1use core::fmt::Debug;
8use core::num::NonZeroU16;
9use core::ops::{ControlFlow, RangeInclusive};
10
11use derivative::Derivative;
12use log::{error, warn};
13use net_types::ip::IpVersionMarker;
14use net_types::SpecifiedAddr;
15use netstack3_base::sync::Mutex;
16use netstack3_base::{
17 Inspectable, InspectableValue, Inspector as _, IpAddressId as _, IpDeviceAddr, MarkDomain,
18 WeakIpAddressId,
19};
20use once_cell::sync::OnceCell;
21use packet_formats::ip::IpExt;
22use rand::Rng as _;
23
24use crate::actions::MarkAction;
25use crate::conntrack::{
26 CompatibleWith, Connection, ConnectionDirection, ConnectionExclusive, Table, TransportProtocol,
27};
28use crate::context::{FilterBindingsContext, FilterBindingsTypes, NatContext};
29use crate::logic::{IngressVerdict, Interfaces, RoutineResult, Verdict};
30use crate::packets::{IpPacket, MaybeTransportPacketMut as _, TransportPacketMut as _};
31use crate::state::{FilterMarkMetadata, Hook};
32
33#[derive(Derivative)]
42#[derivative(Default(bound = ""), Debug(bound = "A: Debug"), PartialEq(bound = ""))]
43pub struct NatConfig<I: IpExt, A> {
44 destination: OnceCell<ShouldNat<I, A>>,
45 source: OnceCell<ShouldNat<I, A>>,
46}
47
48#[derive(Derivative)]
51#[derivative(Debug(bound = "A: Debug"), PartialEq(bound = ""))]
52pub(crate) enum ShouldNat<I: IpExt, A> {
53 Yes(#[derivative(PartialEq = "ignore")] Option<CachedAddr<I, A>>),
58 No,
60}
61
62impl<I: IpExt, A: PartialEq> CompatibleWith for NatConfig<I, A> {
63 fn compatible_with(&self, other: &Self) -> bool {
64 self.source.get().unwrap_or(&ShouldNat::No) == other.source.get().unwrap_or(&ShouldNat::No)
70 && self.destination.get().unwrap_or(&ShouldNat::No)
71 == other.destination.get().unwrap_or(&ShouldNat::No)
72 }
73}
74
75impl<I: IpExt, A, BT: FilterBindingsTypes> Connection<I, NatConfig<I, A>, BT> {
76 pub fn destination_nat(&self) -> bool {
77 match self.external_data().destination.get() {
78 Some(ShouldNat::Yes(_)) => true,
79 Some(ShouldNat::No) | None => false,
80 }
81 }
82}
83
84impl<I: IpExt, A: InspectableValue> Inspectable for NatConfig<I, A> {
85 fn record<Inspector: netstack3_base::Inspector>(&self, inspector: &mut Inspector) {
86 fn record_nat_status<
87 I: IpExt,
88 A: InspectableValue,
89 Inspector: netstack3_base::Inspector,
90 >(
91 inspector: &mut Inspector,
92 config: &OnceCell<ShouldNat<I, A>>,
93 ) {
94 let status = match config.get() {
95 None => "Unconfigured",
96 Some(ShouldNat::No) => "No-op",
97 Some(ShouldNat::Yes(cached_addr)) => {
98 if let Some(CachedAddr { id, _marker }) = cached_addr {
99 match &*id.lock() {
100 Some(id) => inspector.record_inspectable_value("To", id),
101 None => inspector.record_str("To", "InvalidAddress"),
102 }
103 }
104 "NAT"
105 }
106 };
107 inspector.record_str("Status", status);
108 }
109
110 let Self { source, destination } = self;
111 inspector.record_child("NAT", |inspector| {
112 inspector
113 .record_child("Destination", |inspector| record_nat_status(inspector, destination));
114 inspector.record_child("Source", |inspector| record_nat_status(inspector, source));
115 });
116 }
117}
118
119#[derive(Derivative)]
122#[derivative(Debug(bound = "A: Debug"))]
123pub(crate) struct CachedAddr<I: IpExt, A> {
124 id: Mutex<Option<A>>,
125 _marker: IpVersionMarker<I>,
126}
127
128impl<I: IpExt, A> CachedAddr<I, A> {
129 fn new(id: A) -> Self {
130 Self { id: Mutex::new(Some(id)), _marker: IpVersionMarker::new() }
131 }
132}
133
134impl<I: IpExt, A: WeakIpAddressId<I::Addr>> CachedAddr<I, A> {
135 fn validate_or_replace<CC, BT>(
140 &self,
141 core_ctx: &mut CC,
142 device: &CC::DeviceId,
143 addr: I::Addr,
144 ) -> Verdict
145 where
146 CC: NatContext<I, BT, WeakAddressId = A>,
147 BT: FilterBindingsContext,
148 {
149 let Self { id, _marker } = self;
150
151 {
153 if id.lock().as_ref().map(|id| id.is_assigned()).unwrap_or(false) {
154 return Verdict::Accept(());
155 }
156 }
157
158 match IpDeviceAddr::new(addr).and_then(|addr| core_ctx.get_address_id(device, addr)) {
169 Some(new) => {
170 *id.lock() = Some(new.downgrade());
171 Verdict::Accept(())
172 }
173 None => {
178 *id.lock() = None;
179 Verdict::Drop
180 }
181 }
182 }
183}
184
185#[derive(Debug, Clone, Copy, PartialEq)]
187pub enum NatType {
188 Destination,
190 Source,
192}
193
194pub(crate) trait NatHook<I: IpExt> {
195 type Verdict<R: Debug>: FilterVerdict<R> + Debug;
196
197 fn verdict_behavior<R: Debug>(v: Self::Verdict<R>) -> ControlFlow<Self::Verdict<()>, R>;
198
199 const NAT_TYPE: NatType;
200
201 fn evaluate_result<P, CC, BC>(
204 core_ctx: &mut CC,
205 bindings_ctx: &mut BC,
206 table: &Table<I, NatConfig<I, CC::WeakAddressId>, BC>,
207 conn: &mut ConnectionExclusive<I, NatConfig<I, CC::WeakAddressId>, BC>,
208 packet: &P,
209 interfaces: &Interfaces<'_, CC::DeviceId>,
210 result: RoutineResult<I>,
211 ) -> ControlFlow<Self::Verdict<NatConfigurationResult<I, CC::WeakAddressId, BC>>>
212 where
213 P: IpPacket<I>,
214 CC: NatContext<I, BC>,
215 BC: FilterBindingsContext;
216
217 fn redirect_addr<P, CC, BT>(
225 core_ctx: &mut CC,
226 packet: &P,
227 ingress: Option<&CC::DeviceId>,
228 ) -> Option<(I::Addr, Option<CachedAddr<I, CC::WeakAddressId>>)>
229 where
230 P: IpPacket<I>,
231 CC: NatContext<I, BT>,
232 BT: FilterBindingsTypes;
233
234 fn interface<DeviceId>(interfaces: Interfaces<'_, DeviceId>) -> &DeviceId;
241}
242
243pub(crate) trait FilterVerdict<R>: From<Verdict<R>> {
244 fn accept(&self) -> Option<&R>;
245}
246
247impl<R> FilterVerdict<R> for Verdict<R> {
248 fn accept(&self) -> Option<&R> {
249 match self {
250 Self::Accept(result) => Some(result),
251 Self::Drop => None,
252 }
253 }
254}
255
256impl<R> Verdict<R> {
257 fn into_behavior(self) -> ControlFlow<Verdict<()>, R> {
258 match self {
259 Self::Accept(result) => ControlFlow::Continue(result),
260 Self::Drop => ControlFlow::Break(Verdict::Drop.into()),
261 }
262 }
263}
264
265#[derive(Derivative)]
266#[derivative(Debug(bound = "A: Debug"))]
267pub(crate) enum NatConfigurationResult<I: IpExt, A, BT: FilterBindingsTypes> {
268 Result(ShouldNat<I, A>),
269 AdoptExisting(Connection<I, NatConfig<I, A>, BT>),
270}
271
272pub(crate) enum IngressHook {}
273
274impl<I: IpExt> NatHook<I> for IngressHook {
275 type Verdict<R: Debug> = IngressVerdict<I, R>;
276
277 fn verdict_behavior<R: Debug>(v: Self::Verdict<R>) -> ControlFlow<Self::Verdict<()>, R> {
278 v.into_behavior()
279 }
280
281 const NAT_TYPE: NatType = NatType::Destination;
282
283 fn evaluate_result<P, CC, BC>(
284 core_ctx: &mut CC,
285 bindings_ctx: &mut BC,
286 table: &Table<I, NatConfig<I, CC::WeakAddressId>, BC>,
287 conn: &mut ConnectionExclusive<I, NatConfig<I, CC::WeakAddressId>, BC>,
288 packet: &P,
289 interfaces: &Interfaces<'_, CC::DeviceId>,
290 result: RoutineResult<I>,
291 ) -> ControlFlow<Self::Verdict<NatConfigurationResult<I, CC::WeakAddressId, BC>>>
292 where
293 P: IpPacket<I>,
294 CC: NatContext<I, BC>,
295 BC: FilterBindingsContext,
296 {
297 match result {
298 RoutineResult::Accept | RoutineResult::Return => ControlFlow::Continue(()),
299 RoutineResult::Drop => ControlFlow::Break(Verdict::Drop.into()),
300 RoutineResult::TransparentLocalDelivery { addr, port } => {
301 ControlFlow::Break(IngressVerdict::TransparentLocalDelivery { addr, port })
302 }
303 RoutineResult::Redirect { dst_port } => {
304 ControlFlow::Break(configure_redirect_nat::<Self, _, _, _, _>(
305 core_ctx,
306 bindings_ctx,
307 table,
308 conn,
309 packet,
310 interfaces,
311 dst_port,
312 ))
313 }
314 result @ RoutineResult::Masquerade { .. } => {
315 unreachable!("SNAT not supported in INGRESS; got {result:?}")
316 }
317 }
318 }
319
320 fn redirect_addr<P, CC, BT>(
321 core_ctx: &mut CC,
322 packet: &P,
323 ingress: Option<&CC::DeviceId>,
324 ) -> Option<(I::Addr, Option<CachedAddr<I, CC::WeakAddressId>>)>
325 where
326 P: IpPacket<I>,
327 CC: NatContext<I, BT>,
328 BT: FilterBindingsTypes,
329 {
330 let interface = ingress.expect("must have ingress interface in ingress hook");
331 let addr_id = core_ctx
332 .get_local_addr_for_remote(interface, SpecifiedAddr::new(packet.src_addr()))
333 .or_else(|| {
334 warn!(
335 "cannot redirect because there is no address assigned to the incoming \
