Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/saschpe/libvirt-hook-qemu

Libvirt hook for setting up iptables port-forwarding rules when using NAT-ed networking.
https://github.com/saschpe/libvirt-hook-qemu

json json-schema libvirt nat port-forwarding python

Last synced: 1 day ago
JSON representation

Libvirt hook for setting up iptables port-forwarding rules when using NAT-ed networking.

Awesome Lists containing this project

README

        

.. image:: https://travis-ci.org/saschpe/libvirt-hook-qemu.svg?branch=master
:target: https://travis-ci.org/saschpe/libvirt-hook-qemu

Libvirt port-forwarding hook
============================

Libvirt hook for setting up iptables port-forwarding rules when using NAT-ed
networking.

Installation
------------

To install the hook script and it's configuration files, simply use the
Makefile_:

.. code-block:: bash

$ sudo make install

Restart your libvirt daemon after installing:

.. code-block:: bash

$ sudo service libvirtd restart

Afterwards, customize ``/etc/libvirt/hooks/hooks.json`` to your needs.
The file includes documentation on how to set up the port forwards, but
changes to the file will be reflected only when the guest VM stops and starts again.

The Makefile target can be invoked multiple times, already installed
configuration files won't be touched. The files can be removed again with:

.. code-block:: bash

$ sudo make uninstall

Testing
-------

To run unit tests use the ``test`` target of the Makefile_:

.. code-block:: bash

$ make test

Or use the Python unittest module to discover tests directly:

.. code-block:: python

python -m unittest discover

Networking
----------

This section describes the theory behind the generated iptables statements.

Packets arriving on the public interface are DNATed to the virtual machine.
This implements the actual port-forwarding. Due to the way iptables is
implemented, the DNAT must occur in two chains: nat:PREROUTING for packets
arriving on the public interface, and nat:OUTPUT for packets originating on
the host.

We also add rules to the FORWARD chain to ensure the responses return.

Finally, packets originating on the guest and sent to the host's public IP
address need special handling. They are DNATed back to the guest like all
other packets but, because the destination is now the same as the source,
the reply never leaves the guest. Therefore, the host SNATs these packets
to ensure the reply returns over the bridge.

To see a real-world example, the ``test_setup`` function in test_qemu.py_
demonstrates a simple JSON configuration and the iptables rules that it produces.

Authors
-------

- Sascha Peilicke
- Scott Bronson

.. _Makefile: Makefile
.. _test_qemu.py: test_qemu.py