netstack3_filter/logic/
nat.rs

1// Copyright 2024 The Fuchsia Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5//! Network Address Translation.
6
7use core::fmt::Debug;
8use core::num::NonZeroU16;
9use core::ops::{ControlFlow, RangeInclusive};
10
11use derivative::Derivative;
12use log::{error, warn};
13use net_types::ip::IpVersionMarker;
14use net_types::SpecifiedAddr;
15use netstack3_base::sync::Mutex;
16use netstack3_base::{
17    Inspectable, InspectableValue, Inspector as _, IpAddressId as _, IpDeviceAddr, MarkDomain,
18    WeakIpAddressId,
19};
20use once_cell::sync::OnceCell;
21use packet_formats::ip::IpExt;
22use rand::Rng as _;
23
24use crate::actions::MarkAction;
25use crate::conntrack::{
26    CompatibleWith, Connection, ConnectionDirection, ConnectionExclusive, Table, TransportProtocol,
27};
28use crate::context::{FilterBindingsContext, FilterBindingsTypes, NatContext};
29use crate::logic::{IngressVerdict, Interfaces, RoutineResult, Verdict};
30use crate::packets::{IpPacket, MaybeTransportPacketMut as _, TransportPacketMut as _};
31use crate::state::{FilterMarkMetadata, Hook};
32
33/// The NAT configuration for a given conntrack connection.
34///
35/// Each type of NAT (source and destination) is configured exactly once for a
36/// given connection, for the first packet encountered on that connection. This
37/// is not to say that all connections are NATed: the configuration can be
38/// either `ShouldNat::Yes` or `ShouldNat::No`, but the `OnceCell` containing
39/// the configuration should, in most cases, be initialized by the time a
40/// connection is inserted in the conntrack table.
41#[derive(Derivative)]
42#[derivative(Default(bound = ""), Debug(bound = "A: Debug"), PartialEq(bound = ""))]
43pub struct NatConfig<I: IpExt, A> {
44    destination: OnceCell<ShouldNat<I, A>>,
45    source: OnceCell<ShouldNat<I, A>>,
46}
47
48/// The NAT configuration for a given type of NAT (either source or
49/// destination).
50#[derive(Derivative)]
51#[derivative(Debug(bound = "A: Debug"), PartialEq(bound = ""))]
52pub(crate) enum ShouldNat<I: IpExt, A> {
53    /// NAT should be performed on this connection.
54    ///
55    /// Optionally contains a `CachedAddr`, which is a weak reference to the address
56    /// used for NAT, if it is a dynamically assigned IP address owned by the stack.
57    Yes(#[derivative(PartialEq = "ignore")] Option<CachedAddr<I, A>>),
58    /// NAT should not be performed on this connection.
59    No,
60}
61
62impl<I: IpExt, A: PartialEq> CompatibleWith for NatConfig<I, A> {
63    fn compatible_with(&self, other: &Self) -> bool {
64        // Check for both SNAT and DNAT that either NAT is configured with the same
65        // value, or that it is unconfigured. When determining whether two connections
66        // are compatible, if NAT is configured differently for both, they are not
67        // compatible, but if NAT is either unconfigured or matches, they are considered
68        // to be compatible.
69        self.source.get().unwrap_or(&ShouldNat::No) == other.source.get().unwrap_or(&ShouldNat::No)
70            && self.destination.get().unwrap_or(&ShouldNat::No)
71                == other.destination.get().unwrap_or(&ShouldNat::No)
72    }
73}
74
75impl<I: IpExt, A, BT: FilterBindingsTypes> Connection<I, NatConfig<I, A>, BT> {
76    pub fn destination_nat(&self) -> bool {
77        match self.external_data().destination.get() {
78            Some(ShouldNat::Yes(_)) => true,
79            Some(ShouldNat::No) | None => false,
80        }
81    }
82}
83
84impl<I: IpExt, A: InspectableValue> Inspectable for NatConfig<I, A> {
85    fn record<Inspector: netstack3_base::Inspector>(&self, inspector: &mut Inspector) {
86        fn record_nat_status<
87            I: IpExt,
88            A: InspectableValue,
89            Inspector: netstack3_base::Inspector,
90        >(
91            inspector: &mut Inspector,
92            config: &OnceCell<ShouldNat<I, A>>,
93        ) {
94            let status = match config.get() {
95                None => "Unconfigured",
96                Some(ShouldNat::No) => "No-op",
97                Some(ShouldNat::Yes(cached_addr)) => {
98                    if let Some(CachedAddr { id, _marker }) = cached_addr {
99                        match &*id.lock() {
100                            Some(id) => inspector.record_inspectable_value("To", id),
101                            None => inspector.record_str("To", "InvalidAddress"),
102                        }
103                    }
104                    "NAT"
105                }
106            };
107            inspector.record_str("Status", status);
108        }
109
110        let Self { source, destination } = self;
111        inspector.record_child("NAT", |inspector| {
112            inspector
113                .record_child("Destination", |inspector| record_nat_status(inspector, destination));
114            inspector.record_child("Source", |inspector| record_nat_status(inspector, source));
115        });
116    }
117}
118
119/// A weak handle to the address assigned to a device. Allows checking for
120/// validity when using the address for NAT.
121#[derive(Derivative)]
122#[derivative(Debug(bound = "A: Debug"))]
123pub(crate) struct CachedAddr<I: IpExt, A> {
124    id: Mutex<Option<A>>,
125    _marker: IpVersionMarker<I>,
126}
127
128impl<I: IpExt, A> CachedAddr<I, A> {
129    fn new(id: A) -> Self {
130        Self { id: Mutex::new(Some(id)), _marker: IpVersionMarker::new() }
131    }
132}
133
134impl<I: IpExt, A: WeakIpAddressId<I::Addr>> CachedAddr<I, A> {
135    /// Check whether the provided IP address is still valid to be used for NAT.
136    ///
137    /// If the address is no longer valid, attempts to acquire a new handle to the
138    /// same address.
139    fn validate_or_replace<CC, BT>(
140        &self,
141        core_ctx: &mut CC,
142        device: &CC::DeviceId,
143        addr: I::Addr,
144    ) -> Verdict
145    where
146        CC: NatContext<I, BT, WeakAddressId = A>,
147        BT: FilterBindingsContext,
148    {
149        let Self { id, _marker } = self;
150
151        // If the address ID is still valid, use the address for NAT.
152        {
153            if id.lock().as_ref().map(|id| id.is_assigned()).unwrap_or(false) {
154                return Verdict::Accept(());
155            }
156        }
157
158        // Otherwise, try to re-acquire a new handle to the same address in case it has
159        // since been re-added to the device.
160        //
161        // NB: we release the lock around the `Option<WeakIpAddressId>` while we request
162        // a new address ID and then reacquire it to assign it in order to avoid any
163        // possible lock ordering issues. This does mean that there is a potential race
164        // here between two packets in the same conntrack flow updating `id`, but `id`
165        // should be eventually consistent with the state of the device addresses given
166        // each subsequent packet will check for its validity and try to update it if
167        // necessary.
168        match IpDeviceAddr::new(addr).and_then(|addr| core_ctx.get_address_id(device, addr)) {
169            Some(new) => {
170                *id.lock() = Some(new.downgrade());
171                Verdict::Accept(())
172            }
173            // If either the address we are using for NAT is not a valid `IpDeviceAddr` or
174            // the address is no longer assigned to the device, drop the ID, both to avoid
175            // further futile attempts to upgrade the weak reference and to allow the
176            // backing memory to be deallocated.
177            None => {
178                *id.lock() = None;
179                Verdict::Drop
180            }
181        }
182    }
183}
184
185/// A type of NAT that is performed on a given conntrack connection.
186#[derive(Debug, Clone, Copy, PartialEq)]
187pub enum NatType {
188    /// Destination NAT is performed.
189    Destination,
190    /// Source NAT is performed.
191    Source,
192}
193
194pub(crate) trait NatHook<I: IpExt> {
195    type Verdict<R: Debug>: FilterVerdict<R> + Debug;
196
197    fn verdict_behavior<R: Debug>(v: Self::Verdict<R>) -> ControlFlow<Self::Verdict<()>, R>;
198
199    const NAT_TYPE: NatType;
200
201    /// Evaluate the result of a given routine and returning the resulting control
202    /// flow.
203    fn evaluate_result<P, CC, BC>(
204        core_ctx: &mut CC,
205        bindings_ctx: &mut BC,
206        table: &Table<I, NatConfig<I, CC::WeakAddressId>, BC>,
207        conn: &mut ConnectionExclusive<I, NatConfig<I, CC::WeakAddressId>, BC>,
208        packet: &P,
209        interfaces: &Interfaces<'_, CC::DeviceId>,
210        result: RoutineResult<I>,
211    ) -> ControlFlow<Self::Verdict<NatConfigurationResult<I, CC::WeakAddressId, BC>>>
212    where
213        P: IpPacket<I>,
214        CC: NatContext<I, BC>,
215        BC: FilterBindingsContext;
216
217    /// Return the IP address that should be used for Redirect NAT in this NAT hook
218    /// and, if applicable, a weakly-held reference to the address if it is assigned
219    /// to an interface owned by the stack.
220    ///
221    /// # Panics
222    ///
223    /// Panics if called on a hook that does not support DNAT.
224    fn redirect_addr<P, CC, BT>(
225        core_ctx: &mut CC,
226        packet: &P,
227        ingress: Option<&CC::DeviceId>,
228    ) -> Option<(I::Addr, Option<CachedAddr<I, CC::WeakAddressId>>)>
229    where
230        P: IpPacket<I>,
231        CC: NatContext<I, BT>,
232        BT: FilterBindingsTypes;
233
234    /// Extract the relevant interface for this NAT hook from `interfaces`.
235    ///
236    /// # Panics
237    ///
238    /// Panics if the required interface (ingress for ingress hooks and egress for
239    /// egress hooks) is not provided to the NAT hook.