336 interface {interface:?}; dropping packet",
337 );
338 None
339 })?;
340 let addr = addr_id.addr();
341 Some((addr.addr(), Some(CachedAddr::new(addr_id.downgrade()))))
342 }
343
344 fn interface<DeviceId>(interfaces: Interfaces<'_, DeviceId>) -> &DeviceId {
345 let Interfaces { ingress, egress: _ } = interfaces;
346 ingress.expect("ingress interface must be provided to INGRESS hook")
347 }
348}
349
350impl<I: IpExt, R> FilterVerdict<R> for IngressVerdict<I, R> {
351 fn accept(&self) -> Option<&R> {
352 match self {
353 Self::Verdict(Verdict::Accept(result)) => Some(result),
354 Self::Verdict(Verdict::Drop) | Self::TransparentLocalDelivery { .. } => None,
355 }
356 }
357}
358
359impl<I: IpExt, R> IngressVerdict<I, R> {
360 fn into_behavior(self) -> ControlFlow<IngressVerdict<I, ()>, R> {
361 match self {
362 Self::Verdict(v) => match v.into_behavior() {
363 ControlFlow::Continue(r) => ControlFlow::Continue(r),
364 ControlFlow::Break(v) => ControlFlow::Break(v.into()),
365 },
366 Self::TransparentLocalDelivery { addr, port } => {
367 ControlFlow::Break(IngressVerdict::TransparentLocalDelivery { addr, port })
368 }
369 }
370 }
371}
372
373pub(crate) enum LocalEgressHook {}
374
375impl<I: IpExt> NatHook<I> for LocalEgressHook {
376 type Verdict<R: Debug> = Verdict<R>;
377
378 fn verdict_behavior<R: Debug>(v: Self::Verdict<R>) -> ControlFlow<Self::Verdict<()>, R> {
379 v.into_behavior()
380 }
381
382 const NAT_TYPE: NatType = NatType::Destination;
383
384 fn evaluate_result<P, CC, BC>(
385 core_ctx: &mut CC,
386 bindings_ctx: &mut BC,
387 table: &Table<I, NatConfig<I, CC::WeakAddressId>, BC>,
388 conn: &mut ConnectionExclusive<I, NatConfig<I, CC::WeakAddressId>, BC>,
389 packet: &P,
390 interfaces: &Interfaces<'_, CC::DeviceId>,
391 result: RoutineResult<I>,
392 ) -> ControlFlow<Self::Verdict<NatConfigurationResult<I, CC::WeakAddressId, BC>>>
393 where
394 P: IpPacket<I>,
395 CC: NatContext<I, BC>,
396 BC: FilterBindingsContext,
397 {
398 match result {
399 RoutineResult::Accept | RoutineResult::Return => ControlFlow::Continue(()),
400 RoutineResult::Drop => ControlFlow::Break(Verdict::Drop.into()),
401 result @ RoutineResult::TransparentLocalDelivery { .. } => {
402 unreachable!(
403 "transparent local delivery is only valid in INGRESS hook; got {result:?}"
404 )
405 }
406 result @ RoutineResult::Masquerade { .. } => {
407 unreachable!("SNAT not supported in LOCAL_EGRESS; got {result:?}")
408 }
409 RoutineResult::Redirect { dst_port } => {
410 ControlFlow::Break(configure_redirect_nat::<Self, _, _, _, _>(
411 core_ctx,
412 bindings_ctx,
413 table,
414 conn,
415 packet,
416 interfaces,
417 dst_port,
418 ))
419 }
420 }
421 }
422
423 fn redirect_addr<P, CC, BT>(
424 _: &mut CC,
425 _: &P,
426 _: Option<&CC::DeviceId>,
427 ) -> Option<(I::Addr, Option<CachedAddr<I, CC::WeakAddressId>>)>
428 where
429 P: IpPacket<I>,
430 CC: NatContext<I, BT>,
431 BT: FilterBindingsTypes,
432 {
433 Some((*I::LOOPBACK_ADDRESS, None))
434 }
435
436 fn interface<DeviceId>(interfaces: Interfaces<'_, DeviceId>) -> &DeviceId {
437 let Interfaces { ingress: _, egress } = interfaces;
438 egress.expect("egress interface must be provided to LOCAL_EGRESS hook")
439 }
440}
441
442pub(crate) enum LocalIngressHook {}
443
444impl<I: IpExt> NatHook<I> for LocalIngressHook {
445 type Verdict<R: Debug> = Verdict<R>;
446
447 fn verdict_behavior<R: Debug>(v: Self::Verdict<R>) -> ControlFlow<Self::Verdict<()>, R> {
448 v.into_behavior()
449 }
450
451 const NAT_TYPE: NatType = NatType::Source;
452
453 fn evaluate_result<P, CC, BC>(
454 _core_ctx: &mut CC,
455 _bindings_ctx: &mut BC,
456 _table: &Table<I, NatConfig<I, CC::WeakAddressId>, BC>,
457 _conn: &mut ConnectionExclusive<I, NatConfig<I, CC::WeakAddressId>, BC>,
458 _packet: &P,
459 _interfaces: &Interfaces<'_, CC::DeviceId>,
460 result: RoutineResult<I>,
461 ) -> ControlFlow<Self::Verdict<NatConfigurationResult<I, CC::WeakAddressId, BC>>>
462 where
463 P: IpPacket<I>,
464 CC: NatContext<I, BC>,
465 BC: FilterBindingsContext,
466 {
467 match result {
468 RoutineResult::Accept | RoutineResult::Return => ControlFlow::Continue(()),
469 RoutineResult::Drop => ControlFlow::Break(Verdict::Drop.into()),
470 result @ RoutineResult::Masquerade { .. } => {
471 unreachable!("Masquerade not supported in LOCAL_INGRESS; got {result:?}")
472 }
473 result @ RoutineResult::TransparentLocalDelivery { .. } => {
474 unreachable!(
475 "transparent local delivery is only valid in INGRESS hook; got {result:?}"
476 )
477 }
478 result @ RoutineResult::Redirect { .. } => {
479 unreachable!("DNAT not supported in LOCAL_INGRESS; got {result:?}")
480 }
481 }
482 }
483
484 fn redirect_addr<P, CC, BT>(
485 _: &mut CC,
486 _: &P,
487 _: Option<&CC::DeviceId>,
488 ) -> Option<(I::Addr, Option<CachedAddr<I, CC::WeakAddressId>>)>
489 where
490 P: IpPacket<I>,
491 CC: NatContext<I, BT>,
492 BT: FilterBindingsTypes,
493 {
494 unreachable!("DNAT not supported in LOCAL_INGRESS; cannot perform redirect action")
495 }
496
497 fn interface<DeviceId>(interfaces: Interfaces<'_, DeviceId>) -> &DeviceId {
498 let Interfaces { ingress, egress: _ } = interfaces;
499 ingress.expect("ingress interface must be provided to LOCAL_INGRESS hook")
500 }
501}
502
503pub(crate) enum EgressHook {}
504
505impl<I: IpExt> NatHook<I> for EgressHook {
506 type Verdict<R: Debug> = Verdict<R>;
507
508 fn verdict_behavior<R: Debug>(v: Self::Verdict<R>) -> ControlFlow<Self::Verdict<()>, R> {
509 v.into_behavior()
510 }
511
512 const NAT_TYPE: NatType = NatType::Source;
513
514 fn evaluate_result<P, CC, BC>(
515 core_ctx: &mut CC,
516 bindings_ctx: &mut BC,
517 table: &Table<I, NatConfig<I, CC::WeakAddressId>, BC>,
518 conn: &mut ConnectionExclusive<I, NatConfig<I, CC::WeakAddressId>, BC>,
519 packet: &P,
520 interfaces: &Interfaces<'_, CC::DeviceId>,
521 result: RoutineResult<I>,
522 ) -> ControlFlow<Self::Verdict<NatConfigurationResult<I, CC::WeakAddressId, BC>>>
523 where
524 P: IpPacket<I>,
525 CC: NatContext<I, BC>,
526 BC: FilterBindingsContext,
527 {
528 match result {
529 RoutineResult::Accept | RoutineResult::Return => ControlFlow::Continue(()),
530 RoutineResult::Drop => ControlFlow::Break(Verdict::Drop.into()),
531 RoutineResult::Masquerade { src_port } => {
532 ControlFlow::Break(configure_masquerade_nat::<_, _, _, _>(
533 core_ctx,
534 bindings_ctx,
535 table,
536 conn,
537 packet,
538 interfaces,
539 src_port,
540 ))
541 }
542 result @ RoutineResult::TransparentLocalDelivery { .. } => {
543 unreachable!(
544 "transparent local delivery is only valid in INGRESS hook; got {result:?}"
545 )
546 }
547 result @ RoutineResult::Redirect { .. } => {
548 unreachable!("DNAT not supported in EGRESS; got {result:?}")
549 }
550 }
551 }
552
553 fn redirect_addr<P, CC, BT>(
554 _: &mut CC,
555 _: &P,
556 _: Option<&CC::DeviceId>,
557 ) -> Option<(I::Addr, Option<CachedAddr<I, CC::WeakAddressId>>)>
558 where
559 P: IpPacket<I>,
560 CC: NatContext<I, BT>,
561 BT: FilterBindingsTypes,
562 {
563 unreachable!("DNAT not supported in EGRESS; cannot perform redirect action")
564 }
565
566 fn interface<DeviceId>(interfaces: Interfaces<'_, DeviceId>) -> &DeviceId {
567 let Interfaces { ingress: _, egress } = interfaces;
568 egress.expect("egress interface must be provided to EGRESS hook")
569 }
570}
571
572impl<I: IpExt, A, BT: FilterBindingsTypes> Connection<I, NatConfig<I, A>, BT> {
573 fn relevant_config(
574 &self,
575 hook_nat_type: NatType,
576 direction: ConnectionDirection,
577 ) -> (&OnceCell<ShouldNat<I, A>>, NatType) {
578 let NatConfig { source, destination } = self.external_data();
579 match (hook_nat_type, direction) {
580 (NatType::Destination, ConnectionDirection::Original)
585 | (NatType::Source, ConnectionDirection::Reply) => (destination, NatType::Destination),
586 (NatType::Source, ConnectionDirection::Original)
591 | (NatType::Destination, ConnectionDirection::Reply) => (source, NatType::Source),
592 }
593 }
594
595 fn relevant_reply_tuple_addr(&self, nat_type: NatType) -> I::Addr {
596 match nat_type {
597 NatType::Destination => self.reply_tuple().src_addr,
598 NatType::Source => self.reply_tuple().dst_addr,
599 }
600 }
601
602 fn nat_config(
606 &self,
