7:35 UTC (permalink / raw)
  To: Pablo Neira Ayuso; +Cc: netfilter-devel

On 21/07/2016 18:13, Pablo Neira Ayuso wrote:
> Please, send me your Signed-off-by: and a couple of lines with a
> description.
>
> No need to resend this patch, I'll amend this myself. But please
> include it next time. Thanks.

I apologize, I forgot to add it this time. Here are the missing lines you requested.


Improve nft-rule-get example to demonstrate selective rule dumping when table and / or chain attributes are set in a rule dump request. Usage is now as follows : nft-rule-get <family> [<table> <chain>] [<xml|json>].

Signed-off-by: Josue Alvarez<jalvarez@toulouse.viveris.com>


^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: [PATCH libnftnl] examples: selective rule dumping
  2016-07-22  7:35           ` jalvarez
@ 2016-07-22  9:00             ` Pablo Neira Ayuso
  0 siblings, 0 replies; 8+ messages in thread
From: Pablo Neira Ayuso @ 2016-07-22  9:00 UTC (permalink / raw)
  To: jalvarez; +Cc: netfilter-devel

On Fri, Jul 22, 2016 at 09:35:41AM +0200, jalvarez wrote:
> On 21/07/2016 18:13, Pablo Neira Ayuso wrote:
> >Please, send me your Signed-off-by: and a couple of lines with a
> >description.
> >
> >No need to resend this patch, I'll amend this myself. But please
> >include it next time. Thanks.
> 
> I apologize, I forgot to add it this time. Here are the missing lines you requested.
> 
> Improve nft-rule-get example to demonstrate selective rule dumping
> when table and / or chain attributes are set in a rule dump request.
> Usage is now as follows : nft-rule-get <family> [<table> <chain>]
> [<xml|json>].
> 
> Signed-off-by: Josue Alvarez<jalvarez@toulouse.viveris.com>

OK, applied, thanks.

Just for the record, I have also cleaned up a bit the code btw.

^ permalink raw reply	[flat|nested] 8+ messages in thread

end of thread, other threads:[~2016-07-22  9:00 UTC | newest]

Thread overview: 8+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2016-07-20 13:36 [PATCH libnftnl] examples: selective rule dumping jalvarez
2016-07-20 18:05 ` Pablo Neira Ayuso
2016-07-21  8:03   ` jalvarez
2016-07-21 13:36     ` Pablo Neira Ayuso
2016-07-21 14:59       ` Josue Alvarez
2016-07-21 16:13         ` Pablo Neira Ayuso
2016-07-22  7:35           ` jalvarez
2016-07-22  9:00             ` Pablo Neira Ayuso

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).