From: Florian Westphal Date: Mon, 4 Jan 2016 19:53:52 +0000 (+0100) Subject: tests: add ct tests for ip family X-Git-Tag: v0.6~161 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=399d11797bd2c2d5e8f793081cd81832fe872889;p=thirdparty%2Fnftables.git tests: add ct tests for ip family Cannot check e.g. saddr for 192.168.0.1 for 'any' protocol, nft needs to expect arguments of a specific address type. So e.g. when using 'inet' we need to add a rule that makes the expected family explicit, e.g. 'meta nfproto ipv4'. Signed-off-by: Florian Westphal --- diff --git a/tests/py/ip/ct.t b/tests/py/ip/ct.t new file mode 100644 index 000000000..28ad76603 --- /dev/null +++ b/tests/py/ip/ct.t @@ -0,0 +1,23 @@ +*ip;test-ip4 + +:output;type filter hook output priority 0 + +ct saddr original 192.168.0.1;ok +ct saddr reply 192.168.0.1;ok +ct daddr original 192.168.0.1;ok +ct daddr reply 192.168.0.1;ok + +# same, but with a netmask +ct saddr original 192.168.1.0/24;ok +ct saddr reply 192.168.1.0/24;ok +ct daddr original 192.168.1.0/24;ok +ct daddr reply 192.168.1.0/24;ok + +ct l3proto original ipv4;ok +ct l3proto reply foobar;fail + +ct protocol original 6 ct proto-dst original 22;ok +ct protocol original 17 ct proto-src reply 53;ok + +# wrong address family +ct daddr reply dead::beef;fail diff --git a/tests/py/ip/ct.t.payload b/tests/py/ip/ct.t.payload new file mode 100644 index 000000000..e06d988c6 --- /dev/null +++ b/tests/py/ip/ct.t.payload @@ -0,0 +1,62 @@ +# ct saddr original 192.168.0.1 +ip test-ip4 output + [ ct load src => reg 1 , dir original ] + [ cmp eq reg 1 0x0100a8c0 ] + +# ct saddr reply 192.168.0.1 +ip test-ip4 output + [ ct load src => reg 1 , dir reply ] + [ cmp eq reg 1 0x0100a8c0 ] + +# ct daddr original 192.168.0.1 +ip test-ip4 output + [ ct load dst => reg 1 , dir original ] + [ cmp eq reg 1 0x0100a8c0 ] + +# ct daddr reply 192.168.0.1 +ip test-ip4 output + [ ct load dst => reg 1 , dir reply ] + [ cmp eq reg 1 0x0100a8c0 ] + +# ct saddr original 192.168.1.0/24 +ip test-ip4 output + [ ct load src => reg 1 , dir original ] + [ bitwise reg 1 = (reg=1 & 0x00ffffff ) ^ 0x00000000 ] + [ cmp eq reg 1 0x0001a8c0 ] + +# ct saddr reply 192.168.1.0/24 +ip test-ip4 output + [ ct load src => reg 1 , dir reply ] + [ bitwise reg 1 = (reg=1 & 0x00ffffff ) ^ 0x00000000 ] + [ cmp eq reg 1 0x0001a8c0 ] + +# ct daddr original 192.168.1.0/24 +ip test-ip4 output + [ ct load dst => reg 1 , dir original ] + [ bitwise reg 1 = (reg=1 & 0x00ffffff ) ^ 0x00000000 ] + [ cmp eq reg 1 0x0001a8c0 ] + +# ct daddr reply 192.168.1.0/24 +ip test-ip4 output + [ ct load dst => reg 1 , dir reply ] + [ bitwise reg 1 = (reg=1 & 0x00ffffff ) ^ 0x00000000 ] + [ cmp eq reg 1 0x0001a8c0 ] + +# ct l3proto original ipv4 +ip test-ip4 output + [ ct load l3protocol => reg 1 , dir original ] + [ cmp eq reg 1 0x00000002 ] + +# ct protocol original 6 ct proto-dst original 22 +ip test-ip4 output + [ ct load protocol => reg 1 , dir original ] + [ cmp eq reg 1 0x00000006 ] + [ ct load proto_dst => reg 1 , dir original ] + [ cmp eq reg 1 0x00001600 ] + +# ct protocol original 17 ct proto-src reply 53 +ip test-ip4 output + [ ct load protocol => reg 1 , dir original ] + [ cmp eq reg 1 0x00000011 ] + [ ct load proto_src => reg 1 , dir reply ] + [ cmp eq reg 1 0x00003500 ]