607 hook_nat_type: NatType,
608 direction: ConnectionDirection,
609 ) -> Option<&ShouldNat<I, A>> {
610 let (config, _nat_type) = self.relevant_config(hook_nat_type, direction);
611 config.get()
612 }
613
614 fn set_nat_config(
622 &self,
623 hook_nat_type: NatType,
624 direction: ConnectionDirection,
625 value: ShouldNat<I, A>,
626 ) -> Result<&ShouldNat<I, A>, (ShouldNat<I, A>, NatType)> {
627 let (config, nat_type) = self.relevant_config(hook_nat_type, direction);
628 let mut value = Some(value);
629 let config = config.get_or_init(|| value.take().unwrap());
630 match value {
631 None => Ok(config),
632 Some(value) => Err((value, nat_type)),
633 }
634 }
635}
636
637pub(crate) fn perform_nat<N, I, P, CC, BC>(
643 core_ctx: &mut CC,
644 bindings_ctx: &mut BC,
645 nat_installed: bool,
646 table: &Table<I, NatConfig<I, CC::WeakAddressId>, BC>,
647 conn: &mut Connection<I, NatConfig<I, CC::WeakAddressId>, BC>,
648 direction: ConnectionDirection,
649 hook: &Hook<I, BC::DeviceClass, ()>,
650 packet: &mut P,
651 interfaces: Interfaces<'_, CC::DeviceId>,
652) -> N::Verdict<()>
653where
654 N: NatHook<I>,
655 I: IpExt,
656 P: IpPacket<I>,
657 CC: NatContext<I, BC>,
658 BC: FilterBindingsContext,
659{
660 if !nat_installed {
661 return Verdict::Accept(()).into();
662 }
663
664 let nat_config = if let Some(nat) = conn.nat_config(N::NAT_TYPE, direction) {
665 nat
666 } else {
667 let (verdict, exclusive) = match (&mut *conn, direction) {
670 (Connection::Exclusive(_), ConnectionDirection::Reply) => {
671 (Verdict::Accept(NatConfigurationResult::Result(ShouldNat::No)).into(), true)
682 }
683 (Connection::Shared(_), _) => {
684 (Verdict::Accept(NatConfigurationResult::Result(ShouldNat::No)).into(), false)
692 }
693 (Connection::Exclusive(conn), ConnectionDirection::Original) => {
694 let verdict = configure_nat::<N, _, _, _, _>(
695 core_ctx,
696 bindings_ctx,
697 table,
698 conn,
699 hook,
700 packet,
701 interfaces.clone(),
702 );
703 let verdict = if matches!(
708 verdict.accept(),
709 Some(&NatConfigurationResult::Result(ShouldNat::No))
710 ) && N::NAT_TYPE == NatType::Source
711 {
712 configure_snat_port(
713 bindings_ctx,
714 table,
715 conn,
716 None, ConflictStrategy::AdoptExisting,
718 )
719 .into()
720 } else {
721 verdict
722 };
723 (verdict, true)
724 }
725 };
726
727 let result = match N::verdict_behavior(verdict) {
728 ControlFlow::Break(verdict) => {
729 return verdict;
730 }
731 ControlFlow::Continue(result) => result,
732 };
733 let new_nat_config = match result {
734 NatConfigurationResult::Result(config) => Some(config),
735 NatConfigurationResult::AdoptExisting(existing) => {
736 *conn = existing;
737 None
738 }
739 };
740 if let Some(config) = new_nat_config {
741 conn.set_nat_config(N::NAT_TYPE, direction, config).unwrap_or_else(
742 |(value, nat_type)| {
743 if exclusive {
748 unreachable!(
749 "{nat_type:?} NAT should not have been configured yet, but found \
750 {value:?}"
751 );
752 }
753 &ShouldNat::No
754 },
755 )
756 } else {
757 conn.nat_config(N::NAT_TYPE, direction).unwrap_or(&ShouldNat::No)
758 }
759 };
760
761 match nat_config {
762 ShouldNat::No => return Verdict::Accept(()).into(),
763 ShouldNat::Yes(None) => {}
767 ShouldNat::Yes(Some(cached_addr)) => {
770 if direction == ConnectionDirection::Original {
775 match cached_addr.validate_or_replace(
776 core_ctx,
777 N::interface(interfaces),
778 conn.relevant_reply_tuple_addr(N::NAT_TYPE),
779 ) {
780 Verdict::Accept(()) => {}
781 Verdict::Drop => return Verdict::Drop.into(),
782 }
783 }
784 }
785 }
786 rewrite_packet(conn, direction, N::NAT_TYPE, packet).into()
787}
788
789struct NatMetadata {}
790
791impl FilterMarkMetadata for NatMetadata {
792 fn apply_mark_action(&mut self, domain: MarkDomain, action: MarkAction) {
793 unreachable!("nat is not expected to configure packet marks, got {domain:?} -> {action:?}");
794 }
795}
796
797fn configure_nat<N, I, P, CC, BC>(
804 core_ctx: &mut CC,
805 bindings_ctx: &mut BC,
806 table: &Table<I, NatConfig<I, CC::WeakAddressId>, BC>,
807 conn: &mut ConnectionExclusive<I, NatConfig<I, CC::WeakAddressId>, BC>,
808 hook: &Hook<I, BC::DeviceClass, ()>,
809 packet: &P,
810 interfaces: Interfaces<'_, CC::DeviceId>,
811) -> N::Verdict<NatConfigurationResult<I, CC::WeakAddressId, BC>>
812where
813 N: NatHook<I>,
814 I: IpExt,
815 P: IpPacket<I>,
816 CC: NatContext<I, BC>,
817 BC: FilterBindingsContext,
818{
819 let Hook { routines } = hook;
820 for routine in routines {
821 let result = super::check_routine(&routine, packet, &interfaces, &mut NatMetadata {});
822 match N::evaluate_result(core_ctx, bindings_ctx, table, conn, packet, &interfaces, result) {
823 ControlFlow::Break(result) => return result,
824 ControlFlow::Continue(()) => {}
825 }
826 }
827 Verdict::Accept(NatConfigurationResult::Result(ShouldNat::No)).into()
828}
829
830fn configure_redirect_nat<N, I, P, CC, BC>(
833 core_ctx: &mut CC,
834 bindings_ctx: &mut BC,
835 table: &Table<I, NatConfig<I, CC::WeakAddressId>, BC>,
836 conn: &mut ConnectionExclusive<I, NatConfig<I, CC::WeakAddressId>, BC>,
837 packet: &P,
838 interfaces: &Interfaces<'_, CC::DeviceId>,
839 dst_port_range: Option<RangeInclusive<NonZeroU16>>,
840) -> N::Verdict<NatConfigurationResult<I, CC::WeakAddressId, BC>>
841where
842 N: NatHook<I>,
843 I: IpExt,
844 P: IpPacket<I>,
845 CC: NatContext<I, BC>,
846 BC: FilterBindingsContext,
847{
848 match N::NAT_TYPE {
849 NatType::Source => panic!("DNAT action called from SNAT-only hook"),
850 NatType::Destination => {}
851 }
852
853 let Some((addr, cached_addr)) = N::redirect_addr(core_ctx, packet, interfaces.ingress) else {
860 return Verdict::Drop.into();
861 };
862 conn.rewrite_reply_src_addr(addr);
863
864 let Some(range) = dst_port_range else {
865 return Verdict::Accept(NatConfigurationResult::Result(ShouldNat::Yes(cached_addr))).into();
866 };
867 match rewrite_reply_tuple_port(
868 bindings_ctx,
869 table,
870 conn,
871 ReplyTuplePort::Source,
872 range,
873 true, ConflictStrategy::RewritePort,
875 ) {
876 Verdict::Accept(
879 NatConfigurationResult::Result(ShouldNat::Yes(_))
880 | NatConfigurationResult::Result(ShouldNat::No),
881 ) => Verdict::Accept(NatConfigurationResult::Result(ShouldNat::Yes(cached_addr))),
882 Verdict::Accept(NatConfigurationResult::AdoptExisting(_)) => {
883 unreachable!("cannot adopt existing connection")
884 }
885 Verdict::Drop => Verdict::Drop,
886 }
887 .into()
888}
889
890fn configure_masquerade_nat<I, P, CC, BC>(
894 core_ctx: &mut CC,
895 bindings_ctx: &mut BC,
896 table: &Table<I, NatConfig<I, CC::WeakAddressId>, BC>,
897 conn: &mut ConnectionExclusive<I, NatConfig<I, CC::WeakAddressId>, BC>,
898 packet: &P,
899 interfaces: &Interfaces<'_, CC::DeviceId>,
900 src_port_range: Option<RangeInclusive<NonZeroU16>>,
901) -> Verdict<NatConfigurationResult<I, CC::WeakAddressId, BC>>
902where
903 I: IpExt,
904 P: IpPacket<I>,
905 CC: NatContext<I, BC>,
906 BC: FilterBindingsContext,
907{
908 let interface = interfaces.egress.expect(
912 "must have egress interface in EGRESS hook; Masquerade NAT is only valid in EGRESS",
913 );
914 let Some(addr) =
915 core_ctx.get_local_addr_for_remote(interface, SpecifiedAddr::new(packet.dst_addr()))
916 else {
917 warn!(
919 "cannot masquerade because there is no address assigned to the outgoing interface \
920 {interface:?}; dropping packet",
921 );
922 return Verdict::Drop;
923 };
924 conn.rewrite_reply_dst_addr(addr.addr().addr());
925
926 match configure_snat_port(
929 bindings_ctx,
930 table,
931 conn,
932 src_port_range,
933 ConflictStrategy::RewritePort,
934 ) {
935 Verdict::Accept(
938 NatConfigurationResult::Result(ShouldNat::Yes(_))
939 | NatConfigurationResult::Result(ShouldNat::No),
940 ) => Verdict::Accept(NatConfigurationResult::Result(ShouldNat::Yes(Some(
941 CachedAddr::new(addr.downgrade()),
942 )))),
943 Verdict::Accept(NatConfigurationResult::AdoptExisting(_)) => {
944 unreachable!("cannot adopt existing connection")
945 }
946 Verdict::Drop => Verdict::Drop,
947 }
948}
949
950fn configure_snat_port<I, A, BC>(
951 bindings_ctx: &mut BC,
952 table: &Table<I, NatConfig<I, A>, BC>,
953 conn: &mut ConnectionExclusive<I, NatConfig<I, A>, BC>,
