Age | Commit message (Collapse) | Author | |
---|---|---|---|
2020-03-26 | Check error in DropTCP*Port tests and fix comment. | Kevin Krakauer | |
PiperOrigin-RevId: 303147253 | |||
2020-03-18 | Merge pull request #2187 from kevinGC:deflake-connectTCP | gVisor bot | |
PiperOrigin-RevId: 301716568 | |||
2020-03-18 | iptables: deflake DropTCP*Port tests | Kevin Krakauer | |
These tests could timeout because net.DialTCP didn't respect the timeout. | |||
2020-03-18 | iptables: skip tests for not-yet-supported features | Kevin Krakauer | |
PiperOrigin-RevId: 301686266 | |||
2020-03-18 | Automated rollback of changelist 301476456 | Kevin Krakauer | |
PiperOrigin-RevId: 301650898 | |||
2020-03-17 | iptables: fix type in script name, mark some new tests as skipped | Kevin Krakauer | |
PiperOrigin-RevId: 301476456 | |||
2020-03-16 | Merge pull request #1943 from kevinGC:ipt-filter-ip | gVisor bot | |
PiperOrigin-RevId: 301197007 | |||
2020-03-11 | iptables: ready tests to be enabled in kokoro | Kevin Krakauer | |
Fixed flakes (tested via --runs_per_test=100) and added skips for not-yet-implemented features. Once submitted, the iptables tests will be ready to enable in kokoro. | |||
2020-02-26 | iptables: filter by IP address (and range) | Kevin Krakauer | |
Enables commands such as: $ iptables -A INPUT -d 127.0.0.1 -j ACCEPT $ iptables -t nat -A PREROUTING ! -d 127.0.0.1 -j REDIRECT Also adds a bunch of REDIRECT+destination tests. | |||
2020-02-25 | Merge branch 'master' into iptables | nybidari | |
2020-02-25 | Add nat table support for iptables. | Nayana Bidari | |
- commit the changes for the comments. | |||
2020-02-18 | iptables: use "-t nat" for NAT tests | gVisor bot | |
PiperOrigin-RevId: 295835807 | |||
2020-02-18 | Merge pull request #1850 from kevinGC:jump2 | gVisor bot | |
PiperOrigin-RevId: 295785052 | |||
2020-02-18 | Add nat table support for iptables. | Nayana Bidari | |
Add nat table support for Prerouting hook with Redirect option. Add tests to check redirect of ports. | |||
2020-02-13 | We can now create and jump in iptables. For example: | Kevin Krakauer | |
$ iptables -N foochain $ iptables -A INPUT -j foochain | |||
2020-02-12 | iptables: User chains | Kevin Krakauer | |
- Adds creation of user chains via `-N <chainname>` - Adds `-j RETURN` support for built-in chains, which triggers the chain's underflow rule (usually the default policy). - Adds tests for chain creation, default policies, and `-j RETURN' from built-in chains. | |||
2020-02-10 | iptables: add instructions for runsc building. | Kevin Krakauer | |
The readme didn't mention that users need to: - `bazel build` when working on iptables tests - enable raw sockets in /etc/docker/daemon.json. PiperOrigin-RevId: 294260169 | |||
2020-02-06 | Fix `bazel run` target in docs. | Kevin Krakauer | |
PiperOrigin-RevId: 293676954 | |||
2020-02-04 | Merge pull request #1683 from kevinGC:ipt-udp-matchers | gVisor bot | |
PiperOrigin-RevId: 293243342 | |||
2020-01-29 | Fix iptables tests that were broken by rename. | Kevin Krakauer | |
The name of the runner binary target changed from "runner" to "runner-image", causing iptables tests to fail. PiperOrigin-RevId: 292242263 | |||
2020-01-27 | Cleanup for GH review. | Kevin Krakauer | |
2020-01-27 | Standardize on tools directory. | Adin Scannell | |
PiperOrigin-RevId: 291745021 | |||
2020-01-24 | Merge branch 'master' into ipt-udp-matchers | Kevin Krakauer | |
2020-01-23 | Merge pull request #1617 from kevinGC:iptables-write-filter-proto | gVisor bot | |
PiperOrigin-RevId: 291249314 | |||
2020-01-21 | Add UDP matchers. | Kevin Krakauer | |
2020-01-21 | More little fixes. | Kevin Krakauer | |
2020-01-21 | Fixing stuff | Kevin Krakauer | |
2020-01-21 | Merge branch 'master' into iptables-write-filter-proto | Kevin Krakauer | |
2020-01-21 | Merge pull request #1558 from kevinGC:iptables-write-input-drop | gVisor bot | |
PiperOrigin-RevId: 290793754 | |||
2020-01-17 | Merge pull request #1541 from nybidari:iptables | gVisor bot | |
PiperOrigin-RevId: 290273561 | |||
2020-01-13 | Merge branch 'iptables-write-input-drop' into iptables-write-filter-proto | Kevin Krakauer | |
2020-01-13 | Merge branch 'master' into iptables-write-input-drop | Kevin Krakauer | |
2020-01-13 | Add test for iptables TCP rule | Nayana Bidari | |
Added tests for tcp protocol with input and output rules including options sport and dport Increased timeout in iptables_test as TCP tests were timing out with existing value. | |||
2020-01-10 | Add tests for redirect port | Nayana Bidari | |
Fix indentation and change function names. | |||
2020-01-09 | Add test for redirect port | Nayana Bidari | |
Fix the indentation and print statements. Moved the NAT redirect tests to new file. Added negative test to check redirect rule on ports other than redirected port. | |||
2020-01-09 | Added a test that we don't pass yet | Kevin Krakauer | |
2020-01-09 | Add test to check iptables redirect port rule | Nayana Bidari | |
2020-01-08 | Working on filtering by protocol. | Kevin Krakauer | |
2020-01-08 | Built dead-simple traversal, but now getting depedency cycle error :'( | Kevin Krakauer | |
2020-01-08 | Added test for unconditional DROP on the filter INPUT chain | Kevin Krakauer | |
2020-01-08 | Newline | Kevin Krakauer | |
2020-01-08 | Revert filter_input change | Kevin Krakauer | |
2020-01-08 | Minor fixes to comments and logging | Kevin Krakauer | |
2020-01-08 | Write simple ACCEPT rules to the filter table. | Kevin Krakauer | |
This gets us closer to passing the iptables tests and opens up iptables so it can be worked on by multiple people. A few restrictions are enforced for security (i.e. we don't want to let users write a bunch of iptables rules and then just not enforce them): - Only the filter table is writable. - Only ACCEPT rules with no matching criteria can be added. | |||
2020-01-06 | Fix readme formatting. | Kevin Krakauer | |
PiperOrigin-RevId: 288402480 | |||
2019-12-17 | Internal change. | Kevin Krakauer | |
PiperOrigin-RevId: 286083614 | |||
2019-12-12 | Add iptables testing framework. | Kevin Krakauer | |
It would be preferrable to test iptables via syscall tests, but there are some problems with that approach: * We're limited to loopback-only, as syscall tests involve only a single container. Other link interfaces (e.g. fdbased) should be tested. * We'd have to shell out to call iptables anyways, as the iptables syscall interface itself is too large and complex to work with alone. * Running the Linux/native version of the syscall test will require root, which is a pain to configure, is inherently unsafe, and could leave host iptables misconfigured. Using the go_test target allows there to be no new test runner. PiperOrigin-RevId: 285274275 |