240    fn interface<DeviceId>(interfaces: Interfaces<'_, DeviceId>) -> &DeviceId;
241}
242
243pub(crate) trait FilterVerdict<R>: From<Verdict<R>> {
244    fn accept(&self) -> Option<&R>;
245}
246
247impl<R> FilterVerdict<R> for Verdict<R> {
248    fn accept(&self) -> Option<&R> {
249        match self {
250            Self::Accept(result) => Some(result),
251            Self::Drop => None,
252        }
253    }
254}
255
256impl<R> Verdict<R> {
257    fn into_behavior(self) -> ControlFlow<Verdict<()>, R> {
258        match self {
259            Self::Accept(result) => ControlFlow::Continue(result),
260            Self::Drop => ControlFlow::Break(Verdict::Drop.into()),
261        }
262    }
263}
264
265#[derive(Derivative)]
266#[derivative(Debug(bound = "A: Debug"))]
267pub(crate) enum NatConfigurationResult<I: IpExt, A, BT: FilterBindingsTypes> {
268    Result(ShouldNat<I, A>),
269    AdoptExisting(Connection<I, NatConfig<I, A>, BT>),
270}
271
272pub(crate) enum IngressHook {}
273
274impl<I: IpExt> NatHook<I> for IngressHook {
275    type Verdict<R: Debug> = IngressVerdict<I, R>;
276
277    fn verdict_behavior<R: Debug>(v: Self::Verdict<R>) -> ControlFlow<Self::Verdict<()>, R> {
278        v.into_behavior()
279    }
280
281    const NAT_TYPE: NatType = NatType::Destination;
282
283    fn evaluate_result<P, CC, BC>(
284        core_ctx: &mut CC,
285        bindings_ctx: &mut BC,
286        table: &Table<I, NatConfig<I, CC::WeakAddressId>, BC>,
287        conn: &mut ConnectionExclusive<I, NatConfig<I, CC::WeakAddressId>, BC>,
288        packet: &P,
289        interfaces: &Interfaces<'_, CC::DeviceId>,
290        result: RoutineResult<I>,
291    ) -> ControlFlow<Self::Verdict<NatConfigurationResult<I, CC::WeakAddressId, BC>>>
292    where
293        P: IpPacket<I>,
294        CC: NatContext<I, BC>,
295        BC: FilterBindingsContext,
296    {
297        match result {
298            RoutineResult::Accept | RoutineResult::Return => ControlFlow::Continue(()),
299            RoutineResult::Drop => ControlFlow::Break(Verdict::Drop.into()),
300            RoutineResult::TransparentLocalDelivery { addr, port } => {
301                ControlFlow::Break(IngressVerdict::TransparentLocalDelivery { addr, port })
302            }
303            RoutineResult::Redirect { dst_port } => {
304                ControlFlow::Break(configure_redirect_nat::<Self, _, _, _, _>(
305                    core_ctx,
306                    bindings_ctx,
307                    table,
308                    conn,
309                    packet,
310                    interfaces,
311                    dst_port,
312                ))
313            }
314            result @ RoutineResult::Masquerade { .. } => {
315                unreachable!("SNAT not supported in INGRESS; got {result:?}")
316            }
317        }
318    }
319
320    fn redirect_addr<P, CC, BT>(
321        core_ctx: &mut CC,
322        packet: &P,
323        ingress: Option<&CC::DeviceId>,
324    ) -> Option<(I::Addr, Option<CachedAddr<I, CC::WeakAddressId>>)>
325    where
326        P: IpPacket<I>,
327        CC: NatContext<I, BT>,
328        BT: FilterBindingsTypes,
329    {
330        let interface = ingress.expect("must have ingress interface in ingress hook");
331        let addr_id = core_ctx
332            .get_local_addr_for_remote(interface, SpecifiedAddr::new(packet.src_addr()))
333            .or_else(|| {
334                warn!(
335                    "cannot redirect because there is no address assigned to the incoming \
336                    interface {interface:?}; dropping packet",
337                );
338                None
339            })?;
340        let addr = addr_id.addr();
341        Some((addr.addr(), Some(CachedAddr::new(addr_id.downgrade()))))
342    }
343
344    fn interface<DeviceId>(interfaces: Interfaces<'_, DeviceId>) -> &DeviceId {
345        let Interfaces { ingress, egress: _ } = interfaces;
346        ingress.expect("ingress interface must be provided to INGRESS hook")
347    }
348}
349
350impl<I: IpExt, R> FilterVerdict<R> for IngressVerdict<I, R> {
351    fn accept(&self) -> Option<&R> {
352        match self {
353            Self::Verdict(Verdict::Accept(result)) => Some(result),
354            Self::Verdict(Verdict::Drop) | Self::TransparentLocalDelivery { .. } => None,
355        }
356    }
357}
358
359impl<I: IpExt, R> IngressVerdict<I, R> {
360    fn into_behavior(self) -> ControlFlow<IngressVerdict<I, ()>, R> {
361        match self {
362            Self::Verdict(v) => match v.into_behavior() {
363                ControlFlow::Continue(r) => ControlFlow::Continue(r),
364                ControlFlow::Break(v) => ControlFlow::Break(v.into()),
365            },
366            Self::TransparentLocalDelivery { addr, port } => {
367                ControlFlow::Break(IngressVerdict::TransparentLocalDelivery { addr, port })
368            }
369        }
370    }
371}
372
373pub(crate) enum LocalEgressHook {}
374
375impl<I: IpExt> NatHook<I> for LocalEgressHook {
376    type Verdict<R: Debug> = Verdict<R>;
377
378    fn verdict_behavior<R: Debug>(v: Self::Verdict<R>) -> ControlFlow<Self::Verdict<()>, R> {
379        v.into_behavior()
380    }
381
382    const NAT_TYPE: NatType = NatType::Destination;
383
384    fn evaluate_result<P, CC, BC>(
385        core_ctx: &mut CC,
386        bindings_ctx: &mut BC,
387        table: &Table<I, NatConfig<I, CC::WeakAddressId>, BC>,
388        conn: &mut ConnectionExclusive<I, NatConfig<I, CC::WeakAddressId>, BC>,
389        packet: &P,
390        interfaces: &Interfaces<'_, CC::DeviceId>,
391        result: RoutineResult<I>,
392    ) -> ControlFlow<Self::Verdict<NatConfigurationResult<I, CC::WeakAddressId, BC>>>
393    where
394        P: IpPacket<I>,
395        CC: NatContext<I, BC>,
396        BC: FilterBindingsContext,
397    {
398        match result {
399            RoutineResult::Accept | RoutineResult::Return => ControlFlow::Continue(()),
400            RoutineResult::Drop => ControlFlow::Break(Verdict::Drop.into()),
401            result @ RoutineResult::TransparentLocalDelivery { .. } => {
402                unreachable!(
403                    "transparent local delivery is only valid in INGRESS hook; got {result:?}"
404                )
405            }
406            result @ RoutineResult::Masquerade { .. } => {
407                unreachable!("SNAT not supported in LOCAL_EGRESS; got {result:?}")
408            }
409            RoutineResult::Redirect { dst_port } => {
410                ControlFlow::Break(configure_redirect_nat::<Self, _, _, _, _>(
411                    core_ctx,
412                    bindings_ctx,
413                    table,
414                    conn,
415                    packet,
416                    interfaces,
417                    dst_port,
418                ))
419            }
420        }
421    }
422
423    fn redirect_addr<P, CC, BT>(
424        _: &mut CC,
425        _: &P,
426        _: Option<&CC::DeviceId>,
427    ) -> Option<(I::Addr, Option<CachedAddr<I, CC::WeakAddressId>>)>
428    where
429        P: IpPacket<I>,
430        CC: NatContext<I, BT>,
431        BT: FilterBindingsTypes,
432    {
433        Some((*I::LOOPBACK_ADDRESS, None))
434    }
435
436    fn interface<DeviceId>(interfaces: Interfaces<'_, DeviceId>) -> &DeviceId {
437        let Interfaces { ingress: _, egress } = interfaces;
438        egress.expect("egress interface must be provided to LOCAL_EGRESS hook")
439    }
440}
441
442pub(crate) enum LocalIngressHook {}
443
444impl<I: IpExt> NatHook<I> for LocalIngressHook {
445    type Verdict<R: Debug> = Verdict<R>;
446
447    fn verdict_behavior<R: Debug>(v: Self::Verdict<R>) -> ControlFlow<Self::Verdict<()>, R> {
448        v.into_behavior()
449    }
450
451    const NAT_TYPE: NatType = NatType::Source;
452
453    fn evaluate_result<P, CC, BC>(
454        _core_ctx: &mut CC,
455        _bindings_ctx: &mut BC,
456        _table: &Table<I, NatConfig<I, CC::WeakAddressId>, BC>,
457        _conn: &mut ConnectionExclusive<I, NatConfig<I, CC::WeakAddressId>, BC>,
458        _packet: &P,
459        _interfaces: &Interfaces<'_, CC::DeviceId>,
460        result: RoutineResult<I>,
461    ) -> ControlFlow<Self::Verdict<NatConfigurationResult<I, CC::WeakAddressId, BC>>>
462    where
463        P: IpPacket<I>,
464        CC: NatContext<I, BC>,
465        BC: FilterBindingsContext,
466    {
467        match result {
468            RoutineResult::Accept | RoutineResult::Return => ControlFlow::Continue(()),
469            RoutineResult::Drop => ControlFlow::Break(Verdict::Drop.into()),
470            result @ RoutineResult::Masquerade { .. } => {
471                unreachable!("Masquerade not supported in LOCAL_INGRESS; got {result:?}")
472            }
473            result @ RoutineResult::TransparentLocalDelivery { .. } => {
474                unreachable!(
475                    "transparent local delivery is only valid in INGRESS hook; got {result:?}"
476                )
477            }
478            result @ RoutineResult::Redirect { .. } => {
479                unreachable!("DNAT not supported in LOCAL_INGRESS; got {result:?}")
480            }
481        }
482    }
483
484    fn redirect_addr<P, CC, BT>(
485        _: &mut CC,
486        _: &P,
487        _: Option<&CC::DeviceId>,
488    ) -> Option<(I::Addr, Option<CachedAddr<I, CC::WeakAddressId>>)>
489    where
490        P: IpPacket<I>,
491        CC: NatContext<I, BT>,
492        BT: FilterBindingsTypes,
493    {
494        unreachable!("DNAT not supported in LOCAL_INGRESS; cannot perform redirect action")
495    }
496
497    fn interface<DeviceId>(interfaces: Interfaces<'_, DeviceId>) -> &DeviceId {
498        let Interfaces { ingress, egress: _ } = interfaces;
499        ingress.expect("ingress interface must be provided to LOCAL_INGRESS hook")
500    }
501}
502
503pub(crate) enum EgressHook {}
504
505impl<I: IpExt> NatHook<I> for EgressHook {
506    type Verdict<R: Debug> = Verdict<R>;
507
508    fn verdict_behavior<R: Debug>(v: Self::Verdict<R>) -> ControlFlow<Self::Verdict<()>, R> {
509        v.into_behavior()
510    }
511
512    const NAT_TYPE: NatType = NatType::Source;
513
514    fn evaluate_result<P, CC, BC>(
515        core_ctx: &mut CC,
516        bindings_ctx: &mut BC,
517        table: &Table<I, NatConfig<I, CC::WeakAddressId>, BC>,
518        conn: &mut ConnectionExclusive<I, NatConfig<I, CC::WeakAddressId>, BC>,
519        packet: &P,
520        interfaces: &Interfaces<'_, CC::DeviceId>,
521        result: RoutineResult<I>,
522    ) -> ControlFlow<Self::Verdict<NatConfigurationResult<I, CC::WeakAddressId, BC>>>
523    where
524        P: IpPacket<I>,
525        CC: NatContext<I, BC>,
526        BC: FilterBindingsContext,
527    {
528        match result {
529            RoutineResult::Accept | RoutineResult::Return => ControlFlow::Continue(()),
530            RoutineResult::Drop => ControlFlow::Break(Verdict::Drop.into()),
531            RoutineResult::Masquerade { src_port } => {
532                ControlFlow::Break(configure_masquerade_nat::<_, _, _, _>(
533                    core_ctx,
534                    bindings_ctx,
535                    table,
536                    conn,
537                    packet,
538                    interfaces,
539                    src_port,
540                ))
541            }
542            result @ RoutineResult::TransparentLocalDelivery { .. } => {
543                unreachable!(
544                    "transparent local delivery is only valid in INGRESS hook; got {result:?}"
545                )
546            }
547            result @ RoutineResult::Redirect { .. } => {
548                unreachable!("DNAT not supported in EGRESS; got {result:?}")
549            }
550        }
551    }
552
553    fn redirect_addr<P, CC, BT>(
554        _: &mut CC,
555        _: &P,
556        _: Option<&CC::DeviceId>,
557    ) -> Option<(I::Addr, Option<CachedAddr<I, CC::WeakAddressId>>)>
558    where
559        P: IpPacket<I>,
560        CC: NatContext<I, BT>,
561        BT: FilterBindingsTypes,
562    {
563        unreachable!("DNAT not supported in EGRESS; cannot perform redirect action")
564    }
565
566    fn interface<DeviceId>(interfaces: Interfaces<'_, DeviceId>) -> &DeviceId {
567        let Interfaces { ingress: _, egress } = interfaces;
568        egress.expect("egress interface must be provided to EGRESS hook")
569    }
570}
571
572impl<I: IpExt, A, BT: FilterBindingsTypes> Connection<I, NatConfig<I, A>, BT> {
573    fn relevant_config(
574        &self,
575        hook_nat_type: NatType,
576        direction: ConnectionDirection,
577    ) -> (&OnceCell<ShouldNat<I, A>>, NatType) {
578        let NatConfig { source, destination } = self.external_data();
579        match (hook_nat_type, direction) {
580            // If either this is a DNAT hook and we are looking at a packet in the
581            // "original" direction, or this is an SNAT hook and we are looking at a reply
582            // packet, then we want to decide whether to NAT based on whether the connection
583            // has DNAT configured.
584            (NatType::Destination, ConnectionDirection::Original)
585            | (NatType::Source, ConnectionDirection::Reply) => (destination, NatType::Destination),
586            // If either this is an SNAT hook and we are looking at a packet in the
587            // "original" direction, or this is a DNAT hook and we are looking at a reply
588            // packet, then we want to decide whether to NAT based on whether the connection
589            // has SNAT configured.
590            (NatType::Source, ConnectionDirection::Original)
591            | (NatType::Destination, ConnectionDirection::Reply) => (source, NatType::Source),
592        }
593    }
594
595    fn relevant_reply_tuple_addr(&self, nat_type: NatType) -> I::Addr {
596        match nat_type {
597            NatType::Destination => self.reply_tuple().src_addr,
598            NatType::Source => self.reply_tuple().dst_addr,
599        }
600    }
601
602    /// Gets a reference to the appropriate NAT config depending on the NAT hook we
603    /// are in and the direction of the packet with respect to its conntrack
604    /// connection.
605    fn nat_config(
606        &self,
607        hook_nat_type: NatType,
608        direction: ConnectionDirection,
609    ) -> Option<&ShouldNat<I, A>> {
610        let (config, _nat_type) = self.relevant_config(hook_nat_type, direction);
611        config.get()
612    }
613
614    /// Sets the appropriate NAT config to the provided value. Which NAT config is
615    /// appropriate depends on the NAT hook we are in and the direction of the
616    /// packet with respect to its conntrack connection.
