Add, list and delete ct timeout objects from specified table

Usage e.g.:
% ./nft-ct-timeout-add ip filter some-name tcp
% ./nft-ct-timeout-get ip filter
table filter name some-name use 0 [ ct_timeout family 2 protocol 6
policy = {ESTABLISHED = 111,CLOSE_WAIT = 14, CLOSE = 16}]

% ./nft-ct-timeout-del ip filter some-name

Signed-off-by: Harsha Sharma <harshasharmai...@gmail.com>
---
Changes in v3:
 - Change log message with update listing of timeout policies
Changes in v2:
 - Updated timeout policy values

 examples/Makefile.am          |  12 ++++
 examples/nft-ct-timeout-add.c | 141 +++++++++++++++++++++++++++++++++++++++
 examples/nft-ct-timeout-del.c | 124 ++++++++++++++++++++++++++++++++++
 examples/nft-ct-timeout-get.c | 150 ++++++++++++++++++++++++++++++++++++++++++
 4 files changed, 427 insertions(+)
 create mode 100644 examples/nft-ct-timeout-add.c
 create mode 100644 examples/nft-ct-timeout-del.c
 create mode 100644 examples/nft-ct-timeout-get.c

diff --git a/examples/Makefile.am b/examples/Makefile.am
index 3ec699b..d5584e5 100644
--- a/examples/Makefile.am
+++ b/examples/Makefile.am
@@ -25,6 +25,9 @@ check_PROGRAMS = nft-table-add                \
                 nft-obj-add            \
                 nft-obj-get            \
                 nft-obj-del            \
+                nft-ct-timeout-add     \
+                nft-ct-timeout-get     \
+                nft-ct-timeout-del     \
                 nft-flowtable-add      \
                 nft-flowtable-del      \
                 nft-flowtable-get      \
@@ -111,6 +114,15 @@ nft_obj_del_LDADD = ../src/libnftnl.la ${LIBMNL_LIBS}
 nft_obj_get_SOURCES = nft-obj-get.c
 nft_obj_get_LDADD = ../src/libnftnl.la ${LIBMNL_LIBS}
 
+nft_ct_timeout_add_SOURCES = nft-ct-timeout-add.c
+nft_ct_timeout_add_LDADD = ../src/libnftnl.la ${LIBMNL_LIBS}
+
+nft_ct_timeout_get_SOURCES = nft-ct-timeout-get.c
+nft_ct_timeout_get_LDADD = ../src/libnftnl.la ${LIBMNL_LIBS}
+
+nft_ct_timeout_del_SOURCES = nft-ct-timeout-del.c
+nft_ct_timeout_del_LDADD = ../src/libnftnl.la ${LIBMNL_LIBS}
+
 nft_flowtable_add_SOURCES = nft-flowtable-add.c
 nft_flowtable_add_LDADD = ../src/libnftnl.la ${LIBMNL_LIBS}
 