954 src_port_range: Option<RangeInclusive<NonZeroU16>>,
955 conflict_strategy: ConflictStrategy,
956) -> Verdict<NatConfigurationResult<I, A, BC>>
957where
958 I: IpExt,
959 BC: FilterBindingsContext,
960 A: PartialEq,
961{
962 let (range, ensure_port_in_range) = if let Some(range) = src_port_range {
967 (range, true)
968 } else {
969 let reply_tuple = conn.reply_tuple();
970 let Some(range) =
971 similar_port_or_id_range(reply_tuple.protocol, reply_tuple.dst_port_or_id)
972 else {
973 return Verdict::Drop;
974 };
975 (range, false)
976 };
977 rewrite_reply_tuple_port(
978 bindings_ctx,
979 table,
980 conn,
981 ReplyTuplePort::Destination,
982 range,
983 ensure_port_in_range,
984 conflict_strategy,
985 )
986}
987
988fn similar_port_or_id_range(
995 protocol: TransportProtocol,
996 port_or_id: u16,
997) -> Option<RangeInclusive<NonZeroU16>> {
998 match protocol {
999 TransportProtocol::Tcp | TransportProtocol::Udp => Some(match port_or_id {
1000 _ if port_or_id < 512 => NonZeroU16::MIN..=NonZeroU16::new(511).unwrap(),
1001 _ if port_or_id < 1024 => NonZeroU16::MIN..=NonZeroU16::new(1023).unwrap(),
1002 _ => NonZeroU16::new(1024).unwrap()..=NonZeroU16::MAX,
1003 }),
1004 TransportProtocol::Icmp => Some(NonZeroU16::MIN..=NonZeroU16::MAX),
1006 TransportProtocol::Other(p) => {
1007 error!(
1008 "cannot rewrite port or ID of unsupported transport protocol {p}; dropping packet"
1009 );
1010 None
1011 }
1012 }
1013}
1014
1015#[derive(Clone, Copy)]
1016enum ReplyTuplePort {
1017 Source,
1018 Destination,
1019}
1020
1021enum ConflictStrategy {
1022 AdoptExisting,
1023 RewritePort,
1024}
1025
1026fn rewrite_reply_tuple_port<I: IpExt, BC: FilterBindingsContext, A: PartialEq>(
1030 bindings_ctx: &mut BC,
1031 table: &Table<I, NatConfig<I, A>, BC>,
1032 conn: &mut ConnectionExclusive<I, NatConfig<I, A>, BC>,
1033 which_port: ReplyTuplePort,
1034 port_range: RangeInclusive<NonZeroU16>,
1035 ensure_port_in_range: bool,
1036 conflict_strategy: ConflictStrategy,
1037) -> Verdict<NatConfigurationResult<I, A, BC>> {
1038 let current_port = match which_port {
1042 ReplyTuplePort::Source => conn.reply_tuple().src_port_or_id,
1043 ReplyTuplePort::Destination => conn.reply_tuple().dst_port_or_id,
1044 };
1045 let already_in_range = !ensure_port_in_range
1046 || NonZeroU16::new(current_port).map(|port| port_range.contains(&port)).unwrap_or(false);
1047 if already_in_range {
1048 match table.get_shared_connection(conn.reply_tuple()) {
1049 None => return Verdict::Accept(NatConfigurationResult::Result(ShouldNat::No)),
1050 Some(conflict) => match conflict_strategy {
1051 ConflictStrategy::AdoptExisting => {
1052 if conflict.compatible_with(&*conn) {
1056 return Verdict::Accept(NatConfigurationResult::AdoptExisting(
1057 Connection::Shared(conflict),
1058 ));
1059 }
1060 }
1061 ConflictStrategy::RewritePort => {}
1062 },
1063 }
1064 }
1065
1066 const MAX_ATTEMPTS: u16 = 128;
1075 let len = port_range.end().get() - port_range.start().get() + 1;
1076 let mut rng = bindings_ctx.rng();
1077 let start = rng.gen_range(port_range.start().get()..=port_range.end().get());
1078 for i in 0..core::cmp::min(MAX_ATTEMPTS, len) {
1079 let offset = (start + i) % len;
1082 let new_port = port_range.start().checked_add(offset).unwrap();
1083 match which_port {
1084 ReplyTuplePort::Source => conn.rewrite_reply_src_port_or_id(new_port.get()),
1085 ReplyTuplePort::Destination => conn.rewrite_reply_dst_port_or_id(new_port.get()),
1086 };
1087 if !table.contains_tuple(conn.reply_tuple()) {
1088 return Verdict::Accept(NatConfigurationResult::Result(ShouldNat::Yes(None)));
1089 }
1090 }
1091
1092 Verdict::Drop
1093}
1094
1095fn rewrite_packet<I, P, A, BT>(
1098 conn: &Connection<I, NatConfig<I, A>, BT>,
1099 direction: ConnectionDirection,
1100 nat: NatType,
1101 packet: &mut P,
1102) -> Verdict
1103where
1104 I: IpExt,
1105 P: IpPacket<I>,
1106 BT: FilterBindingsTypes,
1107{
1108 let tuple = match direction {
1116 ConnectionDirection::Original => conn.reply_tuple(),
1117 ConnectionDirection::Reply => conn.original_tuple(),
1118 };
1119 match nat {
1120 NatType::Destination => {
1121 let (new_dst_addr, new_dst_port) = (tuple.src_addr, tuple.src_port_or_id);
1122
1123 packet.set_dst_addr(new_dst_addr);
1124 let proto = packet.protocol();
1125 let mut transport = packet.transport_packet_mut();
1126 let Some(mut transport) = transport.transport_packet_mut() else {
1127 return Verdict::Accept(());
1128 };
1129 let Some(new_dst_port) = NonZeroU16::new(new_dst_port) else {
1130 error!("cannot rewrite dst port to unspecified; dropping {proto} packet");
1133 return Verdict::Drop;
1134 };
1135 transport.set_dst_port(new_dst_port);
1136 }
1137 NatType::Source => {
1138 let (new_src_addr, new_src_port) = (tuple.dst_addr, tuple.dst_port_or_id);
1139
1140 packet.set_src_addr(new_src_addr);
1141 let proto = packet.protocol();
1142 let mut transport = packet.transport_packet_mut();
1143 let Some(mut transport) = transport.transport_packet_mut() else {
1144 return Verdict::Accept(());
1145 };
1146 let Some(new_src_port) = NonZeroU16::new(new_src_port) else {
1147 error!("cannot rewrite src port to unspecified; dropping {proto} packet");
1150 return Verdict::Drop;
1151 };
1152 transport.set_src_port(new_src_port);
1153 }
1154 }
1155 Verdict::Accept(())
1156}
1157
1158#[cfg(test)]
1159mod tests {
1160 use alloc::sync::Arc;
1161 use alloc::vec;
1162 use core::marker::PhantomData;
1163
1164 use assert_matches::assert_matches;
1165 use ip_test_macro::ip_test;
1166 use net_types::ip::{AddrSubnet, Ipv4};
1167 use netstack3_base::IntoCoreTimerCtx;
1168 use test_case::test_case;
1169
1170 use super::*;
1171 use crate::conntrack::{PacketMetadata, Tuple};
1172 use crate::context::testutil::{
1173 FakeBindingsCtx, FakeDeviceClass, FakeNatCtx, FakePrimaryAddressId, FakeWeakAddressId,
1174 };
1175 use crate::matchers::testutil::{ethernet_interface, FakeDeviceId};
1176 use crate::matchers::PacketMatcher;
1177 use crate::packets::testutil::internal::{ArbitraryValue, FakeIpPacket, FakeUdpPacket};
1178 use crate::state::{Action, Routine, Rule, TransparentProxy};
1179 use crate::testutil::TestIpExt;
1180
1181 impl<I: IpExt, A: PartialEq, BT: FilterBindingsTypes> PartialEq
1182 for NatConfigurationResult<I, A, BT>
1183 {
1184 fn eq(&self, other: &Self) -> bool {
1185 match (self, other) {
1186 (Self::Result(lhs), Self::Result(rhs)) => lhs == rhs,
1187 (Self::AdoptExisting(_), Self::AdoptExisting(_)) => {
1188 panic!("equality check for connections is not supported")
1189 }
1190 _ => false,
1191 }
1192 }
1193 }
1194
1195 impl<I: IpExt, A, BC: FilterBindingsContext> ConnectionExclusive<I, NatConfig<I, A>, BC> {
1196 fn from_packet<P: IpPacket<I>>(bindings_ctx: &BC, packet: &P) -> Self {
1197 let packet = PacketMetadata::new(packet).expect("packet should be trackable");
1198 ConnectionExclusive::from_deconstructed_packet(bindings_ctx, &packet)
1199 .expect("create conntrack entry")
1200 }
1201 }
1202
1203 impl<A, BC: FilterBindingsContext> ConnectionExclusive<Ipv4, NatConfig<Ipv4, A>, BC> {
1204 fn with_reply_tuple(bindings_ctx: &BC, which: ReplyTuplePort, port: u16) -> Self {
1205 Self::from_packet(bindings_ctx, &packet_with_port(which, port).reply())
1206 }
1207 }
1208
1209 fn packet_with_port(which: ReplyTuplePort, port: u16) -> FakeIpPacket<Ipv4, FakeUdpPacket> {
1210 let mut packet = FakeIpPacket::<Ipv4, FakeUdpPacket>::arbitrary_value();
1211 match which {
1212 ReplyTuplePort::Source => packet.body.src_port = port,
1213 ReplyTuplePort::Destination => packet.body.dst_port = port,
1214 }
1215 packet
1216 }
1217
1218 fn tuple_with_port(which: ReplyTuplePort, port: u16) -> Tuple<Ipv4> {
1219 Tuple::from_packet(&packet_with_port(which, port)).unwrap()
1220 }
1221
1222 #[test]
1223 fn accept_by_default_if_no_matching_rules_in_hook() {
1224 let mut bindings_ctx = FakeBindingsCtx::<Ipv4>::new();
1225 let conntrack = Table::new::<IntoCoreTimerCtx>(&mut bindings_ctx);
1226 let mut core_ctx = FakeNatCtx::default();
1227 let packet = FakeIpPacket::<_, FakeUdpPacket>::arbitrary_value();
1228 let mut conn = ConnectionExclusive::from_packet(&bindings_ctx, &packet);
1229
1230 assert_eq!(
1231 configure_nat::<LocalEgressHook, _, _, _, _>(