617    ///
618    /// Returns a reference to the value that was inserted, if the config had not
619    /// yet been initialized; otherwise, returns the existing value of the config,
620    /// along with the type of NAT it is (for diagnostic purposes).
621    fn set_nat_config(
622        &self,
623        hook_nat_type: NatType,
624        direction: ConnectionDirection,
625        value: ShouldNat<I, A>,
626    ) -> Result<&ShouldNat<I, A>, (ShouldNat<I, A>, NatType)> {
627        let (config, nat_type) = self.relevant_config(hook_nat_type, direction);
628        let mut value = Some(value);
629        let config = config.get_or_init(|| value.take().unwrap());
630        match value {
631            None => Ok(config),
632            Some(value) => Err((value, nat_type)),
633        }
634    }
635}
636
637/// The entry point for NAT logic from an IP layer filtering hook.
638///
639/// This function configures NAT, if it has not yet been configured for the
640/// connection, and performs NAT on the provided packet based on the hook and
641/// the connection's NAT configuration.
642pub(crate) fn perform_nat<N, I, P, CC, BC>(
643    core_ctx: &mut CC,
644    bindings_ctx: &mut BC,
645    nat_installed: bool,
646    table: &Table<I, NatConfig<I, CC::WeakAddressId>, BC>,
647    conn: &mut Connection<I, NatConfig<I, CC::WeakAddressId>, BC>,
648    direction: ConnectionDirection,
649    hook: &Hook<I, BC::DeviceClass, ()>,
650    packet: &mut P,
651    interfaces: Interfaces<'_, CC::DeviceId>,
652) -> N::Verdict<()>
653where
654    N: NatHook<I>,
655    I: IpExt,
656    P: IpPacket<I>,
657    CC: NatContext<I, BC>,
658    BC: FilterBindingsContext,
659{
660    if !nat_installed {
661        return Verdict::Accept(()).into();
662    }
663
664    let nat_config = if let Some(nat) = conn.nat_config(N::NAT_TYPE, direction) {
665        nat
666    } else {
667        // NAT has not yet been configured for this connection; traverse the installed
668        // NAT routines in order to configure NAT.
669        let (verdict, exclusive) = match (&mut *conn, direction) {
670            (Connection::Exclusive(_), ConnectionDirection::Reply) => {
671                // This is the first packet in the flow (hence the connection being exclusive),
672                // yet the packet is determined to be in the "reply" direction. This means that
673                // this is a self-connected flow. When a connection's original tuple is the same
674                // as its reply tuple, every packet on the connection is considered to be in the
675                // reply direction, which is an implementation quirk that allows self-connected
676                // flows to be considered immediately "established".
677                //
678                // Handle this by just configuring the connection not to be NATed. It does not
679                // make sense to NAT a self-connected flow since the original and reply
680                // directions are indistinguishable.
681                (Verdict::Accept(NatConfigurationResult::Result(ShouldNat::No)).into(), true)
682            }
683            (Connection::Shared(_), _) => {
684                // In most scenarios, NAT should be configured for every connection before it is
685                // inserted in the conntrack table, at which point it becomes a shared
686                // connection. (This should apply whether or not NAT will actually be performed;
687                // the configuration could be `DoNotNat`.) However, as an optimization, when no
688                // NAT rules have been installed, performing NAT is skipped entirely, which can
689                // result in some connections being finalized without NAT being configured for
690                // them. To handle this, just don't NAT the connection.
691                (Verdict::Accept(NatConfigurationResult::Result(ShouldNat::No)).into(), false)
692            }
693            (Connection::Exclusive(conn), ConnectionDirection::Original) => {
694                let verdict = configure_nat::<N, _, _, _, _>(
695                    core_ctx,
696                    bindings_ctx,
697                    table,
698                    conn,
699                    hook,
700                    packet,
701                    interfaces.clone(),
702                );
703                // Configure source port remapping for a connection by default even if its first
704                // packet does not match any NAT rules, in order to ensure that source ports for
705                // locally-generated traffic do not clash with ports used by existing NATed
706                // connections (such as for forwarded masqueraded traffic).
707                let verdict = if matches!(
708                    verdict.accept(),
709                    Some(&NatConfigurationResult::Result(ShouldNat::No))
710                ) && N::NAT_TYPE == NatType::Source
711                {
712                    configure_snat_port(
713                        bindings_ctx,
714                        table,
715                        conn,
716                        None, /* src_port_range */
717                        ConflictStrategy::AdoptExisting,
718                    )
719                    .into()
720                } else {
721                    verdict
722                };
723                (verdict, true)
724            }
725        };
726
727        let result = match N::verdict_behavior(verdict) {
728            ControlFlow::Break(verdict) => {
729                return verdict;
730            }
731            ControlFlow::Continue(result) => result,
732        };
733        let new_nat_config = match result {
734            NatConfigurationResult::Result(config) => Some(config),
735            NatConfigurationResult::AdoptExisting(existing) => {
736                *conn = existing;
737                None
738            }
739        };
740        if let Some(config) = new_nat_config {
741            conn.set_nat_config(N::NAT_TYPE, direction, config).unwrap_or_else(
742                |(value, nat_type)| {
743                    // We can only assert that NAT has not been configured yet if we are configuring
744                    // NAT on an exclusive connection. If the connection has already been inserted
745                    // in the table and we are holding a shared reference to it, we could race with
746                    // another thread also configuring NAT for the connection.
747                    if exclusive {
748                        unreachable!(
749                            "{nat_type:?} NAT should not have been configured yet, but found \
750                            {value:?}"
751                        );
752                    }
753                    &ShouldNat::No
754                },
755            )
756        } else {
757            conn.nat_config(N::NAT_TYPE, direction).unwrap_or(&ShouldNat::No)
758        }
759    };
760
761    match nat_config {
762        ShouldNat::No => return Verdict::Accept(()).into(),
763        // If we are NATing this connection, but are not using an IP address that is
764        // dynamically assigned to an interface to do so, continue to rewrite the
765        // packet.
766        ShouldNat::Yes(None) => {}
767        // If we are NATing to an IP address assigned to an interface, ensure that the
768        // address is still valid before performing NAT.
769        ShouldNat::Yes(Some(cached_addr)) => {
770            // Only check the validity of the cached address if we are looking at a packet
771            // in the original direction. Packets in the reply direction are rewritten based
772            // on the original tuple, which is unchanged by NAT and therefore not necessary
773            // to check for validity.
774            if direction == ConnectionDirection::Original {
775                match cached_addr.validate_or_replace(
776                    core_ctx,
777                    N::interface(interfaces),
778                    conn.relevant_reply_tuple_addr(N::NAT_TYPE),
779                ) {
780                    Verdict::Accept(()) => {}
781                    Verdict::Drop => return Verdict::Drop.into(),
782                }
783            }
784        }
785    }
786    rewrite_packet(conn, direction, N::NAT_TYPE, packet).into()
787}
788
789struct NatMetadata {}
790
791impl FilterMarkMetadata for NatMetadata {
792    fn apply_mark_action(&mut self, domain: MarkDomain, action: MarkAction) {
793        unreachable!("nat is not expected to configure packet marks, got {domain:?} -> {action:?}");
794    }
795}
796
797/// Configure NAT by rewriting the provided reply tuple of a connection.
798///
799/// Evaluates the NAT routines at the provided hook and, on finding a rule that
800/// matches the provided packet, configures NAT based on the rule's action. Note
801/// that because NAT routines can contain a superset of the rules filter
802/// routines can, it's possible for this packet to hit a non-NAT action.
803fn configure_nat<N, I, P, CC, BC>(
804    core_ctx: &mut CC,
805    bindings_ctx: &mut BC,
806    table: &Table<I, NatConfig<I, CC::WeakAddressId>, BC>,
807    conn: &mut ConnectionExclusive<I, NatConfig<I, CC::WeakAddressId>, BC>,
808    hook: &Hook<I, BC::DeviceClass, ()>,
809    packet: &P,
810    interfaces: Interfaces<'_, CC::DeviceId>,
811) -> N::Verdict<NatConfigurationResult<I, CC::WeakAddressId, BC>>
812where
813    N: NatHook<I>,
814    I: IpExt,
815    P: IpPacket<I>,
816    CC: NatContext<I, BC>,
817    BC: FilterBindingsContext,
818{
819    let Hook { routines } = hook;
820    for routine in routines {
821        let result = super::check_routine(&routine, packet, &interfaces, &mut NatMetadata {});
822        match N::evaluate_result(core_ctx, bindings_ctx, table, conn, packet, &interfaces, result) {
823            ControlFlow::Break(result) => return result,
824            ControlFlow::Continue(()) => {}
825        }
826    }
827    Verdict::Accept(NatConfigurationResult::Result(ShouldNat::No)).into()
828}
829
830/// Configure Redirect NAT, a special case of DNAT that redirects the packet to
831/// the local host.
832fn configure_redirect_nat<N, I, P, CC, BC>(
833    core_ctx: &mut CC,
834    bindings_ctx: &mut BC,
835    table: &Table<I, NatConfig<I, CC::WeakAddressId>, BC>,
836    conn: &mut ConnectionExclusive<I, NatConfig<I, CC::WeakAddressId>, BC>,
837    packet: &P,
838    interfaces: &Interfaces<'_, CC::DeviceId>,
839    dst_port_range: Option<RangeInclusive<NonZeroU16>>,
840) -> N::Verdict<NatConfigurationResult<I, CC::WeakAddressId, BC>>
841where
842    N: NatHook<I>,
843    I: IpExt,
844    P: IpPacket<I>,
845    CC: NatContext<I, BC>,
846    BC: FilterBindingsContext,
847{
848    match N::NAT_TYPE {
849        NatType::Source => panic!("DNAT action called from SNAT-only hook"),
850        NatType::Destination => {}
851    }
852
853    // Choose an appropriate new destination address and, optionally, port. Then
854    // rewrite the source address/port of the reply tuple for the connection to use
855    // as the guide for future packet rewriting.
856    //
857    // If we are in INGRESS, use the primary address of the incoming interface; if
858    // we are in LOCAL_EGRESS, use the loopback address.
859    let Some((addr, cached_addr)) = N::redirect_addr(core_ctx, packet, interfaces.ingress) else {
860        return Verdict::Drop.into();
861    };
862    conn.rewrite_reply_src_addr(addr);
863
864    let Some(range) = dst_port_range else {
865        return Verdict::Accept(NatConfigurationResult::Result(ShouldNat::Yes(cached_addr))).into();
866    };
867    match rewrite_reply_tuple_port(
868        bindings_ctx,
869        table,
870        conn,
871        ReplyTuplePort::Source,
872        range,
873        true, /* ensure_port_in_range */
874        ConflictStrategy::RewritePort,
875    ) {
876        // We are already NATing the address, so even if NATing the port is unnecessary,
877        // the connection as a whole still needs to be NATed.
878        Verdict::Accept(
879            NatConfigurationResult::Result(ShouldNat::Yes(_))
880            | NatConfigurationResult::Result(ShouldNat::No),
881        ) => Verdict::Accept(NatConfigurationResult::Result(ShouldNat::Yes(cached_addr))),
882        Verdict::Accept(NatConfigurationResult::AdoptExisting(_)) => {
883            unreachable!("cannot adopt existing connection")
884        }
885        Verdict::Drop => Verdict::Drop,
886    }
887    .into()
888}
889
890/// Configure Masquerade NAT, a special case of SNAT that rewrites the source IP
891/// address of the packet to an address that is assigned to the outgoing
892/// interface.
893fn configure_masquerade_nat<I, P, CC, BC>(
894    core_ctx: &mut CC,
895    bindings_ctx: &mut BC,
896    table: &Table<I, NatConfig<I, CC::WeakAddressId>, BC>,
897    conn: &mut ConnectionExclusive<I, NatConfig<I, CC::WeakAddressId>, BC>,
898    packet: &P,
899    interfaces: &Interfaces<'_, CC::DeviceId>,
900    src_port_range: Option<RangeInclusive<NonZeroU16>>,
901) -> Verdict<NatConfigurationResult<I, CC::WeakAddressId, BC>>
902where
903    I: IpExt,
904    P: IpPacket<I>,
905    CC: NatContext<I, BC>,
906    BC: FilterBindingsContext,
907{
908    // Choose an appropriate new source address and, optionally, port. Then rewrite
909    // the destination address/port of the reply tuple for the connection to use as
910    // the guide for future packet rewriting.
