summaryrefslogtreecommitdiffstats
path: root/tests/py/inet/tproxy.t.json
diff options
context:
space:
mode:
authorPhil Sutter <phil@nwl.cc>2023-11-02 14:48:10 +0100
committerPhil Sutter <phil@nwl.cc>2023-11-02 18:22:15 +0100
commite4c9f9f7e0d1f83be18f6c4a418da503e9021b24 (patch)
tree8bf45ce3aa7cf488694304fe405fc6a1c53bdcae /tests/py/inet/tproxy.t.json
parente6f21c85f2cac9e7d5437b68de470da0e4180b60 (diff)
tproxy: Drop artificial port printing restriction
It does not make much sense to omit printing the port expression if it's not a value expression: On one hand, input allows for more advanced uses. On the other, if it is in-kernel, best nft can do is to try and print it no matter what. Just ignoring ruleset elements can't be correct. Fixes: 2be1d52644cf7 ("src: Add tproxy support") Closes: https://bugzilla.netfilter.org/show_bug.cgi?id=1721 Signed-off-by: Phil Sutter <phil@nwl.cc> Reviewed-by: Pablo Neira Ayuso <pablo@netfilter.org>
Diffstat (limited to 'tests/py/inet/tproxy.t.json')
-rw-r--r--tests/py/inet/tproxy.t.json35
1 files changed, 35 insertions, 0 deletions
diff --git a/tests/py/inet/tproxy.t.json b/tests/py/inet/tproxy.t.json
index 7b3b11c4..71b6fd2f 100644
--- a/tests/py/inet/tproxy.t.json
+++ b/tests/py/inet/tproxy.t.json
@@ -183,3 +183,38 @@
}
}
]
+
+# meta l4proto 6 tproxy ip to 127.0.0.1:symhash mod 2 map { 0 : 23, 1 : 42 }
+[
+ {
+ "match": {
+ "left": {
+ "meta": {
+ "key": "l4proto"
+ }
+ },
+ "op": "==",
+ "right": 6
+ }
+ },
+ {
+ "tproxy": {
+ "addr": "127.0.0.1",
+ "family": "ip",
+ "port": {
+ "map": {
+ "data": {
+ "set": [
+ [ 0, 23 ],
+ [ 1, 42 ]
+ ]
+ },
+ "key": {
+ "symhash": { "mod": 2 }
+ }
+ }
+ }
+ }
+ }
+]
+