1232 &mut core_ctx,
1233 &mut bindings_ctx,
1234 &conntrack,
1235 &mut conn,
1236 &Hook::default(),
1237 &packet,
1238 Interfaces { ingress: None, egress: None },
1239 ),
1240 Verdict::Accept(NatConfigurationResult::Result(ShouldNat::No))
1241 );
1242 }
1243
1244 #[test]
1245 fn accept_by_default_if_return_from_routine() {
1246 let mut bindings_ctx = FakeBindingsCtx::<Ipv4>::new();
1247 let conntrack = Table::new::<IntoCoreTimerCtx>(&mut bindings_ctx);
1248 let mut core_ctx = FakeNatCtx::default();
1249 let packet = FakeIpPacket::<_, FakeUdpPacket>::arbitrary_value();
1250 let mut conn = ConnectionExclusive::from_packet(&bindings_ctx, &packet);
1251
1252 let hook = Hook {
1253 routines: vec![Routine {
1254 rules: vec![Rule::new(PacketMatcher::default(), Action::Return)],
1255 }],
1256 };
1257 assert_eq!(
1258 configure_nat::<LocalEgressHook, _, _, _, _>(
1259 &mut core_ctx,
1260 &mut bindings_ctx,
1261 &conntrack,
1262 &mut conn,
1263 &hook,
1264 &packet,
1265 Interfaces { ingress: None, egress: None },
1266 ),
1267 Verdict::Accept(NatConfigurationResult::Result(ShouldNat::No))
1268 );
1269 }
1270
1271 #[test]
1272 fn accept_terminal_for_installed_routine() {
1273 let mut bindings_ctx = FakeBindingsCtx::<Ipv4>::new();
1274 let conntrack = Table::new::<IntoCoreTimerCtx>(&mut bindings_ctx);
1275 let mut core_ctx = FakeNatCtx::default();
1276 let packet = FakeIpPacket::<_, FakeUdpPacket>::arbitrary_value();
1277 let mut conn = ConnectionExclusive::from_packet(&bindings_ctx, &packet);
1278
1279 let routine = Routine {
1281 rules: vec![
1282 Rule::new(PacketMatcher::default(), Action::Accept),
1284 Rule::new(PacketMatcher::default(), Action::Drop),
1286 ],
1287 };
1288 assert_eq!(
1289 configure_nat::<LocalEgressHook, _, _, _, _>(
1290 &mut core_ctx,
1291 &mut bindings_ctx,
1292 &conntrack,
1293 &mut conn,
1294 &Hook { routines: vec![routine.clone()] },
1295 &packet,
1296 Interfaces { ingress: None, egress: None },
1297 ),
1298 Verdict::Accept(NatConfigurationResult::Result(ShouldNat::No))
1299 );
1300
1301 let hook = Hook {
1304 routines: vec![
1305 routine,
1306 Routine {
1307 rules: vec![
1308 Rule::new(PacketMatcher::default(), Action::Drop),
1310 ],
1311 },
1312 ],
1313 };
1314 assert_eq!(
1315 configure_nat::<LocalEgressHook, _, _, _, _>(
1316 &mut core_ctx,
1317 &mut bindings_ctx,
1318 &conntrack,
1319 &mut conn,
1320 &hook,
1321 &packet,
1322 Interfaces { ingress: None, egress: None },
1323 ),
1324 Verdict::Drop.into()
1325 );
1326 }
1327
1328 #[test]
1329 fn drop_terminal_for_entire_hook() {
1330 let mut bindings_ctx = FakeBindingsCtx::<Ipv4>::new();
1331 let conntrack = Table::new::<IntoCoreTimerCtx>(&mut bindings_ctx);
1332 let mut core_ctx = FakeNatCtx::default();
1333 let packet = FakeIpPacket::<_, FakeUdpPacket>::arbitrary_value();
1334 let mut conn = ConnectionExclusive::from_packet(&bindings_ctx, &packet);
1335
1336 let hook = Hook {
1337 routines: vec![
1338 Routine {
1339 rules: vec![
1340 Rule::new(PacketMatcher::default(), Action::Drop),
1342 ],
1343 },
1344 Routine {
1345 rules: vec![
1346 Rule::new(PacketMatcher::default(), Action::Accept),
1348 ],
1349 },
1350 ],
1351 };
1352
1353 assert_eq!(
1354 configure_nat::<LocalEgressHook, _, _, _, _>(
1355 &mut core_ctx,
1356 &mut bindings_ctx,
1357 &conntrack,
1358 &mut conn,
1359 &hook,
1360 &packet,
1361 Interfaces { ingress: None, egress: None },
1362 ),
1363 Verdict::Drop.into()
1364 );
1365 }
1366
1367 #[test]
1368 fn transparent_proxy_terminal_for_entire_hook() {
1369 let mut bindings_ctx = FakeBindingsCtx::<Ipv4>::new();
1370 let conntrack = Table::new::<IntoCoreTimerCtx>(&mut bindings_ctx);
1371 let mut core_ctx = FakeNatCtx::default();
1372 let packet = FakeIpPacket::<_, FakeUdpPacket>::arbitrary_value();
1373 let mut conn = ConnectionExclusive::from_packet(&bindings_ctx, &packet);
1374
1375 let ingress = Hook {
1376 routines: vec![
1377 Routine {
1378 rules: vec![Rule::new(
1379 PacketMatcher::default(),
1380 Action::TransparentProxy(TransparentProxy::LocalPort(LOCAL_PORT)),
1381 )],
1382 },
1383 Routine {
1384 rules: vec![
1385 Rule::new(PacketMatcher::default(), Action::Accept),
1387 ],
1388 },
1389 ],
1390 };
1391
1392 assert_eq!(
1393 configure_nat::<IngressHook, _, _, _, _>(
1394 &mut core_ctx,
1395 &mut bindings_ctx,
1396 &conntrack,
1397 &mut conn,
1398 &ingress,
1399 &packet,
1400 Interfaces { ingress: None, egress: None },
1401 ),
1402 IngressVerdict::TransparentLocalDelivery {
1403 addr: <Ipv4 as crate::packets::testutil::internal::TestIpExt>::DST_IP,
1404 port: LOCAL_PORT
1405 }
1406 );
1407 }
1408
1409 #[test]
1410 fn redirect_terminal_for_entire_hook() {
1411 let mut bindings_ctx = FakeBindingsCtx::<Ipv4>::new();
1412 let conntrack = Table::new::<IntoCoreTimerCtx>(&mut bindings_ctx);
1413 let mut core_ctx = FakeNatCtx::default();
1414 let packet = FakeIpPacket::<_, FakeUdpPacket>::arbitrary_value();
1415 let mut conn = ConnectionExclusive::from_packet(&bindings_ctx, &packet);
1416
1417 let hook = Hook {
1418 routines: vec![
1419 Routine {
1420 rules: vec![
1421 Rule::new(PacketMatcher::default(), Action::Redirect { dst_port: None }),
1423 ],
1424 },
1425 Routine {
1426 rules: vec![
1427 Rule::new(PacketMatcher::default(), Action::Drop),
1429 ],
1430 },
1431 ],
1432 };
1433
1434 assert_eq!(
1435 configure_nat::<LocalEgressHook, _, _, _, _>(
1436 &mut core_ctx,
1437 &mut bindings_ctx,
1438 &conntrack,
1439 &mut conn,
1440 &hook,
1441 &packet,
1442 Interfaces { ingress: None, egress: None },
1443 ),
1444 Verdict::Accept(NatConfigurationResult::Result(ShouldNat::Yes(None)))
1445 );
1446 }
1447
1448 #[ip_test(I)]
1449 fn masquerade_terminal_for_entire_hook<I: TestIpExt>() {
1450 let mut bindings_ctx = FakeBindingsCtx::<I>::new();
1451 let conntrack = Table::new::<IntoCoreTimerCtx>(&mut bindings_ctx);
1452 let assigned_addr = AddrSubnet::new(I::SRC_IP_2, I::SUBNET.prefix()).unwrap();
1453 let mut core_ctx = FakeNatCtx::new([(ethernet_interface(), assigned_addr)]);
1454 let packet = FakeIpPacket::<_, FakeUdpPacket>::arbitrary_value();
1455 let mut conn = ConnectionExclusive::from_packet(&bindings_ctx, &packet);
1456
1457 let hook = Hook {
1458 routines: vec![
1459 Routine {
1460 rules: vec![
1461 Rule::new(PacketMatcher::default(), Action::Masquerade { src_port: None }),
1463 ],
1464 },
1465 Routine {
1466 rules: vec![
1467 Rule::new(PacketMatcher::default(), Action::Drop),
1469 ],
1470 },
1471 ],
1472 };
1473
1474 assert_matches!(
1475 configure_nat::<EgressHook, _, _, _, _>(
1476 &mut core_ctx,
1477 &mut bindings_ctx,
1478 &conntrack,
1479 &mut conn,
1480 &hook,
1481 &packet,
1482 Interfaces { ingress: None, egress: Some(ðernet_interface()) },
1483 ),
1484 Verdict::Accept(NatConfigurationResult::Result(ShouldNat::Yes(Some(_))))
1485 );
1486 }
1487
1488 #[test]
1489 fn redirect_ingress_drops_packet_if_no_assigned_address() {
1490 let mut bindings_ctx = FakeBindingsCtx::<Ipv4>::new();
1491 let conntrack = Table::new::<IntoCoreTimerCtx>(&mut bindings_ctx);
1492 let mut core_ctx = FakeNatCtx::default();
1493 let packet = FakeIpPacket::<_, FakeUdpPacket>::arbitrary_value();
1494 let mut conn = ConnectionExclusive::from_packet(&bindings_ctx, &packet);
1495
1496 let hook = Hook {
1497 routines: vec![Routine {
1498 rules: vec![Rule::new(
1499 PacketMatcher::default(),
1500 Action::Redirect { dst_port: None },
1501 )],
1502 }],
1503 };
1504
1505 assert_eq!(
1506 configure_nat::<IngressHook, _, _, _, _>(
1507 &mut core_ctx,
1508 &mut bindings_ctx,
1509 &conntrack,
1510 &mut conn,
1511 &hook,
1512 &packet,
1513 Interfaces { ingress: Some(ðernet_interface()), egress: None },
1514 ),
1515 Verdict::Drop.into()
1516 );
1517 }
1518
1519 #[test]
1520 fn masquerade_egress_drops_packet_if_no_assigned_address() {
1521 let mut bindings_ctx = FakeBindingsCtx::<Ipv4>::new();
1522 let conntrack = Table::new::<IntoCoreTimerCtx>(&mut bindings_ctx);
1523 let mut core_ctx = FakeNatCtx::default();
1524 let packet = FakeIpPacket::<_, FakeUdpPacket>::arbitrary_value();
1525 let mut conn = ConnectionExclusive::from_packet(&bindings_ctx, &packet);
1526
1527 let hook = Hook {
1528 routines: vec![Routine {
1529 rules: vec![Rule::new(
1530 PacketMatcher::default(),