911    let interface = interfaces.egress.expect(
912        "must have egress interface in EGRESS hook; Masquerade NAT is only valid in EGRESS",
913    );
914    let Some(addr) =
915        core_ctx.get_local_addr_for_remote(interface, SpecifiedAddr::new(packet.dst_addr()))
916    else {
917        // TODO(https://fxbug.dev/372549231): add a counter for this scenario.
918        warn!(
919            "cannot masquerade because there is no address assigned to the outgoing interface \
920            {interface:?}; dropping packet",
921        );
922        return Verdict::Drop;
923    };
924    conn.rewrite_reply_dst_addr(addr.addr().addr());
925
926    // Rewrite the source port if necessary to avoid conflicting with existing
927    // tracked connections.
928    match configure_snat_port(
929        bindings_ctx,
930        table,
931        conn,
932        src_port_range,
933        ConflictStrategy::RewritePort,
934    ) {
935        // We are already NATing the address, so even if NATing the port is unnecessary,
936        // the connection as a whole still needs to be NATed.
937        Verdict::Accept(
938            NatConfigurationResult::Result(ShouldNat::Yes(_))
939            | NatConfigurationResult::Result(ShouldNat::No),
940        ) => Verdict::Accept(NatConfigurationResult::Result(ShouldNat::Yes(Some(
941            CachedAddr::new(addr.downgrade()),
942        )))),
943        Verdict::Accept(NatConfigurationResult::AdoptExisting(_)) => {
944            unreachable!("cannot adopt existing connection")
945        }
946        Verdict::Drop => Verdict::Drop,
947    }
948}
949
950fn configure_snat_port<I, A, BC>(
951    bindings_ctx: &mut BC,
952    table: &Table<I, NatConfig<I, A>, BC>,
953    conn: &mut ConnectionExclusive<I, NatConfig<I, A>, BC>,
954    src_port_range: Option<RangeInclusive<NonZeroU16>>,
955    conflict_strategy: ConflictStrategy,
956) -> Verdict<NatConfigurationResult<I, A, BC>>
957where
958    I: IpExt,
959    BC: FilterBindingsContext,
960    A: PartialEq,
961{
962    // Rewrite the source port if necessary to avoid conflicting with existing
963    // tracked connections. If a source port range was specified, we also ensure the
964    // port is in that range; otherwise, we attempt to rewrite into a "similar"
965    // range to the current value, and only if required to avoid a conflict.
966    let (range, ensure_port_in_range) = if let Some(range) = src_port_range {
967        (range, true)
968    } else {
969        let reply_tuple = conn.reply_tuple();
970        let Some(range) =
971            similar_port_or_id_range(reply_tuple.protocol, reply_tuple.dst_port_or_id)
972        else {
973            return Verdict::Drop;
974        };
975        (range, false)
976    };
977    rewrite_reply_tuple_port(
978        bindings_ctx,
979        table,
980        conn,
981        ReplyTuplePort::Destination,
982        range,
983        ensure_port_in_range,
984        conflict_strategy,
985    )
986}
987
988/// Choose a range of "similar" values to which transport-layer port or ID can
989/// be rewritten -- that is, a value that is likely to be similar in terms of
990/// privilege, or lack thereof.
991///
992/// The heuristics used in this function are chosen to roughly match those used
993/// by Netstack2/gVisor and Linux.
994fn similar_port_or_id_range(
995    protocol: TransportProtocol,
996    port_or_id: u16,
997) -> Option<RangeInclusive<NonZeroU16>> {
998    match protocol {
999        TransportProtocol::Tcp | TransportProtocol::Udp => Some(match port_or_id {
1000            _ if port_or_id < 512 => NonZeroU16::MIN..=NonZeroU16::new(511).unwrap(),
1001            _ if port_or_id < 1024 => NonZeroU16::MIN..=NonZeroU16::new(1023).unwrap(),
1002            _ => NonZeroU16::new(1024).unwrap()..=NonZeroU16::MAX,
1003        }),
1004        // TODO(https://fxbug.dev/341128580): allow rewriting ICMP echo ID to zero.
1005        TransportProtocol::Icmp => Some(NonZeroU16::MIN..=NonZeroU16::MAX),
1006        TransportProtocol::Other(p) => {
1007            error!(
1008                "cannot rewrite port or ID of unsupported transport protocol {p}; dropping packet"
1009            );
1010            None
1011        }
1012    }
1013}
1014
1015#[derive(Clone, Copy)]
1016enum ReplyTuplePort {
1017    Source,
1018    Destination,
1019}
1020
1021enum ConflictStrategy {
1022    AdoptExisting,
1023    RewritePort,
1024}
1025
1026/// Attempt to rewrite the indicated port of the reply tuple of the provided
1027/// connection such that it results in a unique tuple, and, if
1028/// `ensure_port_in_range` is `true`, also that it fits in the specified range.
1029fn rewrite_reply_tuple_port<I: IpExt, BC: FilterBindingsContext, A: PartialEq>(
1030    bindings_ctx: &mut BC,
1031    table: &Table<I, NatConfig<I, A>, BC>,
1032    conn: &mut ConnectionExclusive<I, NatConfig<I, A>, BC>,
1033    which_port: ReplyTuplePort,
1034    port_range: RangeInclusive<NonZeroU16>,
1035    ensure_port_in_range: bool,
1036    conflict_strategy: ConflictStrategy,
1037) -> Verdict<NatConfigurationResult<I, A, BC>> {
1038    // We only need to rewrite the port if the reply tuple of the connection
1039    // conflicts with another connection in the table, or if the port must be
1040    // rewritten to fall in the specified range.
1041    let current_port = match which_port {
1042        ReplyTuplePort::Source => conn.reply_tuple().src_port_or_id,
1043        ReplyTuplePort::Destination => conn.reply_tuple().dst_port_or_id,
1044    };
1045    let already_in_range = !ensure_port_in_range
1046        || NonZeroU16::new(current_port).map(|port| port_range.contains(&port)).unwrap_or(false);
1047    if already_in_range {
1048        match table.get_shared_connection(conn.reply_tuple()) {
1049            None => return Verdict::Accept(NatConfigurationResult::Result(ShouldNat::No)),
1050            Some(conflict) => match conflict_strategy {
1051                ConflictStrategy::AdoptExisting => {
1052                    // If this connection is identical to the conflicting one that's already in the
1053                    // table, including both its original and reply tuple and its NAT configuration,
1054                    // simply adopt the existing one rather than attempting port remapping.
1055                    if conflict.compatible_with(&*conn) {
1056                        return Verdict::Accept(NatConfigurationResult::AdoptExisting(
1057                            Connection::Shared(conflict),
1058                        ));
1059                    }
1060                }
1061                ConflictStrategy::RewritePort => {}
1062            },
1063        }
1064    }
1065
1066    // Attempt to find a new port in the provided range that results in a unique
1067    // tuple. Start by selecting a random offset into the target range, and from
1068    // there increment the candidate port, wrapping around until all ports in
1069    // the range have been checked (or MAX_ATTEMPTS has been exceeded).
1070    //
1071    // As soon as we find a port that would result in a unique tuple, stop and
1072    // accept the packet. If we search the entire range and fail to find a port
1073    // that creates a unique tuple, drop the packet.
1074    const MAX_ATTEMPTS: u16 = 128;
1075    let len = port_range.end().get() - port_range.start().get() + 1;
1076    let mut rng = bindings_ctx.rng();
1077    let start = rng.gen_range(port_range.start().get()..=port_range.end().get());
1078    for i in 0..core::cmp::min(MAX_ATTEMPTS, len) {
1079        // `offset` is <= the size of `port_range`, which is a range of `NonZerou16`, so
1080        // `port_range.start()` + `offset` is guaranteed to fit in a `NonZeroU16`.
1081        let offset = (start + i) % len;
1082        let new_port = port_range.start().checked_add(offset).unwrap();
1083        match which_port {
1084            ReplyTuplePort::Source => conn.rewrite_reply_src_port_or_id(new_port.get()),
1085            ReplyTuplePort::Destination => conn.rewrite_reply_dst_port_or_id(new_port.get()),
1086        };
1087        if !table.contains_tuple(conn.reply_tuple()) {
1088            return Verdict::Accept(NatConfigurationResult::Result(ShouldNat::Yes(None)));
1089        }
1090    }
1091
1092    Verdict::Drop
1093}
1094
1095/// Perform NAT on a packet, using its connection in the conntrack table as a
1096/// guide.
1097fn rewrite_packet<I, P, A, BT>(
1098    conn: &Connection<I, NatConfig<I, A>, BT>,
1099    direction: ConnectionDirection,
1100    nat: NatType,
1101    packet: &mut P,
1102) -> Verdict
1103where
1104    I: IpExt,
1105    P: IpPacket<I>,
1106    BT: FilterBindingsTypes,
1107{
1108    // If this packet is in the "original" direction of the connection, rewrite its
1109    // address and port from the connection's reply tuple. If this is a reply
1110    // packet, rewrite it using the *original* tuple so the traffic is seen to
1111    // originate from or be destined to the expected peer.
1112    //
1113    // The reply tuple functions both as a way to mark what we expect to see coming
1114    // in, *and* a way to stash what the NAT remapping should be.
1115    let tuple = match direction {
1116        ConnectionDirection::Original => conn.reply_tuple(),
1117        ConnectionDirection::Reply => conn.original_tuple(),
1118    };
1119    match nat {
1120        NatType::Destination => {
1121            let (new_dst_addr, new_dst_port) = (tuple.src_addr, tuple.src_port_or_id);
1122
1123            packet.set_dst_addr(new_dst_addr);
1124            let proto = packet.protocol();
1125            let mut transport = packet.transport_packet_mut();
1126            let Some(mut transport) = transport.transport_packet_mut() else {
1127                return Verdict::Accept(());
1128            };
1129            let Some(new_dst_port) = NonZeroU16::new(new_dst_port) else {
1130                // TODO(https://fxbug.dev/341128580): allow rewriting port to zero if allowed by
1131                // the transport-layer protocol.
1132                error!("cannot rewrite dst port to unspecified; dropping {proto} packet");
1133                return Verdict::Drop;
1134            };
1135            transport.set_dst_port(new_dst_port);
1136        }
1137        NatType::Source => {
1138            let (new_src_addr, new_src_port) = (tuple.dst_addr, tuple.dst_port_or_id);
1139
1140            packet.set_src_addr(new_src_addr);
1141            let proto = packet.protocol();
1142            let mut transport = packet.transport_packet_mut();
1143            let Some(mut transport) = transport.transport_packet_mut() else {
1144                return Verdict::Accept(());
1145            };
1146            let Some(new_src_port) = NonZeroU16::new(new_src_port) else {
1147                // TODO(https://fxbug.dev/341128580): allow rewriting port to zero if allowed by
1148                // the transport-layer protocol.
