diff options
author | Phil Sutter <phil@nwl.cc> | 2023-11-02 14:48:10 +0100 |
---|---|---|
committer | Phil Sutter <phil@nwl.cc> | 2023-11-02 18:22:15 +0100 |
commit | e4c9f9f7e0d1f83be18f6c4a418da503e9021b24 (patch) | |
tree | 8bf45ce3aa7cf488694304fe405fc6a1c53bdcae /tests/py/inet/tproxy.t.payload | |
parent | e6f21c85f2cac9e7d5437b68de470da0e4180b60 (diff) |
tproxy: Drop artificial port printing restriction
It does not make much sense to omit printing the port expression if it's
not a value expression: On one hand, input allows for more advanced
uses. On the other, if it is in-kernel, best nft can do is to try and
print it no matter what. Just ignoring ruleset elements can't be
correct.
Fixes: 2be1d52644cf7 ("src: Add tproxy support")
Closes: https://bugzilla.netfilter.org/show_bug.cgi?id=1721
Signed-off-by: Phil Sutter <phil@nwl.cc>
Reviewed-by: Pablo Neira Ayuso <pablo@netfilter.org>
Diffstat (limited to 'tests/py/inet/tproxy.t.payload')
-rw-r--r-- | tests/py/inet/tproxy.t.payload | 12 |
1 files changed, 12 insertions, 0 deletions
diff --git a/tests/py/inet/tproxy.t.payload b/tests/py/inet/tproxy.t.payload index 24bf8f60..2f419042 100644 --- a/tests/py/inet/tproxy.t.payload +++ b/tests/py/inet/tproxy.t.payload @@ -61,3 +61,15 @@ inet x y [ immediate reg 1 0x0000d007 ] [ tproxy ip port reg 1 ] +# meta l4proto 6 tproxy ip to 127.0.0.1:symhash mod 2 map { 0 : 23, 1 : 42 } +__map%d x b size 2 +__map%d x 0 + element 00000000 : 00001700 0 [end] element 00000001 : 00002a00 0 [end] +inet x y + [ meta load l4proto => reg 1 ] + [ cmp eq reg 1 0x00000006 ] + [ immediate reg 1 0x0100007f ] + [ hash reg 2 = symhash() % mod 2 ] + [ lookup reg 2 set __map%d dreg 2 ] + [ tproxy ip addr reg 1 port reg 2 ] + |