1531 Action::Masquerade { src_port: None },
1532 )],
1533 }],
1534 };
1535
1536 assert_eq!(
1537 configure_nat::<EgressHook, _, _, _, _>(
1538 &mut core_ctx,
1539 &mut bindings_ctx,
1540 &conntrack,
1541 &mut conn,
1542 &hook,
1543 &packet,
1544 Interfaces { ingress: None, egress: Some(ðernet_interface()) },
1545 ),
1546 Verdict::Drop.into()
1547 );
1548 }
1549
1550 trait NatHookExt<I: IpExt>: NatHook<I, Verdict<()>: PartialEq> {
1551 fn interfaces<'a>(interface: &'a FakeDeviceId) -> Interfaces<'a, FakeDeviceId>;
1552 }
1553
1554 impl<I: IpExt> NatHookExt<I> for IngressHook {
1555 fn interfaces<'a>(interface: &'a FakeDeviceId) -> Interfaces<'a, FakeDeviceId> {
1556 Interfaces { ingress: Some(interface), egress: None }
1557 }
1558 }
1559
1560 impl<I: IpExt> NatHookExt<I> for LocalEgressHook {
1561 fn interfaces<'a>(interface: &'a FakeDeviceId) -> Interfaces<'a, FakeDeviceId> {
1562 Interfaces { ingress: None, egress: Some(interface) }
1563 }
1564 }
1565
1566 impl<I: IpExt> NatHookExt<I> for EgressHook {
1567 fn interfaces<'a>(interface: &'a FakeDeviceId) -> Interfaces<'a, FakeDeviceId> {
1568 Interfaces { ingress: None, egress: Some(interface) }
1569 }
1570 }
1571
1572 const NAT_ENABLED_FOR_TESTS: bool = true;
1573
1574 #[ip_test(I)]
1575 fn nat_disabled_for_self_connected_flows<I: TestIpExt>() {
1576 let mut bindings_ctx = FakeBindingsCtx::<I>::new();
1577 let conntrack = Table::new::<IntoCoreTimerCtx>(&mut bindings_ctx);
1578 let mut core_ctx = FakeNatCtx::default();
1579
1580 let mut packet = FakeIpPacket::<I, _> {
1581 src_ip: I::SRC_IP,
1582 dst_ip: I::SRC_IP,
1583 body: FakeUdpPacket { src_port: 22222, dst_port: 22222 },
1584 };
1585 let (mut conn, direction) = conntrack
1586 .get_connection_for_packet_and_update(&bindings_ctx, &packet)
1587 .expect("packet should be valid")
1588 .expect("packet should be trackable");
1589
1590 let verdict = perform_nat::<LocalEgressHook, _, _, _, _>(
1594 &mut core_ctx,
1595 &mut bindings_ctx,
1596 NAT_ENABLED_FOR_TESTS,
1597 &conntrack,
1598 &mut conn,
1599 direction,
1600 &Hook {
1601 routines: vec![Routine {
1602 rules: vec![Rule::new(
1603 PacketMatcher::default(),
1604 Action::Redirect { dst_port: None },
1605 )],
1606 }],
1607 },
1608 &mut packet,
1609 <LocalEgressHook as NatHookExt<I>>::interfaces(ðernet_interface()),
1610 );
1611 assert_eq!(verdict, Verdict::Accept(()).into());
1612
1613 let verdict = perform_nat::<EgressHook, _, _, _, _>(
1614 &mut core_ctx,
1615 &mut bindings_ctx,
1616 NAT_ENABLED_FOR_TESTS,
1617 &conntrack,
1618 &mut conn,
1619 direction,
1620 &Hook {
1621 routines: vec![Routine {
1622 rules: vec![Rule::new(
1623 PacketMatcher::default(),
1624 Action::Masquerade { src_port: None },
1625 )],
1626 }],
1627 },
1628 &mut packet,
1629 <EgressHook as NatHookExt<I>>::interfaces(ðernet_interface()),
1630 );
1631 assert_eq!(verdict, Verdict::Accept(()).into());
1632
1633 assert_eq!(conn.external_data().destination.get(), Some(&ShouldNat::No));
1634 assert_eq!(conn.external_data().source.get(), Some(&ShouldNat::No));
1635 }
1636
1637 #[ip_test(I)]
1638 fn nat_disabled_if_not_configured_before_connection_finalized<I: TestIpExt>() {
1639 let mut bindings_ctx = FakeBindingsCtx::<I>::new();
1640 let conntrack = Table::new::<IntoCoreTimerCtx>(&mut bindings_ctx);
1641 let mut core_ctx = FakeNatCtx::default();
1642
1643 let mut packet = FakeIpPacket::<I, FakeUdpPacket>::arbitrary_value();
1644 let (mut conn, direction) = conntrack
1645 .get_connection_for_packet_and_update(&bindings_ctx, &packet)
1646 .expect("packet should be valid")
1647 .expect("packet should be trackable");
1648
1649 let verdict = perform_nat::<LocalEgressHook, _, _, _, _>(
1651 &mut core_ctx,
1652 &mut bindings_ctx,
1653 false, &conntrack,
1655 &mut conn,
1656 direction,
1657 &Hook::default(),
1658 &mut packet,
1659 <LocalEgressHook as NatHookExt<I>>::interfaces(ðernet_interface()),
1660 );
1661 assert_eq!(verdict, Verdict::Accept(()).into());
1662 assert_eq!(conn.external_data().destination.get(), None);
1663 assert_eq!(conn.external_data().source.get(), None);
1664
1665 let verdict = perform_nat::<EgressHook, _, _, _, _>(
1667 &mut core_ctx,
1668 &mut bindings_ctx,
1669 false, &conntrack,
1671 &mut conn,
1672 direction,
1673 &Hook::default(),
1674 &mut packet,
1675 <EgressHook as NatHookExt<I>>::interfaces(ðernet_interface()),
1676 );
1677 assert_eq!(verdict, Verdict::Accept(()).into());
1678 assert_eq!(conn.external_data().destination.get(), None);
1679 assert_eq!(conn.external_data().source.get(), None);
1680
1681 let (inserted, _weak) = conntrack
1682 .finalize_connection(&mut bindings_ctx, conn)
1683 .expect("connection should not conflict");
1684 assert!(inserted);
1685
1686 let mut reply = packet.reply();
1689 let (mut conn, direction) = conntrack
1690 .get_connection_for_packet_and_update(&bindings_ctx, &reply)
1691 .expect("packet should be valid")
1692 .expect("packet should be trackable");
1693 let verdict = perform_nat::<IngressHook, _, _, _, _>(
1694 &mut core_ctx,
1695 &mut bindings_ctx,
1696 NAT_ENABLED_FOR_TESTS,
1697 &conntrack,
1698 &mut conn,
1699 direction,
1700 &Hook::default(),
1701 &mut reply,
1702 <IngressHook as NatHookExt<I>>::interfaces(ðernet_interface()),
1703 );
1704 assert_eq!(verdict, Verdict::Accept(()).into());
1705 assert_eq!(conn.external_data().destination.get(), None);
1706 assert_eq!(conn.external_data().source.get(), Some(&ShouldNat::No));
1707
1708 let verdict = perform_nat::<LocalIngressHook, _, _, _, _>(
1710 &mut core_ctx,
1711 &mut bindings_ctx,
1712 NAT_ENABLED_FOR_TESTS,
1713 &conntrack,
1714 &mut conn,
1715 direction,
1716 &Hook::default(),
1717 &mut reply,
1718 <IngressHook as NatHookExt<I>>::interfaces(ðernet_interface()),
1719 );
1720 assert_eq!(verdict, Verdict::Accept(()).into());
1721 assert_eq!(conn.external_data().destination.get(), Some(&ShouldNat::No));
1722 assert_eq!(conn.external_data().source.get(), Some(&ShouldNat::No));
1723 }
1724
1725 const LOCAL_PORT: NonZeroU16 = NonZeroU16::new(55555).unwrap();
1726
1727 #[ip_test(I)]
1728 #[test_case(
1729 PhantomData::<IngressHook>, PhantomData::<EgressHook>, None;
1730 "redirect INGRESS"
1731 )]
1732 #[test_case(
1733 PhantomData::<IngressHook>, PhantomData::<EgressHook>, Some(LOCAL_PORT);
1734 "redirect INGRESS to local port"
1735 )]
1736 #[test_case(
1737 PhantomData::<LocalEgressHook>, PhantomData::<EgressHook>, None;
1738 "redirect LOCAL_EGRESS"
1739 )]
1740 #[test_case(
1741 PhantomData::<LocalEgressHook>, PhantomData::<EgressHook>, Some(LOCAL_PORT);
1742 "redirect LOCAL_EGRESS to local port"
1743 )]
1744 fn redirect<I: TestIpExt, Original: NatHookExt<I>, Reply: NatHookExt<I>>(
1745 _original_nat_hook: PhantomData<Original>,
1746 _reply_nat_hook: PhantomData<Reply>,
1747 dst_port: Option<NonZeroU16>,
1748 ) {
1749 let mut bindings_ctx = FakeBindingsCtx::<I>::new();
1750 let conntrack = Table::new::<IntoCoreTimerCtx>(&mut bindings_ctx);
1751 let mut core_ctx = FakeNatCtx::new([(
1752 ethernet_interface(),
1753 AddrSubnet::new(I::DST_IP_2, I::SUBNET.prefix()).unwrap(),
1754 )]);
1755
1756 let mut packet = FakeIpPacket::<_, FakeUdpPacket>::arbitrary_value();
1758 let pre_nat_packet = packet.clone();
1759 let (mut conn, direction) = conntrack
1760 .get_connection_for_packet_and_update(&bindings_ctx, &packet)
1761 .expect("packet should be valid")
1762 .expect("packet should be trackable");
1763 let original = conn.original_tuple().clone();
1764
1765 let nat_routines = Hook {
1769 routines: vec![Routine {
1770 rules: vec![Rule::new(
1771 PacketMatcher::default(),
1772 Action::Redirect { dst_port: dst_port.map(|port| port..=port) },
1773 )],
1774 }],
1775 };
1776 let verdict = perform_nat::<Original, _, _, _, _>(
1777 &mut core_ctx,
1778 &mut bindings_ctx,
1779 NAT_ENABLED_FOR_TESTS,
1780 &conntrack,
1781 &mut conn,
1782 direction,
1783 &nat_routines,
1784 &mut packet,
1785 Original::interfaces(ðernet_interface()),
1786 );
1787 assert_eq!(verdict, Verdict::Accept(()).into());
1788
1789 let (redirect_addr, cached_addr) = Original::redirect_addr(
1793 &mut core_ctx,
1794 &packet,
1795 Original::interfaces(ðernet_interface()).ingress,
1796 )
1797 .expect("get redirect addr for NAT hook");