1149                error!("cannot rewrite src port to unspecified; dropping {proto} packet");
1150                return Verdict::Drop;
1151            };
1152            transport.set_src_port(new_src_port);
1153        }
1154    }
1155    Verdict::Accept(())
1156}
1157
1158#[cfg(test)]
1159mod tests {
1160    use alloc::sync::Arc;
1161    use alloc::vec;
1162    use core::marker::PhantomData;
1163
1164    use assert_matches::assert_matches;
1165    use ip_test_macro::ip_test;
1166    use net_types::ip::{AddrSubnet, Ipv4};
1167    use netstack3_base::IntoCoreTimerCtx;
1168    use test_case::test_case;
1169
1170    use super::*;
1171    use crate::conntrack::{PacketMetadata, Tuple};
1172    use crate::context::testutil::{
1173        FakeBindingsCtx, FakeDeviceClass, FakeNatCtx, FakePrimaryAddressId, FakeWeakAddressId,
1174    };
1175    use crate::matchers::testutil::{ethernet_interface, FakeDeviceId};
1176    use crate::matchers::PacketMatcher;
1177    use crate::packets::testutil::internal::{ArbitraryValue, FakeIpPacket, FakeUdpPacket};
1178    use crate::state::{Action, Routine, Rule, TransparentProxy};
1179    use crate::testutil::TestIpExt;
1180
1181    impl<I: IpExt, A: PartialEq, BT: FilterBindingsTypes> PartialEq
1182        for NatConfigurationResult<I, A, BT>
1183    {
1184        fn eq(&self, other: &Self) -> bool {
1185            match (self, other) {
1186                (Self::Result(lhs), Self::Result(rhs)) => lhs == rhs,
1187                (Self::AdoptExisting(_), Self::AdoptExisting(_)) => {
1188                    panic!("equality check for connections is not supported")
1189                }
1190                _ => false,
1191            }
1192        }
1193    }
1194
1195    impl<I: IpExt, A, BC: FilterBindingsContext> ConnectionExclusive<I, NatConfig<I, A>, BC> {
1196        fn from_packet<P: IpPacket<I>>(bindings_ctx: &BC, packet: &P) -> Self {
1197            let packet = PacketMetadata::new(packet).expect("packet should be trackable");
1198            ConnectionExclusive::from_deconstructed_packet(bindings_ctx, &packet)
1199                .expect("create conntrack entry")
1200        }
1201    }
1202
1203    impl<A, BC: FilterBindingsContext> ConnectionExclusive<Ipv4, NatConfig<Ipv4, A>, BC> {
1204        fn with_reply_tuple(bindings_ctx: &BC, which: ReplyTuplePort, port: u16) -> Self {
1205            Self::from_packet(bindings_ctx, &packet_with_port(which, port).reply())
1206        }
1207    }
1208
1209    fn packet_with_port(which: ReplyTuplePort, port: u16) -> FakeIpPacket<Ipv4, FakeUdpPacket> {
1210        let mut packet = FakeIpPacket::<Ipv4, FakeUdpPacket>::arbitrary_value();
1211        match which {
1212            ReplyTuplePort::Source => packet.body.src_port = port,
1213            ReplyTuplePort::Destination => packet.body.dst_port = port,
1214        }
1215        packet
1216    }
1217
1218    fn tuple_with_port(which: ReplyTuplePort, port: u16) -> Tuple<Ipv4> {
1219        Tuple::from_packet(&packet_with_port(which, port)).unwrap()
1220    }
1221
1222    #[test]
1223    fn accept_by_default_if_no_matching_rules_in_hook() {
1224        let mut bindings_ctx = FakeBindingsCtx::<Ipv4>::new();
1225        let conntrack = Table::new::<IntoCoreTimerCtx>(&mut bindings_ctx);
1226        let mut core_ctx = FakeNatCtx::default();
1227        let packet = FakeIpPacket::<_, FakeUdpPacket>::arbitrary_value();
1228        let mut conn = ConnectionExclusive::from_packet(&bindings_ctx, &packet);
1229
1230        assert_eq!(
1231            configure_nat::<LocalEgressHook, _, _, _, _>(
1232                &mut core_ctx,
1233                &mut bindings_ctx,
1234                &conntrack,
1235                &mut conn,
1236                &Hook::default(),
1237                &packet,
1238                Interfaces { ingress: None, egress: None },
1239            ),
1240            Verdict::Accept(NatConfigurationResult::Result(ShouldNat::No))
1241        );
1242    }
1243
1244    #[test]
1245    fn accept_by_default_if_return_from_routine() {
1246        let mut bindings_ctx = FakeBindingsCtx::<Ipv4>::new();
1247        let conntrack = Table::new::<IntoCoreTimerCtx>(&mut bindings_ctx);
1248        let mut core_ctx = FakeNatCtx::default();
1249        let packet = FakeIpPacket::<_, FakeUdpPacket>::arbitrary_value();
1250        let mut conn = ConnectionExclusive::from_packet(&bindings_ctx, &packet);
1251
1252        let hook = Hook {
1253            routines: vec![Routine {
1254                rules: vec![Rule::new(PacketMatcher::default(), Action::Return)],
1255            }],
1256        };
1257        assert_eq!(
1258            configure_nat::<LocalEgressHook, _, _, _, _>(
1259                &mut core_ctx,
1260                &mut bindings_ctx,
1261                &conntrack,
1262                &mut conn,
1263                &hook,
1264                &packet,
1265                Interfaces { ingress: None, egress: None },
1266            ),
1267            Verdict::Accept(NatConfigurationResult::Result(ShouldNat::No))
1268        );
1269    }
1270
1271    #[test]
1272    fn accept_terminal_for_installed_routine() {
1273        let mut bindings_ctx = FakeBindingsCtx::<Ipv4>::new();
1274        let conntrack = Table::new::<IntoCoreTimerCtx>(&mut bindings_ctx);
1275        let mut core_ctx = FakeNatCtx::default();
1276        let packet = FakeIpPacket::<_, FakeUdpPacket>::arbitrary_value();
1277        let mut conn = ConnectionExclusive::from_packet(&bindings_ctx, &packet);
1278
1279        // The first installed routine should terminate at its `Accept` result.
1280        let routine = Routine {
1281            rules: vec![
1282                // Accept all traffic.
1283                Rule::new(PacketMatcher::default(), Action::Accept),
1284                // Drop all traffic.
1285                Rule::new(PacketMatcher::default(), Action::Drop),
1286            ],
1287        };
1288        assert_eq!(
1289            configure_nat::<LocalEgressHook, _, _, _, _>(
1290                &mut core_ctx,
1291                &mut bindings_ctx,
1292                &conntrack,
1293                &mut conn,
1294                &Hook { routines: vec![routine.clone()] },
1295                &packet,
1296                Interfaces { ingress: None, egress: None },
1297            ),
1298            Verdict::Accept(NatConfigurationResult::Result(ShouldNat::No))
1299        );
1300
1301        // The first installed routine should terminate at its `Accept` result, but the
1302        // hook should terminate at the `Drop` result in the second routine.
1303        let hook = Hook {
1304            routines: vec![
1305                routine,
1306                Routine {
1307                    rules: vec![
1308                        // Drop all traffic.
1309                        Rule::new(PacketMatcher::default(), Action::Drop),
1310                    ],
1311                },
1312            ],
1313        };
1314        assert_eq!(
1315            configure_nat::<LocalEgressHook, _, _, _, _>(
1316                &mut core_ctx,
1317                &mut bindings_ctx,
1318                &conntrack,
1319                &mut conn,
1320                &hook,
1321                &packet,
1322                Interfaces { ingress: None, egress: None },
1323            ),
1324            Verdict::Drop.into()
1325        );
1326    }
1327
1328    #[test]
1329    fn drop_terminal_for_entire_hook() {
1330        let mut bindings_ctx = FakeBindingsCtx::<Ipv4>::new();
1331        let conntrack = Table::new::<IntoCoreTimerCtx>(&mut bindings_ctx);
1332        let mut core_ctx = FakeNatCtx::default();
1333        let packet = FakeIpPacket::<_, FakeUdpPacket>::arbitrary_value();
1334        let mut conn = ConnectionExclusive::from_packet(&bindings_ctx, &packet);
1335
1336        let hook = Hook {
1337            routines: vec![
1338                Routine {
1339                    rules: vec![
1340                        // Drop all traffic.
1341                        Rule::new(PacketMatcher::default(), Action::Drop),
1342                    ],
1343                },
1344                Routine {
1345                    rules: vec![
1346                        // Accept all traffic.
1347                        Rule::new(PacketMatcher::default(), Action::Accept),
1348                    ],
1349                },
1350            ],
1351        };
1352
1353        assert_eq!(
1354            configure_nat::<LocalEgressHook, _, _, _, _>(
1355                &mut core_ctx,
1356                &mut bindings_ctx,
1357                &conntrack,
1358                &mut conn,
1359                &hook,
1360                &packet,
1361                Interfaces { ingress: None, egress: None },
1362            ),
1363            Verdict::Drop.into()
1364        );
1365    }
1366
1367    #[test]
1368    fn transparent_proxy_terminal_for_entire_hook() {
1369        let mut bindings_ctx = FakeBindingsCtx::<Ipv4>::new();
1370        let conntrack = Table::new::<IntoCoreTimerCtx>(&mut bindings_ctx);
1371        let mut core_ctx = FakeNatCtx::default();
1372        let packet = FakeIpPacket::<_, FakeUdpPacket>::arbitrary_value();
1373        let mut conn = ConnectionExclusive::from_packet(&bindings_ctx, &packet);
1374
1375        let ingress = Hook {
1376            routines: vec![
1377                Routine {
1378                    rules: vec![Rule::new(
1379                        PacketMatcher::default(),
1380                        Action::TransparentProxy(TransparentProxy::LocalPort(LOCAL_PORT)),
1381                    )],
1382                },
1383                Routine {
1384                    rules: vec![
1385                        // Accept all traffic.
1386                        Rule::new(PacketMatcher::default(), Action::Accept),
1387                    ],
1388                },
1389            ],
1390        };
1391
1392        assert_eq!(
1393            configure_nat::<IngressHook, _, _, _, _>(
1394                &mut core_ctx,
1395                &mut bindings_ctx,
1396                &conntrack,
1397                &mut conn,
1398                &ingress,
1399                &packet,
1400                Interfaces { ingress: None, egress: None },
1401            ),
1402            IngressVerdict::TransparentLocalDelivery {
1403                addr: <Ipv4 as crate::packets::testutil::internal::TestIpExt>::DST_IP,
1404                port: LOCAL_PORT
1405            }
1406        );
1407    }
1408
1409    #[test]
1410    fn redirect_terminal_for_entire_hook() {
1411        let mut bindings_ctx = FakeBindingsCtx::<Ipv4>::new();
1412        let conntrack = Table::new::<IntoCoreTimerCtx>(&mut bindings_ctx);
1413        let mut core_ctx = FakeNatCtx::default();
1414        let packet = FakeIpPacket::<_, FakeUdpPacket>::arbitrary_value();
1415        let mut conn = ConnectionExclusive::from_packet(&bindings_ctx, &packet);
1416
1417        let hook = Hook {
1418            routines: vec![
1419                Routine {
1420                    rules: vec![
1421                        // Redirect all traffic.
1422                        Rule::new(PacketMatcher::default(), Action::Redirect { dst_port: None }),
1423                    ],
1424                },
1425                Routine {
1426                    rules: vec![
1427                        // Drop all traffic.
1428                        Rule::new(PacketMatcher::default(), Action::Drop),
1429                    ],
1430                },
1431            ],
1432        };
1433
1434        assert_eq!(
1435            configure_nat::<LocalEgressHook, _, _, _, _>(
1436                &mut core_ctx,
1437                &mut bindings_ctx,
1438                &conntrack,
1439                &mut conn,
1440                &hook,
1441                &packet,
1442                Interfaces { ingress: None, egress: None },
1443            ),
1444            Verdict::Accept(NatConfigurationResult::Result(ShouldNat::Yes(None)))
1445        );
1446    }
1447
1448    #[ip_test(I)]
1449    fn masquerade_terminal_for_entire_hook<I: TestIpExt>() {
1450        let mut bindings_ctx = FakeBindingsCtx::<I>::new();
1451        let conntrack = Table::new::<IntoCoreTimerCtx>(&mut bindings_ctx);
1452        let assigned_addr = AddrSubnet::new(I::SRC_IP_2, I::SUBNET.prefix()).unwrap();
1453        let mut core_ctx = FakeNatCtx::new([(ethernet_interface(), assigned_addr)]);
1454        let packet = FakeIpPacket::<_, FakeUdpPacket>::arbitrary_value();
1455        let mut conn = ConnectionExclusive::from_packet(&bindings_ctx, &packet);
1456
1457        let hook = Hook {
1458            routines: vec![
1459                Routine {
1460                    rules: vec![
1461                        // Masquerade all traffic.
1462                        Rule::new(PacketMatcher::default(), Action::Masquerade { src_port: None }),
1463                    ],
1464                },
1465                Routine {
1466                    rules: vec![
1467                        // Drop all traffic.
