<feed xmlns='http://www.w3.org/2005/Atom'>
<title>firewall4/tests/03_rules, branch master</title>
<subtitle>OpenWrt nftables firewall</subtitle>
<id>https://git.openwrt.org/project/firewall4/atom?h=master</id>
<link rel='self' href='https://git.openwrt.org/project/firewall4/atom?h=master'/>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/firewall4/'/>
<updated>2023-11-03T13:11:06Z</updated>
<entry>
<title>ruleset: reduce ksoftirqd load by refering to looopback by numeric id</title>
<updated>2023-11-03T13:11:06Z</updated>
<author>
<name>Andris PE</name>
</author>
<published>2023-09-19T15:23:59Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/firewall4/commit/?id=a5553dae70439c7e4fa910490fcf12a1ffff5bd2'/>
<id>urn:sha1:a5553dae70439c7e4fa910490fcf12a1ffff5bd2</id>
<content type='text'>
Reduce ksoftirq load by half using more efficient reference to loopback
which always has index equal to one.

Should help a lot with openwrt/openwrt#12914, openwrt/openwrt#12121 and
similar iperf3 cases clamping against 100% CPU usage.

Signed-off-by: Andris PE &lt;neandris@gmail.com&gt;
[fix S-o-b tag, fix commit author, rewrap commit message]
Signed-off-by: Jo-Philipp Wich &lt;jo@mein.io&gt;
</content>
</entry>
<entry>
<title>ruleset: dispatch ct states using verdict map</title>
<updated>2023-11-03T13:09:43Z</updated>
<author>
<name>Andris PE</name>
</author>
<published>2023-09-07T19:04:35Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/firewall4/commit/?id=19a8caf614ec338513e58535ea02c6ee52988170'/>
<id>urn:sha1:19a8caf614ec338513e58535ea02c6ee52988170</id>
<content type='text'>
In case the dropping of invalid conntrack states is enabled, using a verdict
map allows us to use only one rule instead of two, lowering the initial rule
match overhead.

Signed-off-by: Andris PE &lt;neandris@gmail.com&gt;
[whitespace cleanup, rebase, extend commit subject and message]
Signed-off-by: Jo-Philipp Wich &lt;jo@mein.io&gt;
</content>
</entry>
<entry>
<title>Revert "ruleset: dispatch ct states using verdict map"</title>
<updated>2023-11-03T13:09:16Z</updated>
<author>
<name>Jo-Philipp Wich</name>
</author>
<published>2023-11-03T13:09:12Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/firewall4/commit/?id=22c53921c11115e5437385719b6e73800a68cd33'/>
<id>urn:sha1:22c53921c11115e5437385719b6e73800a68cd33</id>
<content type='text'>
This reverts commit 785798c8fd72ff3c4c8940922173290bb25bc18e.

Revert commit due to bad commit metadata.

Signed-off-by: Jo-Philipp Wich &lt;jo@mein.io&gt;
</content>
</entry>
<entry>
<title>ruleset: dispatch ct states using verdict map</title>
<updated>2023-11-03T13:04:39Z</updated>
<author>
<name>User User-User</name>
</author>
<published>2023-09-07T19:04:35Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/firewall4/commit/?id=785798c8fd72ff3c4c8940922173290bb25bc18e'/>
<id>urn:sha1:785798c8fd72ff3c4c8940922173290bb25bc18e</id>
<content type='text'>
In case the dropping of invalid conntrack states is enabled, using a verdict
map allows us to use only one rule instead of two, lowering the initial rule
match overhead.

Signed-off-by: Andris PE &lt;neandris@gmail.com&gt;
[whitespace cleanup, rebase, extend commit subject and message]
Signed-off-by: Jo-Philipp Wich &lt;jo@mein.io&gt;
</content>
</entry>
<entry>
<title>ruleset: fix emitting set_mark/set_xmark rules with masks</title>
<updated>2022-10-14T15:01:44Z</updated>
<author>
<name>Jo-Philipp Wich</name>
</author>
<published>2022-10-14T15:01:44Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/firewall4/commit/?id=756f1e21ed77f2c0b3fc2c8128c808704f2cf61b'/>
<id>urn:sha1:756f1e21ed77f2c0b3fc2c8128c808704f2cf61b</id>
<content type='text'>
Fix a bad variable access when emitting set_mark/set_xmark rules with
masks and add test coverage for the various mark target variants.