1798 let expected = FakeIpPacket::<_, FakeUdpPacket> {
1799 src_ip: packet.src_ip,
1800 dst_ip: redirect_addr,
1801 body: FakeUdpPacket {
1802 src_port: packet.body.src_port,
1803 dst_port: dst_port.map(NonZeroU16::get).unwrap_or(packet.body.dst_port),
1804 },
1805 };
1806 assert_eq!(packet, expected);
1807 assert_eq!(
1808 conn.external_data().destination.get().expect("DNAT should be configured"),
1809 &ShouldNat::Yes(cached_addr)
1810 );
1811 assert_eq!(conn.external_data().source.get(), None, "SNAT should not be configured");
1812 assert_eq!(conn.original_tuple(), &original);
1813 let mut reply = Tuple { src_addr: redirect_addr, ..original.invert() };
1814 if let Some(port) = dst_port {
1815 reply.src_port_or_id = port.get();
1816 }
1817 assert_eq!(conn.reply_tuple(), &reply);
1818
1819 let mut reply_packet = packet.reply();
1823 let nat_routines = Hook {
1827 routines: vec![Routine {
1828 rules: vec![Rule::new(PacketMatcher::default(), Action::Drop)],
1829 }],
1830 };
1831 let verdict = perform_nat::<Reply, _, _, _, _>(
1832 &mut core_ctx,
1833 &mut bindings_ctx,
1834 NAT_ENABLED_FOR_TESTS,
1835 &conntrack,
1836 &mut conn,
1837 ConnectionDirection::Reply,
1838 &nat_routines,
1839 &mut reply_packet,
1840 Reply::interfaces(ðernet_interface()),
1841 );
1842 assert_eq!(verdict, Verdict::Accept(()).into());
1843 assert_eq!(reply_packet, pre_nat_packet.reply());
1844 }
1845
1846 #[ip_test(I)]
1847 #[test_case(None; "masquerade")]
1848 #[test_case(Some(LOCAL_PORT); "masquerade to specified port")]
1849 fn masquerade<I: TestIpExt>(src_port: Option<NonZeroU16>) {
1850 let mut bindings_ctx = FakeBindingsCtx::<I>::new();
1851 let conntrack = Table::new::<IntoCoreTimerCtx>(&mut bindings_ctx);
1852 let assigned_addr = AddrSubnet::new(I::SRC_IP_2, I::SUBNET.prefix()).unwrap();
1853 let mut core_ctx = FakeNatCtx::new([(ethernet_interface(), assigned_addr)]);
1854
1855 let mut packet = FakeIpPacket::<_, FakeUdpPacket>::arbitrary_value();
1857 let pre_nat_packet = packet.clone();
1858 let (mut conn, direction) = conntrack
1859 .get_connection_for_packet_and_update(&bindings_ctx, &packet)
1860 .expect("packet should be valid")
1861 .expect("packet should be trackable");
1862 let original = conn.original_tuple().clone();
1863
1864 let nat_routines = Hook {
1866 routines: vec![Routine {
1867 rules: vec![Rule::new(
1868 PacketMatcher::default(),
1869 Action::Masquerade { src_port: src_port.map(|port| port..=port) },
1870 )],
1871 }],
1872 };
1873 let verdict = perform_nat::<EgressHook, _, _, _, _>(
1874 &mut core_ctx,
1875 &mut bindings_ctx,
1876 NAT_ENABLED_FOR_TESTS,
1877 &conntrack,
1878 &mut conn,
1879 direction,
1880 &nat_routines,
1881 &mut packet,
1882 Interfaces { ingress: None, egress: Some(ðernet_interface()) },
1883 );
1884 assert_eq!(verdict, Verdict::Accept(()).into());
1885
1886 let expected = FakeIpPacket::<_, FakeUdpPacket> {
1890 src_ip: I::SRC_IP_2,
1891 dst_ip: packet.dst_ip,
1892 body: FakeUdpPacket {
1893 src_port: src_port.map(NonZeroU16::get).unwrap_or(packet.body.src_port),
1894 dst_port: packet.body.dst_port,
1895 },
1896 };
1897 assert_eq!(packet, expected);
1898 assert_matches!(
1899 conn.external_data().source.get().expect("SNAT should be configured"),
1900 &ShouldNat::Yes(Some(_))
1901 );
1902 assert_eq!(conn.external_data().destination.get(), None, "DNAT should not be configured");
1903 assert_eq!(conn.original_tuple(), &original);
1904 let mut reply = Tuple { dst_addr: I::SRC_IP_2, ..original.invert() };
1905 if let Some(port) = src_port {
1906 reply.dst_port_or_id = port.get();
1907 }
1908 assert_eq!(conn.reply_tuple(), &reply);
1909
1910 let mut reply_packet = packet.reply();
1914 let nat_routines = Hook {
1918 routines: vec![Routine {
1919 rules: vec![Rule::new(PacketMatcher::default(), Action::Drop)],
1920 }],
1921 };
1922 let verdict = perform_nat::<IngressHook, _, _, _, _>(
1923 &mut core_ctx,
1924 &mut bindings_ctx,
1925 NAT_ENABLED_FOR_TESTS,
1926 &conntrack,
1927 &mut conn,
1928 ConnectionDirection::Reply,
1929 &nat_routines,
1930 &mut reply_packet,
1931 Interfaces { ingress: Some(ðernet_interface()), egress: None },
1932 );
1933 assert_eq!(verdict, Verdict::Accept(()).into());
1934 assert_eq!(reply_packet, pre_nat_packet.reply());
1935 }
1936
1937 #[ip_test(I)]
1938 #[test_case(22, 1..=511)]
1939 #[test_case(853, 1..=1023)]
1940 #[test_case(11111, 1024..=u16::MAX)]
1941 fn masquerade_reply_tuple_dst_port_rewritten_even_if_target_range_unspecified<I: TestIpExt>(
1942 src_port: u16,
1943 expected_range: RangeInclusive<u16>,
1944 ) {
1945 let mut bindings_ctx = FakeBindingsCtx::<I>::new();
1946 let conntrack = Table::new::<IntoCoreTimerCtx>(&mut bindings_ctx);
1947 let assigned_addr = AddrSubnet::new(I::SRC_IP_2, I::SUBNET.prefix()).unwrap();
1948 let mut core_ctx = FakeNatCtx::new([(ethernet_interface(), assigned_addr)]);
1949 let packet = FakeIpPacket {
1950 body: FakeUdpPacket { src_port, ..ArbitraryValue::arbitrary_value() },
1951 ..ArbitraryValue::arbitrary_value()
1952 };
1953
1954 let reply = FakeIpPacket { src_ip: I::SRC_IP_2, ..packet.clone() };
1957 let (conn, _dir) = conntrack
1958 .get_connection_for_packet_and_update(&bindings_ctx, &reply)
1959 .expect("packet should be valid")
1960 .expect("packet should be trackable");
1961 assert_matches!(
1962 conntrack
1963 .finalize_connection(&mut bindings_ctx, conn)
1964 .expect("connection should not conflict"),
1965 (true, Some(_))
1966 );
1967
1968 let mut conn = ConnectionExclusive::from_packet(&bindings_ctx, &packet);
1972 let verdict = configure_masquerade_nat(
1973 &mut core_ctx,
1974 &mut bindings_ctx,
1975 &conntrack,
1976 &mut conn,
1977 &packet,
1978 &Interfaces { ingress: None, egress: Some(ðernet_interface()) },
1979 None,
1980 );
1981
1982 assert_matches!(
1988 verdict,
1989 Verdict::Accept(NatConfigurationResult::Result(ShouldNat::Yes(Some(_))))
1990 );
1991 let reply_tuple = conn.reply_tuple();
1992 assert_eq!(reply_tuple.dst_addr, I::SRC_IP_2);
1993 assert_ne!(reply_tuple.dst_port_or_id, src_port);
1994 assert!(expected_range.contains(&reply_tuple.dst_port_or_id));
1995 }
1996
1997 #[ip_test(I)]
1998 #[test_case(
1999 PhantomData::<IngressHook>, Action::Redirect { dst_port: None };
2000 "redirect in INGRESS"
2001 )]
2002 #[test_case(
2003 PhantomData::<EgressHook>, Action::Masquerade { src_port: None };
2004 "masquerade in EGRESS"
2005 )]
2006 fn assigned_addr_cached_and_validated<I: TestIpExt, N: NatHookExt<I>>(
2007 _nat_hook: PhantomData<N>,
2008 action: Action<I, FakeDeviceClass, ()>,
2009 ) {
2010 let mut bindings_ctx = FakeBindingsCtx::<I>::new();
2011 let conntrack = Table::new::<IntoCoreTimerCtx>(&mut bindings_ctx);
2012 let assigned_addr = AddrSubnet::new(I::SRC_IP_2, I::SUBNET.prefix()).unwrap();
2013 let mut core_ctx = FakeNatCtx::new([(ethernet_interface(), assigned_addr)]);
2014
2015 let mut packet = FakeIpPacket::<_, FakeUdpPacket>::arbitrary_value();
2017 let (mut conn, direction) = conntrack
2018 .get_connection_for_packet_and_update(&bindings_ctx, &packet)
2019 .expect("packet should be valid")
2020 .expect("packet should be trackable");
2021
2022 let nat_routines = Hook {
2024 routines: vec![Routine { rules: vec![Rule::new(PacketMatcher::default(), action)] }],
2025 };
2026 let verdict = perform_nat::<N, _, _, _, _>(
2027 &mut core_ctx,
2028 &mut bindings_ctx,
2029 NAT_ENABLED_FOR_TESTS,
2030 &conntrack,
2031 &mut conn,
2032 direction,
2033 &nat_routines,
2034 &mut packet,
2035 N::interfaces(ðernet_interface()),
2036 );
2037 assert_eq!(verdict, Verdict::Accept(()).into());
2038
2039 let (nat, _nat_type) = conn.relevant_config(N::NAT_TYPE, ConnectionDirection::Original);
2042 let nat = nat.get().unwrap_or_else(|| panic!("{:?} NAT should be configured", N::NAT_TYPE));
2043 let id = assert_matches!(nat, ShouldNat::Yes(Some(CachedAddr { id, _marker })) => id);
2044 let id = id
2045 .lock()
2046 .as_ref()
2047 .expect("address ID should be cached in NAT config")
2048 .upgrade()
2049 .expect("address ID should be valid");
2050 assert_eq!(*id, assigned_addr);
2051 drop(id);
2052
2053 core_ctx.device_addrs.clear();
2057 let verdict = perform_nat::<N, _, _, _, _>(
2058 &mut core_ctx,
2059 &mut bindings_ctx,
2060 NAT_ENABLED_FOR_TESTS,