1468                        Rule::new(PacketMatcher::default(), Action::Drop),
1469                    ],
1470                },
1471            ],
1472        };
1473
1474        assert_matches!(
1475            configure_nat::<EgressHook, _, _, _, _>(
1476                &mut core_ctx,
1477                &mut bindings_ctx,
1478                &conntrack,
1479                &mut conn,
1480                &hook,
1481                &packet,
1482                Interfaces { ingress: None, egress: Some(&ethernet_interface()) },
1483            ),
1484            Verdict::Accept(NatConfigurationResult::Result(ShouldNat::Yes(Some(_))))
1485        );
1486    }
1487
1488    #[test]
1489    fn redirect_ingress_drops_packet_if_no_assigned_address() {
1490        let mut bindings_ctx = FakeBindingsCtx::<Ipv4>::new();
1491        let conntrack = Table::new::<IntoCoreTimerCtx>(&mut bindings_ctx);
1492        let mut core_ctx = FakeNatCtx::default();
1493        let packet = FakeIpPacket::<_, FakeUdpPacket>::arbitrary_value();
1494        let mut conn = ConnectionExclusive::from_packet(&bindings_ctx, &packet);
1495
1496        let hook = Hook {
1497            routines: vec![Routine {
1498                rules: vec![Rule::new(
1499                    PacketMatcher::default(),
1500                    Action::Redirect { dst_port: None },
1501                )],
1502            }],
1503        };
1504
1505        assert_eq!(
1506            configure_nat::<IngressHook, _, _, _, _>(
1507                &mut core_ctx,
1508                &mut bindings_ctx,
1509                &conntrack,
1510                &mut conn,
1511                &hook,
1512                &packet,
1513                Interfaces { ingress: Some(&ethernet_interface()), egress: None },
1514            ),
1515            Verdict::Drop.into()
1516        );
1517    }
1518
1519    #[test]
1520    fn masquerade_egress_drops_packet_if_no_assigned_address() {
1521        let mut bindings_ctx = FakeBindingsCtx::<Ipv4>::new();
1522        let conntrack = Table::new::<IntoCoreTimerCtx>(&mut bindings_ctx);
1523        let mut core_ctx = FakeNatCtx::default();
1524        let packet = FakeIpPacket::<_, FakeUdpPacket>::arbitrary_value();
1525        let mut conn = ConnectionExclusive::from_packet(&bindings_ctx, &packet);
1526
1527        let hook = Hook {
1528            routines: vec![Routine {
1529                rules: vec![Rule::new(
1530                    PacketMatcher::default(),
1531                    Action::Masquerade { src_port: None },
1532                )],
1533            }],
1534        };
1535
1536        assert_eq!(
1537            configure_nat::<EgressHook, _, _, _, _>(
1538                &mut core_ctx,
1539                &mut bindings_ctx,
1540                &conntrack,
1541                &mut conn,
1542                &hook,
1543                &packet,
1544                Interfaces { ingress: None, egress: Some(&ethernet_interface()) },
1545            ),
1546            Verdict::Drop.into()
1547        );
1548    }
1549
1550    trait NatHookExt<I: IpExt>: NatHook<I, Verdict<()>: PartialEq> {
1551        fn interfaces<'a>(interface: &'a FakeDeviceId) -> Interfaces<'a, FakeDeviceId>;
1552    }
1553
1554    impl<I: IpExt> NatHookExt<I> for IngressHook {
1555        fn interfaces<'a>(interface: &'a FakeDeviceId) -> Interfaces<'a, FakeDeviceId> {
1556            Interfaces { ingress: Some(interface), egress: None }
1557        }
1558    }
1559
1560    impl<I: IpExt> NatHookExt<I> for LocalEgressHook {
1561        fn interfaces<'a>(interface: &'a FakeDeviceId) -> Interfaces<'a, FakeDeviceId> {
1562            Interfaces { ingress: None, egress: Some(interface) }
1563        }
1564    }
1565
1566    impl<I: IpExt> NatHookExt<I> for EgressHook {
1567        fn interfaces<'a>(interface: &'a FakeDeviceId) -> Interfaces<'a, FakeDeviceId> {
1568            Interfaces { ingress: None, egress: Some(interface) }
1569        }
1570    }
1571
1572    const NAT_ENABLED_FOR_TESTS: bool = true;
1573
1574    #[ip_test(I)]
1575    fn nat_disabled_for_self_connected_flows<I: TestIpExt>() {
1576        let mut bindings_ctx = FakeBindingsCtx::<I>::new();
1577        let conntrack = Table::new::<IntoCoreTimerCtx>(&mut bindings_ctx);
1578        let mut core_ctx = FakeNatCtx::default();
1579
1580        let mut packet = FakeIpPacket::<I, _> {
1581            src_ip: I::SRC_IP,
1582            dst_ip: I::SRC_IP,
1583            body: FakeUdpPacket { src_port: 22222, dst_port: 22222 },
1584        };
1585        let (mut conn, direction) = conntrack
1586            .get_connection_for_packet_and_update(&bindings_ctx, &packet)
1587            .expect("packet should be valid")
1588            .expect("packet should be trackable");
1589
1590        // Even with a Redirect NAT rule in LOCAL_EGRESS, and a Masquerade NAT rule in
1591        // EGRESS, DNAT and SNAT should both be disabled for the connection because it
1592        // is self-connected.
1593        let verdict = perform_nat::<LocalEgressHook, _, _, _, _>(
1594            &mut core_ctx,
1595            &mut bindings_ctx,
1596            NAT_ENABLED_FOR_TESTS,
1597            &conntrack,
1598            &mut conn,
1599            direction,
1600            &Hook {
1601                routines: vec![Routine {
1602                    rules: vec![Rule::new(
1603                        PacketMatcher::default(),
1604                        Action::Redirect { dst_port: None },
1605                    )],
1606                }],
1607            },
1608            &mut packet,
1609            <LocalEgressHook as NatHookExt<I>>::interfaces(&ethernet_interface()),
1610        );
1611        assert_eq!(verdict, Verdict::Accept(()).into());
1612
1613        let verdict = perform_nat::<EgressHook, _, _, _, _>(
1614            &mut core_ctx,
1615            &mut bindings_ctx,
1616            NAT_ENABLED_FOR_TESTS,
1617            &conntrack,
1618            &mut conn,
1619            direction,
1620            &Hook {
1621                routines: vec![Routine {
1622                    rules: vec![Rule::new(
1623                        PacketMatcher::default(),
1624                        Action::Masquerade { src_port: None },
1625                    )],
1626                }],
1627            },
1628            &mut packet,
1629            <EgressHook as NatHookExt<I>>::interfaces(&ethernet_interface()),
1630        );
1631        assert_eq!(verdict, Verdict::Accept(()).into());
1632
1633        assert_eq!(conn.external_data().destination.get(), Some(&ShouldNat::No));
1634        assert_eq!(conn.external_data().source.get(), Some(&ShouldNat::No));
1635    }
1636
1637    #[ip_test(I)]
1638    fn nat_disabled_if_not_configured_before_connection_finalized<I: TestIpExt>() {
1639        let mut bindings_ctx = FakeBindingsCtx::<I>::new();
1640        let conntrack = Table::new::<IntoCoreTimerCtx>(&mut bindings_ctx);
1641        let mut core_ctx = FakeNatCtx::default();
1642
1643        let mut packet = FakeIpPacket::<I, FakeUdpPacket>::arbitrary_value();
1644        let (mut conn, direction) = conntrack
1645            .get_connection_for_packet_and_update(&bindings_ctx, &packet)
1646            .expect("packet should be valid")
1647            .expect("packet should be trackable");
1648
1649        // Skip NAT so the connection is finalized without DNAT configured for it.
1650        let verdict = perform_nat::<LocalEgressHook, _, _, _, _>(
1651            &mut core_ctx,
1652            &mut bindings_ctx,
1653            false, /* nat_installed */
1654            &conntrack,
1655            &mut conn,
1656            direction,
1657            &Hook::default(),
1658            &mut packet,
1659            <LocalEgressHook as NatHookExt<I>>::interfaces(&ethernet_interface()),
1660        );
1661        assert_eq!(verdict, Verdict::Accept(()).into());
1662        assert_eq!(conn.external_data().destination.get(), None);
1663        assert_eq!(conn.external_data().source.get(), None);
1664
1665        // Skip NAT so the connection is finalized without SNAT configured for it.
1666        let verdict = perform_nat::<EgressHook, _, _, _, _>(
1667            &mut core_ctx,
1668            &mut bindings_ctx,
1669            false, /* nat_installed */
1670            &conntrack,
1671            &mut conn,
1672            direction,
1673            &Hook::default(),
1674            &mut packet,
1675            <EgressHook as NatHookExt<I>>::interfaces(&ethernet_interface()),
1676        );
1677        assert_eq!(verdict, Verdict::Accept(()).into());
1678        assert_eq!(conn.external_data().destination.get(), None);
1679        assert_eq!(conn.external_data().source.get(), None);
1680
1681        let (inserted, _weak) = conntrack
1682            .finalize_connection(&mut bindings_ctx, conn)
1683            .expect("connection should not conflict");
1684        assert!(inserted);
1685
1686        // Now, when a reply comes in to INGRESS, expect that SNAT will be configured as
1687        // `DoNotNat` given it has not already been configured for the connection.
1688        let mut reply = packet.reply();
1689        let (mut conn, direction) = conntrack
1690            .get_connection_for_packet_and_update(&bindings_ctx, &reply)
1691            .expect("packet should be valid")
1692            .expect("packet should be trackable");
1693        let verdict = perform_nat::<IngressHook, _, _, _, _>(
1694            &mut core_ctx,
1695            &mut bindings_ctx,
1696            NAT_ENABLED_FOR_TESTS,
1697            &conntrack,
1698            &mut conn,
1699            direction,
1700            &Hook::default(),
1701            &mut reply,
1702            <IngressHook as NatHookExt<I>>::interfaces(&ethernet_interface()),
1703        );
1704        assert_eq!(verdict, Verdict::Accept(()).into());
1705        assert_eq!(conn.external_data().destination.get(), None);
1706        assert_eq!(conn.external_data().source.get(), Some(&ShouldNat::No));
1707
1708        // And finally, on LOCAL_INGRESS, DNAT should also be configured as `DoNotNat`.
1709        let verdict = perform_nat::<LocalIngressHook, _, _, _, _>(
1710            &mut core_ctx,
1711            &mut bindings_ctx,
1712            NAT_ENABLED_FOR_TESTS,
1713            &conntrack,
1714            &mut conn,
1715            direction,
1716            &Hook::default(),
1717            &mut reply,
1718            <IngressHook as NatHookExt<I>>::interfaces(&ethernet_interface()),
1719        );
1720        assert_eq!(verdict, Verdict::Accept(()).into());
1721        assert_eq!(conn.external_data().destination.get(), Some(&ShouldNat::No));
1722        assert_eq!(conn.external_data().source.get(), Some(&ShouldNat::No));
1723    }
1724
1725    const LOCAL_PORT: NonZeroU16 = NonZeroU16::new(55555).unwrap();
1726
1727    #[ip_test(I)]
1728    #[test_case(
1729        PhantomData::<IngressHook>, PhantomData::<EgressHook>, None;
1730        "redirect INGRESS"
1731    )]
1732    #[test_case(
1733        PhantomData::<IngressHook>, PhantomData::<EgressHook>, Some(LOCAL_PORT);
1734        "redirect INGRESS to local port"
1735    )]
1736    #[test_case(
1737        PhantomData::<LocalEgressHook>, PhantomData::<EgressHook>, None;
1738        "redirect LOCAL_EGRESS"
1739    )]
1740    #[test_case(
1741        PhantomData::<LocalEgressHook>, PhantomData::<EgressHook>, Some(LOCAL_PORT);
1742        "redirect LOCAL_EGRESS to local port"
1743    )]
1744    fn redirect<I: TestIpExt, Original: NatHookExt<I>, Reply: NatHookExt<I>>(
1745        _original_nat_hook: PhantomData<Original>,
1746        _reply_nat_hook: PhantomData<Reply>,
1747        dst_port: Option<NonZeroU16>,
1748    ) {
1749        let mut bindings_ctx = FakeBindingsCtx::<I>::new();
1750        let conntrack = Table::new::<IntoCoreTimerCtx>(&mut bindings_ctx);
1751        let mut core_ctx = FakeNatCtx::new([(
1752            ethernet_interface(),
1753            AddrSubnet::new(I::DST_IP_2, I::SUBNET.prefix()).unwrap(),
1754        )]);
1755
1756        // Create a packet and get the corresponding connection from conntrack.
1757        let mut packet = FakeIpPacket::<_, FakeUdpPacket>::arbitrary_value();
1758        let pre_nat_packet = packet.clone();
1759        let (mut conn, direction) = conntrack
1760            .get_connection_for_packet_and_update(&bindings_ctx, &packet)
1761            .expect("packet should be valid")
1762            .expect("packet should be trackable");
1763        let original = conn.original_tuple().clone();
1764
1765        // Perform NAT at the first hook where we'd encounter this packet (either
1766        // INGRESS, if it's an incoming packet, or LOCAL_EGRESS, if it's an outgoing
1767        // packet).
1768        let nat_routines = Hook {
1769            routines: vec![Routine {
1770                rules: vec![Rule::new(
1771                    PacketMatcher::default(),
1772                    Action::Redirect { dst_port: dst_port.map(|port| port..=port) },
1773                )],
1774            }],
1775        };
1776        let verdict = perform_nat::<Original, _, _, _, _>(
1777            &mut core_ctx,
1778            &mut bindings_ctx,
1779            NAT_ENABLED_FOR_TESTS,
1780            &conntrack,
1781            &mut conn,
1782            direction,
1783            &nat_routines,
1784            &mut packet,
1785            Original::interfaces(&ethernet_interface()),
1786        );
1787        assert_eq!(verdict, Verdict::Accept(()).into());
1788
1789        // The packet's destination should be rewritten, and DNAT should be configured
1790        // for the packet; the reply tuple's source should be rewritten to match the new
1791        // destination.
