Libvirt hook for setting up iptables port-forwarding rules when using NAT-ed networking.
To install the hook script and it's configuration files, simply use the Makefile:
$ sudo make install
Restart your libvirt daemon after installing:
$ sudo service libvirtd restart
Afterwards, customize /etc/libvirt/hooks/hooks.json
to your needs.
The file includes documentation on how to set up the port forwards, but
changes to the file will be reflected only when the guest VM stops and starts again.
The Makefile target can be invoked multiple times, already installed configuration files won't be touched. The files can be removed again with:
$ sudo make uninstall
To run unit tests use the test
target of the Makefile:
$ make test
Or use the Python unittest module to discover tests directly:
python -m unittest discover
This section describes the theory behind the generated iptables statements.
Packets arriving on the public interface are DNATed to the virtual machine. This implements the actual port-forwarding. Due to the way iptables is implemented, the DNAT must occur in two chains: nat:PREROUTING for packets arriving on the public interface, and nat:OUTPUT for packets originating on the host.
We also add rules to the FORWARD chain to ensure the responses return.
Finally, packets originating on the guest and sent to the host's public IP address need special handling. They are DNATed back to the guest like all other packets but, because the destination is now the same as the source, the reply never leaves the guest. Therefore, the host SNATs these packets to ensure the reply returns over the bridge.
To see a real-world example, the test_setup
function in test_qemu.py
demonstrates a simple JSON configuration and the iptables rules that it produces.
- Sascha Peilicke
- Scott Bronson