2061 &conntrack,
2062 &mut conn,
2063 ConnectionDirection::Original,
2064 &nat_routines,
2065 &mut FakeIpPacket::<_, FakeUdpPacket>::arbitrary_value(),
2066 N::interfaces(ðernet_interface()),
2067 );
2068 assert_eq!(verdict, Verdict::Drop.into());
2069 let (nat, _nat_type) = conn.relevant_config(N::NAT_TYPE, ConnectionDirection::Original);
2070 let nat = nat.get().unwrap_or_else(|| panic!("{:?} NAT should be configured", N::NAT_TYPE));
2071 let id = assert_matches!(nat, ShouldNat::Yes(Some(CachedAddr { id, _marker })) => id);
2072 assert_eq!(*id.lock(), None, "cached weak address ID should be cleared");
2073
2074 assert_matches!(
2077 core_ctx
2078 .device_addrs
2079 .insert(ethernet_interface(), FakePrimaryAddressId(Arc::new(assigned_addr))),
2080 None
2081 );
2082 let verdict = perform_nat::<N, _, _, _, _>(
2083 &mut core_ctx,
2084 &mut bindings_ctx,
2085 NAT_ENABLED_FOR_TESTS,
2086 &conntrack,
2087 &mut conn,
2088 ConnectionDirection::Original,
2089 &nat_routines,
2090 &mut FakeIpPacket::<_, FakeUdpPacket>::arbitrary_value(),
2091 N::interfaces(ðernet_interface()),
2092 );
2093 assert_eq!(verdict, Verdict::Accept(()).into());
2094 let (nat, _nat_type) = conn.relevant_config(N::NAT_TYPE, ConnectionDirection::Original);
2095 let nat = nat.get().unwrap_or_else(|| panic!("{:?} NAT should be configured", N::NAT_TYPE));
2096 let id = assert_matches!(nat, ShouldNat::Yes(Some(CachedAddr { id, _marker })) => id);
2097 let id = id
2098 .lock()
2099 .as_ref()
2100 .expect("address ID should be cached in NAT config")
2101 .upgrade()
2102 .expect("address Id should be valid");
2103 assert_eq!(*id, assigned_addr);
2104 }
2105
2106 #[test_case(ReplyTuplePort::Source)]
2107 #[test_case(ReplyTuplePort::Destination)]
2108 fn rewrite_port_noop_if_in_range(which: ReplyTuplePort) {
2109 let mut bindings_ctx = FakeBindingsCtx::<Ipv4>::new();
2110 let table = Table::new::<IntoCoreTimerCtx>(&mut bindings_ctx);
2111 let mut conn =
2112 ConnectionExclusive::with_reply_tuple(&bindings_ctx, which, LOCAL_PORT.get());
2113
2114 let pre_nat = conn.reply_tuple().clone();
2117 let result = rewrite_reply_tuple_port(
2118 &mut bindings_ctx,
2119 &table,
2120 &mut conn,
2121 which,
2122 LOCAL_PORT..=LOCAL_PORT,
2123 true, ConflictStrategy::RewritePort,
2125 );
2126 assert_eq!(
2127 result,
2128 Verdict::Accept(NatConfigurationResult::Result(
2129 ShouldNat::<_, FakeWeakAddressId<Ipv4>>::No
2130 ))
2131 );
2132 assert_eq!(conn.reply_tuple(), &pre_nat);
2133 }
2134
2135 #[test_case(ReplyTuplePort::Source)]
2136 #[test_case(ReplyTuplePort::Destination)]
2137 fn rewrite_port_noop_if_no_conflict(which: ReplyTuplePort) {
2138 let mut bindings_ctx = FakeBindingsCtx::<Ipv4>::new();
2139 let table = Table::new::<IntoCoreTimerCtx>(&mut bindings_ctx);
2140 let mut conn =
2141 ConnectionExclusive::with_reply_tuple(&bindings_ctx, which, LOCAL_PORT.get());
2142
2143 let pre_nat = conn.reply_tuple().clone();
2147 const NEW_PORT: NonZeroU16 = LOCAL_PORT.checked_add(1).unwrap();
2148 let result = rewrite_reply_tuple_port(
2149 &mut bindings_ctx,
2150 &table,
2151 &mut conn,
2152 which,
2153 NEW_PORT..=NEW_PORT,
2154 false, ConflictStrategy::RewritePort,
2156 );
2157 assert_eq!(
2158 result,
2159 Verdict::Accept(NatConfigurationResult::Result(
2160 ShouldNat::<_, FakeWeakAddressId<Ipv4>>::No
2161 ))
2162 );
2163 assert_eq!(conn.reply_tuple(), &pre_nat);
2164 }
2165
2166 #[test_case(ReplyTuplePort::Source)]
2167 #[test_case(ReplyTuplePort::Destination)]
2168 fn rewrite_port_succeeds_if_available_port_in_range(which: ReplyTuplePort) {
2169 let mut bindings_ctx = FakeBindingsCtx::<Ipv4>::new();
2170 let table = Table::new::<IntoCoreTimerCtx>(&mut bindings_ctx);
2171 let mut conn =
2172 ConnectionExclusive::with_reply_tuple(&bindings_ctx, which, LOCAL_PORT.get());
2173
2174 const NEW_PORT: NonZeroU16 = LOCAL_PORT.checked_add(1).unwrap();
2177 let result = rewrite_reply_tuple_port(
2178 &mut bindings_ctx,
2179 &table,
2180 &mut conn,
2181 which,
2182 NEW_PORT..=NEW_PORT,
2183 true, ConflictStrategy::RewritePort,
2185 );
2186 assert_eq!(
2187 result,
2188 Verdict::Accept(NatConfigurationResult::Result(
2189 ShouldNat::<_, FakeWeakAddressId<Ipv4>>::Yes(None)
2190 ))
2191 );
2192 assert_eq!(conn.reply_tuple(), &tuple_with_port(which, NEW_PORT.get()));
2193 }
2194
2195 #[test_case(ReplyTuplePort::Source)]
2196 #[test_case(ReplyTuplePort::Destination)]
2197 fn rewrite_port_fails_if_no_available_port_in_range(which: ReplyTuplePort) {
2198 let mut bindings_ctx = FakeBindingsCtx::<Ipv4>::new();
2199 let table: Table<_, NatConfig<_, FakeWeakAddressId<Ipv4>>, _> =
2200 Table::new::<IntoCoreTimerCtx>(&mut bindings_ctx);
2201
2202 let packet = packet_with_port(which, LOCAL_PORT.get());
2206 let (conn, _dir) = table
2207 .get_connection_for_packet_and_update(&bindings_ctx, &packet)
2208 .expect("packet should be valid")
2209 .expect("packet should be trackable");
2210 assert_matches!(
2211 table
2212 .finalize_connection(&mut bindings_ctx, conn)
2213 .expect("connection should not conflict"),
2214 (true, Some(_))
2215 );
2216
2217 let mut conn =
2218 ConnectionExclusive::with_reply_tuple(&bindings_ctx, which, LOCAL_PORT.get());
2219 let result = rewrite_reply_tuple_port(
2220 &mut bindings_ctx,
2221 &table,
2222 &mut conn,
2223 which,
2224 LOCAL_PORT..=LOCAL_PORT,
2225 true, ConflictStrategy::RewritePort,
2227 );
2228 assert_eq!(result, Verdict::Drop.into());
2229 }
2230
2231 #[test_case(ReplyTuplePort::Source)]
2232 #[test_case(ReplyTuplePort::Destination)]
2233 fn port_rewritten_to_ensure_unique_tuple_even_if_in_range(which: ReplyTuplePort) {
2234 let mut bindings_ctx = FakeBindingsCtx::<Ipv4>::new();
2235 let table = Table::new::<IntoCoreTimerCtx>(&mut bindings_ctx);
2236
2237 const MAX_PORT: NonZeroU16 = NonZeroU16::new(LOCAL_PORT.get() + 100).unwrap();
2241 for port in LOCAL_PORT.get()..=MAX_PORT.get() {
2242 let packet = packet_with_port(which, port);
2243 let (conn, _dir) = table
2244 .get_connection_for_packet_and_update(&bindings_ctx, &packet)
2245 .expect("packet should be valid")
2246 .expect("packet should be trackable");
2247 assert_matches!(
2248 table
2249 .finalize_connection(&mut bindings_ctx, conn)
2250 .expect("connection should not conflict"),
2251 (true, Some(_))
2252 );
2253 }
2254
2255 let mut conn =
2259 ConnectionExclusive::with_reply_tuple(&bindings_ctx, which, LOCAL_PORT.get());
2260 const MIN_PORT: NonZeroU16 = NonZeroU16::new(LOCAL_PORT.get() - 1).unwrap();
2261 let result = rewrite_reply_tuple_port(
2262 &mut bindings_ctx,
2263 &table,
2264 &mut conn,
2265 which,
2266 MIN_PORT..=MAX_PORT,
2267 true, ConflictStrategy::RewritePort,
2269 );
2270 assert_eq!(
2271 result,
2272 Verdict::Accept(NatConfigurationResult::Result(
2273 ShouldNat::<_, FakeWeakAddressId<Ipv4>>::Yes(None)
2274 ))
2275 );
2276 assert_eq!(conn.reply_tuple(), &tuple_with_port(which, MIN_PORT.get()));
2277 }
2278
2279 #[test_case(ReplyTuplePort::Source)]
2280 #[test_case(ReplyTuplePort::Destination)]
2281 fn rewrite_port_skipped_if_existing_connection_can_be_adopted(which: ReplyTuplePort) {
2282 let mut bindings_ctx = FakeBindingsCtx::<Ipv4>::new();
2283 let table: Table<_, NatConfig<_, FakeWeakAddressId<Ipv4>>, _> =
2284 Table::new::<IntoCoreTimerCtx>(&mut bindings_ctx);
2285
2286 let packet = packet_with_port(which, LOCAL_PORT.get());
2291 let (conn, _dir) = table
2292 .get_connection_for_packet_and_update(&bindings_ctx, &packet)
2293 .expect("packet should be valid")
2294 .expect("packet should be trackable");
2295 let existing = assert_matches!(
2296 table
2297 .finalize_connection(&mut bindings_ctx, conn)
2298 .expect("connection should not conflict"),
2299 (true, Some(conn)) => conn
2300 );
2301
2302 let mut conn = ConnectionExclusive::from_packet(&bindings_ctx, &packet);
2303 let result = rewrite_reply_tuple_port(
2304 &mut bindings_ctx,
2305 &table,
2306 &mut conn,
2307 which,
2308 NonZeroU16::MIN..=NonZeroU16::MAX,
2309 false, ConflictStrategy::AdoptExisting,
2311 );
2312 let conn = assert_matches!(
2313 result,
2314 Verdict::Accept(NatConfigurationResult::AdoptExisting(Connection::Shared(conn))) => conn
2315 );
2316 assert!(Arc::ptr_eq(&existing, &conn));
2317 }
2318}