1792        let (redirect_addr, cached_addr) = Original::redirect_addr(
1793            &mut core_ctx,
1794            &packet,
1795            Original::interfaces(&ethernet_interface()).ingress,
1796        )
1797        .expect("get redirect addr for NAT hook");
1798        let expected = FakeIpPacket::<_, FakeUdpPacket> {
1799            src_ip: packet.src_ip,
1800            dst_ip: redirect_addr,
1801            body: FakeUdpPacket {
1802                src_port: packet.body.src_port,
1803                dst_port: dst_port.map(NonZeroU16::get).unwrap_or(packet.body.dst_port),
1804            },
1805        };
1806        assert_eq!(packet, expected);
1807        assert_eq!(
1808            conn.external_data().destination.get().expect("DNAT should be configured"),
1809            &ShouldNat::Yes(cached_addr)
1810        );
1811        assert_eq!(conn.external_data().source.get(), None, "SNAT should not be configured");
1812        assert_eq!(conn.original_tuple(), &original);
1813        let mut reply = Tuple { src_addr: redirect_addr, ..original.invert() };
1814        if let Some(port) = dst_port {
1815            reply.src_port_or_id = port.get();
1816        }
1817        assert_eq!(conn.reply_tuple(), &reply);
1818
1819        // When a reply to the original packet arrives at the corresponding hook, it
1820        // should have reverse DNAT applied, i.e. its source should be rewritten to
1821        // match the original destination of the connection.
1822        let mut reply_packet = packet.reply();
1823        // Install a NAT routine that simply drops all packets. This should have no
1824        // effect, because only the first packet for a given connection traverses NAT
1825        // routines.
1826        let nat_routines = Hook {
1827            routines: vec![Routine {
1828                rules: vec![Rule::new(PacketMatcher::default(), Action::Drop)],
1829            }],
1830        };
1831        let verdict = perform_nat::<Reply, _, _, _, _>(
1832            &mut core_ctx,
1833            &mut bindings_ctx,
1834            NAT_ENABLED_FOR_TESTS,
1835            &conntrack,
1836            &mut conn,
1837            ConnectionDirection::Reply,
1838            &nat_routines,
1839            &mut reply_packet,
1840            Reply::interfaces(&ethernet_interface()),
1841        );
1842        assert_eq!(verdict, Verdict::Accept(()).into());
1843        assert_eq!(reply_packet, pre_nat_packet.reply());
1844    }
1845
1846    #[ip_test(I)]
1847    #[test_case(None; "masquerade")]
1848    #[test_case(Some(LOCAL_PORT); "masquerade to specified port")]
1849    fn masquerade<I: TestIpExt>(src_port: Option<NonZeroU16>) {
1850        let mut bindings_ctx = FakeBindingsCtx::<I>::new();
1851        let conntrack = Table::new::<IntoCoreTimerCtx>(&mut bindings_ctx);
1852        let assigned_addr = AddrSubnet::new(I::SRC_IP_2, I::SUBNET.prefix()).unwrap();
1853        let mut core_ctx = FakeNatCtx::new([(ethernet_interface(), assigned_addr)]);
1854
1855        // Create a packet and get the corresponding connection from conntrack.
1856        let mut packet = FakeIpPacket::<_, FakeUdpPacket>::arbitrary_value();
1857        let pre_nat_packet = packet.clone();
1858        let (mut conn, direction) = conntrack
1859            .get_connection_for_packet_and_update(&bindings_ctx, &packet)
1860            .expect("packet should be valid")
1861            .expect("packet should be trackable");
1862        let original = conn.original_tuple().clone();
1863
1864        // Perform Masquerade NAT at EGRESS.
1865        let nat_routines = Hook {
1866            routines: vec![Routine {
1867                rules: vec![Rule::new(
1868                    PacketMatcher::default(),
1869                    Action::Masquerade { src_port: src_port.map(|port| port..=port) },
1870                )],
1871            }],
1872        };
1873        let verdict = perform_nat::<EgressHook, _, _, _, _>(
1874            &mut core_ctx,
1875            &mut bindings_ctx,
1876            NAT_ENABLED_FOR_TESTS,
1877            &conntrack,
1878            &mut conn,
1879            direction,
1880            &nat_routines,
1881            &mut packet,
1882            Interfaces { ingress: None, egress: Some(&ethernet_interface()) },
1883        );
1884        assert_eq!(verdict, Verdict::Accept(()).into());
1885
1886        // The packet's source address should be rewritten, and SNAT should be
1887        // configured for the packet; the reply tuple's destination should be rewritten
1888        // to match the new source.
1889        let expected = FakeIpPacket::<_, FakeUdpPacket> {
1890            src_ip: I::SRC_IP_2,
1891            dst_ip: packet.dst_ip,
1892            body: FakeUdpPacket {
1893                src_port: src_port.map(NonZeroU16::get).unwrap_or(packet.body.src_port),
1894                dst_port: packet.body.dst_port,
1895            },
1896        };
1897        assert_eq!(packet, expected);
1898        assert_matches!(
1899            conn.external_data().source.get().expect("SNAT should be configured"),
1900            &ShouldNat::Yes(Some(_))
1901        );
1902        assert_eq!(conn.external_data().destination.get(), None, "DNAT should not be configured");
1903        assert_eq!(conn.original_tuple(), &original);
1904        let mut reply = Tuple { dst_addr: I::SRC_IP_2, ..original.invert() };
1905        if let Some(port) = src_port {
1906            reply.dst_port_or_id = port.get();
1907        }
1908        assert_eq!(conn.reply_tuple(), &reply);
1909
1910        // When a reply to the original packet arrives at INGRESS, it should have
1911        // reverse SNAT applied, i.e. its destination should be rewritten to match the
1912        // original source of the connection.
1913        let mut reply_packet = packet.reply();
1914        // Install a NAT routine that simply drops all packets. This should have no
1915        // effect, because only the first packet for a given connection traverses NAT
1916        // routines.
1917        let nat_routines = Hook {
1918            routines: vec![Routine {
1919                rules: vec![Rule::new(PacketMatcher::default(), Action::Drop)],
1920            }],
1921        };
1922        let verdict = perform_nat::<IngressHook, _, _, _, _>(
1923            &mut core_ctx,
1924            &mut bindings_ctx,
1925            NAT_ENABLED_FOR_TESTS,
1926            &conntrack,
1927            &mut conn,
1928            ConnectionDirection::Reply,
1929            &nat_routines,
1930            &mut reply_packet,
1931            Interfaces { ingress: Some(&ethernet_interface()), egress: None },
1932        );
1933        assert_eq!(verdict, Verdict::Accept(()).into());
1934        assert_eq!(reply_packet, pre_nat_packet.reply());
1935    }
1936
1937    #[ip_test(I)]
1938    #[test_case(22, 1..=511)]
1939    #[test_case(853, 1..=1023)]
1940    #[test_case(11111, 1024..=u16::MAX)]
1941    fn masquerade_reply_tuple_dst_port_rewritten_even_if_target_range_unspecified<I: TestIpExt>(
1942        src_port: u16,
1943        expected_range: RangeInclusive<u16>,
1944    ) {
1945        let mut bindings_ctx = FakeBindingsCtx::<I>::new();
1946        let conntrack = Table::new::<IntoCoreTimerCtx>(&mut bindings_ctx);
1947        let assigned_addr = AddrSubnet::new(I::SRC_IP_2, I::SUBNET.prefix()).unwrap();
1948        let mut core_ctx = FakeNatCtx::new([(ethernet_interface(), assigned_addr)]);
1949        let packet = FakeIpPacket {
1950            body: FakeUdpPacket { src_port, ..ArbitraryValue::arbitrary_value() },
1951            ..ArbitraryValue::arbitrary_value()
1952        };
1953
1954        // First, insert a connection in conntrack with the same the source address the
1955        // packet will be masqueraded to, and the same source port, to cause a conflict.
1956        let reply = FakeIpPacket { src_ip: I::SRC_IP_2, ..packet.clone() };
1957        let (conn, _dir) = conntrack
1958            .get_connection_for_packet_and_update(&bindings_ctx, &reply)
1959            .expect("packet should be valid")
1960            .expect("packet should be trackable");
1961        assert_matches!(
1962            conntrack
1963                .finalize_connection(&mut bindings_ctx, conn)
1964                .expect("connection should not conflict"),
1965            (true, Some(_))
1966        );
1967
1968        // Now, configure Masquerade NAT for a new connection that conflicts with the
1969        // existing one, but do not specify a port range to which the source port should
1970        // be rewritten.
1971        let mut conn = ConnectionExclusive::from_packet(&bindings_ctx, &packet);
1972        let verdict = configure_masquerade_nat(
1973            &mut core_ctx,
1974            &mut bindings_ctx,
1975            &conntrack,
1976            &mut conn,
1977            &packet,
1978            &Interfaces { ingress: None, egress: Some(&ethernet_interface()) },
1979            /* src_port */ None,
1980        );
1981
1982        // The destination address of the reply tuple should have been rewritten to the
1983        // new source address, and the destination port should also have been rewritten
1984        // (to a "similar" value), even though a rewrite range was not specified,
1985        // because otherwise it would conflict with the existing connection in the
1986        // table.
1987        assert_matches!(
1988            verdict,
1989            Verdict::Accept(NatConfigurationResult::Result(ShouldNat::Yes(Some(_))))
1990        );
1991        let reply_tuple = conn.reply_tuple();
1992        assert_eq!(reply_tuple.dst_addr, I::SRC_IP_2);
1993        assert_ne!(reply_tuple.dst_port_or_id, src_port);
1994        assert!(expected_range.contains(&reply_tuple.dst_port_or_id));
1995    }
1996
1997    #[ip_test(I)]
1998    #[test_case(
1999        PhantomData::<IngressHook>, Action::Redirect { dst_port: None };
2000        "redirect in INGRESS"
2001    )]
2002    #[test_case(
2003        PhantomData::<EgressHook>, Action::Masquerade { src_port: None };
2004        "masquerade in EGRESS"
2005    )]
2006    fn assigned_addr_cached_and_validated<I: TestIpExt, N: NatHookExt<I>>(
2007        _nat_hook: PhantomData<N>,
2008        action: Action<I, FakeDeviceClass, ()>,
2009    ) {
2010        let mut bindings_ctx = FakeBindingsCtx::<I>::new();
2011        let conntrack = Table::new::<IntoCoreTimerCtx>(&mut bindings_ctx);
2012        let assigned_addr = AddrSubnet::new(I::SRC_IP_2, I::SUBNET.prefix()).unwrap();
2013        let mut core_ctx = FakeNatCtx::new([(ethernet_interface(), assigned_addr)]);
2014
2015        // Create a packet and get the corresponding connection from conntrack.
2016        let mut packet = FakeIpPacket::<_, FakeUdpPacket>::arbitrary_value();
2017        let (mut conn, direction) = conntrack
2018            .get_connection_for_packet_and_update(&bindings_ctx, &packet)
2019            .expect("packet should be valid")
2020            .expect("packet should be trackable");
2021
2022        // Perform NAT.
2023        let nat_routines = Hook {
2024            routines: vec![Routine { rules: vec![Rule::new(PacketMatcher::default(), action)] }],
2025        };
2026        let verdict = perform_nat::<N, _, _, _, _>(
2027            &mut core_ctx,
2028            &mut bindings_ctx,
2029            NAT_ENABLED_FOR_TESTS,
2030            &conntrack,
2031            &mut conn,
2032            direction,
2033            &nat_routines,
2034            &mut packet,
2035            N::interfaces(&ethernet_interface()),
2036        );
2037        assert_eq!(verdict, Verdict::Accept(()).into());
2038
2039        // A weakly-held reference to the address assigned to the interface should be
2040        // cached in the NAT config.
2041        let (nat, _nat_type) = conn.relevant_config(N::NAT_TYPE, ConnectionDirection::Original);
2042        let nat = nat.get().unwrap_or_else(|| panic!("{:?} NAT should be configured", N::NAT_TYPE));
2043        let id = assert_matches!(nat, ShouldNat::Yes(Some(CachedAddr { id, _marker })) => id);
2044        let id = id
2045            .lock()
2046            .as_ref()
2047            .expect("address ID should be cached in NAT config")
2048            .upgrade()
2049            .expect("address ID should be valid");
2050        assert_eq!(*id, assigned_addr);
2051        drop(id);
2052
2053        // Remove the assigned address; subsequent packets in the original direction on
2054        // the same flow should check the validity of the cached address, see that it's
2055        // invalid, and be dropped.