Fixes: #10965
Signed-off-by: Jo-Philipp Wich &lt;jo@mein.io&gt;
</content>
</entry>
<entry>
<title>fw4: fix formatting of default log prefix</title>
<updated>2022-10-05T21:33:59Z</updated>
<author>
<name>Jo-Philipp Wich</name>
</author>
<published>2022-10-05T21:33:59Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/firewall4/commit/?id=43d8ef516747aaede640d292b0326a66186809a8'/>
<id>urn:sha1:43d8ef516747aaede640d292b0326a66186809a8</id>
<content type='text'>
When using the explicit or implicit rule name as default log prefix, ensure
that is followed by a colon and a space to yield properly formatted firewall
log messages.

Also align the processing logic of `option log` in `config nat` sections with
that in `config rule` and `config redirect`.

Ref: https://forum.openwrt.org/t/x/137182/8
Signed-off-by: Jo-Philipp Wich &lt;jo@mein.io&gt;
</content>
</entry>
<entry>
<title>tests: fix testcases</title>
<updated>2022-10-03T12:29:41Z</updated>
<author>
<name>Jo-Philipp Wich</name>
</author>
<published>2022-10-03T12:26:02Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/firewall4/commit/?id=b0a6bff4ee4410cd554811fa0ca3b28fce908473'/>
<id>urn:sha1:b0a6bff4ee4410cd554811fa0ca3b28fce908473</id>
<content type='text'>
Align expected output with the current implementation.

Fixes: a540f6d ("fw4: fix cosmetic issue with per-ruleset and per-table include paths")
Fixes: 145e159 ("fw4: recognize `option log` and `option counter` in `config nat` sections")
Signed-off-by: Jo-Philipp Wich &lt;jo@mein.io&gt;
</content>
</entry>
<entry>
<title>ruleset: reorder declarations &amp; output tweaks</title>
<updated>2022-06-14T14:27:26Z</updated>
<author>
<name>Jo-Philipp Wich</name>
</author>
<published>2022-06-14T14:23:50Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/firewall4/commit/?id=11410b80eb9c442c4850cfc3034267f3f72a196c'/>
<id>urn:sha1:11410b80eb9c442c4850cfc3034267f3f72a196c</id>
<content type='text'>
 - Omit "Set definitions" header if no sets are declared
 - Always emit ${zone}_devices and ${zone}_subnets defines, even if empty
 - Move CT helper definitions to the top
 - Move ${zone}_helper chain definitions after ${zone}_forward chain defs
 - Consistently use two line spacing for output sections

Signed-off-by: Jo-Philipp Wich &lt;jo@mein.io&gt;
</content>
</entry>
<entry>
<title>ruleset: reuse zone-jump.uc template for notrack and helper chain jumps</title>
<updated>2022-06-14T14:27:26Z</updated>
<author>
<name>Jo-Philipp Wich</name>
</author>
<published>2022-06-14T12:59:58Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/firewall4/commit/?id=e1cb763b65262eef5958d19fe922380aa1e96570'/>
<id>urn:sha1:e1cb763b65262eef5958d19fe922380aa1e96570</id>
<content type='text'>
Avoid some code-duplication by reusing the zone-jump.uc partial template
to emit the helper_* chain jump rules.

Also add some test coverage for notrack rules.

Signed-off-by: Jo-Philipp Wich &lt;jo@mein.io&gt;
</content>
</entry>
<entry>
<title>ruleset: fix conntrack helpers</title>
<updated>2022-06-14T14:26:07Z</updated>
<author>
<name>Stijn Tintel</name>
</author>
<published>2022-06-13T15:00:26Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/project/firewall4/commit/?id=a063317d96c6c85e4c909eab017ef2813f93ff05'/>
<id>urn:sha1:a063317d96c6c85e4c909eab017ef2813f93ff05</id>
<content type='text'>
In nftables, helper assignments need to be performed after the conntrack
lookup has completed. Using the raw priority results in the assignment
being done before the conntrack lookup, which breaks conntrack helpers.

Fix this by moving the jumps helper rule chains to a new toplevel
`prerouting` and the existing `output` chain respectively.

Signed-off-by: Stijn Tintel &lt;stijn@linux-ipv6.be&gt;
[new toplevel `prerouting` chain + reuse existing `output` chain]
Signed-off-by: Jo-Philipp Wich &lt;jo@mein.io&gt;
</content>
</entry>
</feed>
