diff options
author | Phil Sutter <phil@nwl.cc> | 2023-11-02 14:48:10 +0100 |
---|---|---|
committer | Phil Sutter <phil@nwl.cc> | 2023-11-02 18:22:15 +0100 |
commit | e4c9f9f7e0d1f83be18f6c4a418da503e9021b24 (patch) | |
tree | 8bf45ce3aa7cf488694304fe405fc6a1c53bdcae /tests/py/inet/tproxy.t.json | |
parent | e6f21c85f2cac9e7d5437b68de470da0e4180b60 (diff) |
tproxy: Drop artificial port printing restriction
It does not make much sense to omit printing the port expression if it's
not a value expression: On one hand, input allows for more advanced
uses. On the other, if it is in-kernel, best nft can do is to try and
print it no matter what. Just ignoring ruleset elements can't be
correct.
Fixes: 2be1d52644cf7 ("src: Add tproxy support")
Closes: https://bugzilla.netfilter.org/show_bug.cgi?id=1721
Signed-off-by: Phil Sutter <phil@nwl.cc>
Reviewed-by: Pablo Neira Ayuso <pablo@netfilter.org>
Diffstat (limited to 'tests/py/inet/tproxy.t.json')
-rw-r--r-- | tests/py/inet/tproxy.t.json | 35 |
1 files changed, 35 insertions, 0 deletions
diff --git a/tests/py/inet/tproxy.t.json b/tests/py/inet/tproxy.t.json index 7b3b11c4..71b6fd2f 100644 --- a/tests/py/inet/tproxy.t.json +++ b/tests/py/inet/tproxy.t.json @@ -183,3 +183,38 @@ } } ] + +# meta l4proto 6 tproxy ip to 127.0.0.1:symhash mod 2 map { 0 : 23, 1 : 42 } +[ + { + "match": { + "left": { + "meta": { + "key": "l4proto" + } + }, + "op": "==", + "right": 6 + } + }, + { + "tproxy": { + "addr": "127.0.0.1", + "family": "ip", + "port": { + "map": { + "data": { + "set": [ + [ 0, 23 ], + [ 1, 42 ] + ] + }, + "key": { + "symhash": { "mod": 2 } + } + } + } + } + } +] + |