2056        core_ctx.device_addrs.clear();
2057        let verdict = perform_nat::<N, _, _, _, _>(
2058            &mut core_ctx,
2059            &mut bindings_ctx,
2060            NAT_ENABLED_FOR_TESTS,
2061            &conntrack,
2062            &mut conn,
2063            ConnectionDirection::Original,
2064            &nat_routines,
2065            &mut FakeIpPacket::<_, FakeUdpPacket>::arbitrary_value(),
2066            N::interfaces(&ethernet_interface()),
2067        );
2068        assert_eq!(verdict, Verdict::Drop.into());
2069        let (nat, _nat_type) = conn.relevant_config(N::NAT_TYPE, ConnectionDirection::Original);
2070        let nat = nat.get().unwrap_or_else(|| panic!("{:?} NAT should be configured", N::NAT_TYPE));
2071        let id = assert_matches!(nat, ShouldNat::Yes(Some(CachedAddr { id, _marker })) => id);
2072        assert_eq!(*id.lock(), None, "cached weak address ID should be cleared");
2073
2074        // Reassign the address to the interface, and packet traversal should now
2075        // succeed, with NAT re-acquiring a handle to the address.
2076        assert_matches!(
2077            core_ctx
2078                .device_addrs
2079                .insert(ethernet_interface(), FakePrimaryAddressId(Arc::new(assigned_addr))),
2080            None
2081        );
2082        let verdict = perform_nat::<N, _, _, _, _>(
2083            &mut core_ctx,
2084            &mut bindings_ctx,
2085            NAT_ENABLED_FOR_TESTS,
2086            &conntrack,
2087            &mut conn,
2088            ConnectionDirection::Original,
2089            &nat_routines,
2090            &mut FakeIpPacket::<_, FakeUdpPacket>::arbitrary_value(),
2091            N::interfaces(&ethernet_interface()),
2092        );
2093        assert_eq!(verdict, Verdict::Accept(()).into());
2094        let (nat, _nat_type) = conn.relevant_config(N::NAT_TYPE, ConnectionDirection::Original);
2095        let nat = nat.get().unwrap_or_else(|| panic!("{:?} NAT should be configured", N::NAT_TYPE));
2096        let id = assert_matches!(nat, ShouldNat::Yes(Some(CachedAddr { id, _marker })) => id);
2097        let id = id
2098            .lock()
2099            .as_ref()
2100            .expect("address ID should be cached in NAT config")
2101            .upgrade()
2102            .expect("address Id should be valid");
2103        assert_eq!(*id, assigned_addr);
2104    }
2105
2106    #[test_case(ReplyTuplePort::Source)]
2107    #[test_case(ReplyTuplePort::Destination)]
2108    fn rewrite_port_noop_if_in_range(which: ReplyTuplePort) {
2109        let mut bindings_ctx = FakeBindingsCtx::<Ipv4>::new();
2110        let table = Table::new::<IntoCoreTimerCtx>(&mut bindings_ctx);
2111        let mut conn =
2112            ConnectionExclusive::with_reply_tuple(&bindings_ctx, which, LOCAL_PORT.get());
2113
2114        // If the port is already in the specified range, rewriting should succeed and
2115        // be a no-op.
2116        let pre_nat = conn.reply_tuple().clone();
2117        let result = rewrite_reply_tuple_port(
2118            &mut bindings_ctx,
2119            &table,
2120            &mut conn,
2121            which,
2122            LOCAL_PORT..=LOCAL_PORT,
2123            true, /* ensure_port_in_range */
2124            ConflictStrategy::RewritePort,
2125        );
2126        assert_eq!(
2127            result,
2128            Verdict::Accept(NatConfigurationResult::Result(
2129                ShouldNat::<_, FakeWeakAddressId<Ipv4>>::No
2130            ))
2131        );
2132        assert_eq!(conn.reply_tuple(), &pre_nat);
2133    }
2134
2135    #[test_case(ReplyTuplePort::Source)]
2136    #[test_case(ReplyTuplePort::Destination)]
2137    fn rewrite_port_noop_if_no_conflict(which: ReplyTuplePort) {
2138        let mut bindings_ctx = FakeBindingsCtx::<Ipv4>::new();
2139        let table = Table::new::<IntoCoreTimerCtx>(&mut bindings_ctx);
2140        let mut conn =
2141            ConnectionExclusive::with_reply_tuple(&bindings_ctx, which, LOCAL_PORT.get());
2142
2143        // If there is no conflicting tuple in the table and we provide `false` for
2144        // `ensure_port_in_range` (as is done for implicit SNAT), then rewriting should
2145        // succeed and be a no-op, even if the port is not in the specified range,
2146        let pre_nat = conn.reply_tuple().clone();
2147        const NEW_PORT: NonZeroU16 = LOCAL_PORT.checked_add(1).unwrap();
2148        let result = rewrite_reply_tuple_port(
2149            &mut bindings_ctx,
2150            &table,
2151            &mut conn,
2152            which,
2153            NEW_PORT..=NEW_PORT,
2154            false, /* ensure_port_in_range */
2155            ConflictStrategy::RewritePort,
2156        );
2157        assert_eq!(
2158            result,
2159            Verdict::Accept(NatConfigurationResult::Result(
2160                ShouldNat::<_, FakeWeakAddressId<Ipv4>>::No
2161            ))
2162        );
2163        assert_eq!(conn.reply_tuple(), &pre_nat);
2164    }
2165
2166    #[test_case(ReplyTuplePort::Source)]
2167    #[test_case(ReplyTuplePort::Destination)]
2168    fn rewrite_port_succeeds_if_available_port_in_range(which: ReplyTuplePort) {
2169        let mut bindings_ctx = FakeBindingsCtx::<Ipv4>::new();
2170        let table = Table::new::<IntoCoreTimerCtx>(&mut bindings_ctx);
2171        let mut conn =
2172            ConnectionExclusive::with_reply_tuple(&bindings_ctx, which, LOCAL_PORT.get());
2173
2174        // If the port is not in the specified range, but there is an available port,
2175        // rewriting should succeed.
2176        const NEW_PORT: NonZeroU16 = LOCAL_PORT.checked_add(1).unwrap();
2177        let result = rewrite_reply_tuple_port(
2178            &mut bindings_ctx,
2179            &table,
2180            &mut conn,
2181            which,
2182            NEW_PORT..=NEW_PORT,
2183            true, /* ensure_port_in_range */
2184            ConflictStrategy::RewritePort,
2185        );
2186        assert_eq!(
2187            result,
2188            Verdict::Accept(NatConfigurationResult::Result(
2189                ShouldNat::<_, FakeWeakAddressId<Ipv4>>::Yes(None)
2190            ))
2191        );
2192        assert_eq!(conn.reply_tuple(), &tuple_with_port(which, NEW_PORT.get()));
2193    }
2194
2195    #[test_case(ReplyTuplePort::Source)]
2196    #[test_case(ReplyTuplePort::Destination)]
2197    fn rewrite_port_fails_if_no_available_port_in_range(which: ReplyTuplePort) {
2198        let mut bindings_ctx = FakeBindingsCtx::<Ipv4>::new();
2199        let table: Table<_, NatConfig<_, FakeWeakAddressId<Ipv4>>, _> =
2200            Table::new::<IntoCoreTimerCtx>(&mut bindings_ctx);
2201
2202        // If there is no port available in the specified range that does not conflict
2203        // with a tuple already in the table, rewriting should fail and the packet
2204        // should be dropped.
2205        let packet = packet_with_port(which, LOCAL_PORT.get());
2206        let (conn, _dir) = table
2207            .get_connection_for_packet_and_update(&bindings_ctx, &packet)
2208            .expect("packet should be valid")
2209            .expect("packet should be trackable");
2210        assert_matches!(
2211            table
2212                .finalize_connection(&mut bindings_ctx, conn)
2213                .expect("connection should not conflict"),
2214            (true, Some(_))
2215        );
2216
2217        let mut conn =
2218            ConnectionExclusive::with_reply_tuple(&bindings_ctx, which, LOCAL_PORT.get());
2219        let result = rewrite_reply_tuple_port(
2220            &mut bindings_ctx,
2221            &table,
2222            &mut conn,
2223            which,
2224            LOCAL_PORT..=LOCAL_PORT,
2225            true, /* ensure_port_in_range */
2226            ConflictStrategy::RewritePort,
2227        );
2228        assert_eq!(result, Verdict::Drop.into());
2229    }
2230
2231    #[test_case(ReplyTuplePort::Source)]
2232    #[test_case(ReplyTuplePort::Destination)]
2233    fn port_rewritten_to_ensure_unique_tuple_even_if_in_range(which: ReplyTuplePort) {
2234        let mut bindings_ctx = FakeBindingsCtx::<Ipv4>::new();
2235        let table = Table::new::<IntoCoreTimerCtx>(&mut bindings_ctx);
2236
2237        // Fill the conntrack table with tuples such that there is only one tuple that
2238        // does not conflict with an existing one and which has a port in the specified
2239        // range.
2240        const MAX_PORT: NonZeroU16 = NonZeroU16::new(LOCAL_PORT.get() + 100).unwrap();
2241        for port in LOCAL_PORT.get()..=MAX_PORT.get() {
2242            let packet = packet_with_port(which, port);
2243            let (conn, _dir) = table
2244                .get_connection_for_packet_and_update(&bindings_ctx, &packet)
2245                .expect("packet should be valid")
2246                .expect("packet should be trackable");
2247            assert_matches!(
2248                table
2249                    .finalize_connection(&mut bindings_ctx, conn)
2250                    .expect("connection should not conflict"),
2251                (true, Some(_))
2252            );
2253        }
2254
2255        // If the port is in the specified range, but results in a non-unique tuple,
2256        // rewriting should succeed as long as some port exists in the range that
2257        // results in a unique tuple.
2258        let mut conn =
2259            ConnectionExclusive::with_reply_tuple(&bindings_ctx, which, LOCAL_PORT.get());
2260        const MIN_PORT: NonZeroU16 = NonZeroU16::new(LOCAL_PORT.get() - 1).unwrap();
2261        let result = rewrite_reply_tuple_port(
2262            &mut bindings_ctx,
2263            &table,
2264            &mut conn,
2265            which,
2266            MIN_PORT..=MAX_PORT,
2267            true, /* ensure_port_in_range */
2268            ConflictStrategy::RewritePort,
2269        );
2270        assert_eq!(
2271            result,
2272            Verdict::Accept(NatConfigurationResult::Result(
2273                ShouldNat::<_, FakeWeakAddressId<Ipv4>>::Yes(None)
2274            ))
2275        );
2276        assert_eq!(conn.reply_tuple(), &tuple_with_port(which, MIN_PORT.get()));
2277    }
2278
2279    #[test_case(ReplyTuplePort::Source)]
2280    #[test_case(ReplyTuplePort::Destination)]
2281    fn rewrite_port_skipped_if_existing_connection_can_be_adopted(which: ReplyTuplePort) {
2282        let mut bindings_ctx = FakeBindingsCtx::<Ipv4>::new();
2283        let table: Table<_, NatConfig<_, FakeWeakAddressId<Ipv4>>, _> =
2284            Table::new::<IntoCoreTimerCtx>(&mut bindings_ctx);
2285
2286        // If there is a conflicting connection already in the table, but the caller
2287        // specifies that existing connections can be adopted if they are identical to
2288        // the one we are NATing, and the one in the table is a match, the existing
2289        // connection should be adopted.
2290        let packet = packet_with_port(which, LOCAL_PORT.get());
2291        let (conn, _dir) = table
2292            .get_connection_for_packet_and_update(&bindings_ctx, &packet)
2293            .expect("packet should be valid")
2294            .expect("packet should be trackable");
2295        let existing = assert_matches!(
2296            table
2297                .finalize_connection(&mut bindings_ctx, conn)
2298                .expect("connection should not conflict"),
2299            (true, Some(conn)) => conn
2300        );
2301
2302        let mut conn = ConnectionExclusive::from_packet(&bindings_ctx, &packet);
2303        let result = rewrite_reply_tuple_port(
2304            &mut bindings_ctx,
2305            &table,
2306            &mut conn,
2307            which,
2308            NonZeroU16::MIN..=NonZeroU16::MAX,
2309            false, /* ensure_port_in_range */
2310            ConflictStrategy::AdoptExisting,
2311        );
2312        let conn = assert_matches!(
2313            result,
2314            Verdict::Accept(NatConfigurationResult::AdoptExisting(Connection::Shared(conn))) => conn
2315        );
2316        assert!(Arc::ptr_eq(&existing, &conn));
2317    }
2318}