diff --git a/examples/nft-ct-timeout-add.c b/examples/nft-ct-timeout-add.c
new file mode 100644
index 0000000..ad1bb4f
--- /dev/null
+++ b/examples/nft-ct-timeout-add.c
@@ -0,0 +1,141 @@
+/*
+ * (C) 2012-2016 by Pablo Neira Ayuso <pa...@netfilter.org>
+ *
+ * This program is free software; you can redistribute it and/or modify it
+ * under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 2 of the License, or
+ * (at your option) any later version.
+ */
+
+#include <stdlib.h>
+#include <time.h>
+#include <string.h>
+#include <netinet/in.h>
+
+#include <linux/netfilter.h>
+#include <linux/netfilter/nf_tables.h>
+
+#include <obj.h>
+#include <libmnl/libmnl.h>
+#include <libnftnl/object.h>
+#include <libnftnl/cttimeout.h>
+
+static struct nftnl_obj *obj_add_parse(int argc, char *argv[])
+{
+       struct nftnl_obj *t;
+       uint16_t family;
+       uint8_t l4proto;
+
+       if (strcmp(argv[1], "ip") == 0)
+               family = NFPROTO_IPV4;
+       else if (strcmp(argv[1], "ip6") == 0)
+               family = NFPROTO_IPV6;
+       else if (strcmp(argv[1], "bridge") == 0)
+               family = NFPROTO_BRIDGE;
+       else if (strcmp(argv[1], "arp") == 0)
+               family = NFPROTO_ARP;
+       else {
+               fprintf(stderr, "Unknown family: ip, ip6, bridge, arp\n");
+               return NULL;
+       }
+
+       if (strcmp(argv[4], "udp") == 0)
+               l4proto = IPPROTO_UDP;
+       else if (strcmp(argv[4], "tcp") == 0)
+               l4proto = IPPROTO_TCP;
+       else {
+               fprintf(stderr, "Unknown layer 4 protocol\n");
+               return NULL;
+       }
+
+       t = nftnl_obj_alloc();
+       if (t == NULL) {
+               perror("OOM");
+               return NULL;
+       }
+
+       nftnl_obj_set_u32(t, NFTNL_OBJ_FAMILY, family);
+       nftnl_obj_set_u32(t, NFTNL_OBJ_TYPE, NFT_OBJECT_CT_TIMEOUT);
+       nftnl_obj_set_str(t, NFTNL_OBJ_TABLE, argv[2]);
+       nftnl_obj_set_str(t, NFTNL_OBJ_NAME, argv[3]);
+       nftnl_obj_set_u8(t, NFTNL_OBJ_CT_TIMEOUT_L4PROTO, l4proto);
+       nftnl_obj_set_u16(t, NFTNL_OBJ_CT_TIMEOUT_L3PROTO, NFPROTO_IPV4);
+       nftnl_timeout_policy_attr_set_u32(t, 
NFTA_CT_TIMEOUT_ATTR_TCP_ESTABLISHED, 111);
+       nftnl_timeout_policy_attr_set_u32(t, NFTA_CT_TIMEOUT_ATTR_TCP_CLOSE, 
16);
+       nftnl_timeout_policy_attr_set_u32(t, 
NFTA_CT_TIMEOUT_ATTR_TCP_CLOSE_WAIT, 14);
+       return t;
+
+}
+
+int main(int argc, char *argv[])
+{
+       struct mnl_socket *nl;
+       char buf[MNL_SOCKET_BUFFER_SIZE];
+       struct nlmsghdr *nlh;
+       uint32_t portid, seq, obj_seq, family;
+       struct nftnl_obj *t;
+       struct mnl_nlmsg_batch *batch;
+       int ret;
+
+       if (argc != 5) {
+               fprintf(stderr, "%s <family> <table> <name> <protocol> \n", 
argv[0]);
+               exit(EXIT_FAILURE);
+       }
+
+       t = obj_add_parse(argc, argv);
+       if (t == NULL) {
+               exit(EXIT_FAILURE);
+       }
+
+       seq = time(NULL);
+       batch = mnl_nlmsg_batch_start(buf, sizeof(buf));
+
+       nftnl_batch_begin(mnl_nlmsg_batch_current(batch), seq++);
+       mnl_nlmsg_batch_next(batch);
+
+       obj_seq = seq;
+       family = nftnl_obj_get_u32(t, NFTNL_OBJ_FAMILY);
+       nlh = nftnl_nlmsg_build_hdr(mnl_nlmsg_batch_current(batch),
+                                   NFT_MSG_NEWOBJ, family, NLM_F_ACK | 
NLM_F_CREATE, seq++);
+       nftnl_obj_nlmsg_build_payload(nlh, t);
+       nftnl_obj_free(t);
+       mnl_nlmsg_batch_next(batch);
+
+       nftnl_batch_end(mnl_nlmsg_batch_current(batch), seq++);
+       mnl_nlmsg_batch_next(batch);
+
+       nl = mnl_socket_open(NETLINK_NETFILTER);
+       if (nl == NULL) {
+               perror("mnl_socket_open");
+               exit(EXIT_FAILURE);
+       }
+
+       if (mnl_socket_bind(nl, 0, MNL_SOCKET_AUTOPID) < 0) {
+               perror("mnl_socket_bind");
+               exit(EXIT_FAILURE);
+       }
+       portid = mnl_socket_get_portid(nl);
+
+       if (mnl_socket_sendto(nl, mnl_nlmsg_batch_head(batch),
+                             mnl_nlmsg_batch_size(batch)) < 0) {
+               perror("mnl_socket_send");
+               exit(EXIT_FAILURE);
+       }
+
+       mnl_nlmsg_batch_stop(batch);
+
+       ret = mnl_socket_recvfrom(nl, buf, sizeof(buf));
+       while (ret > 0) {
+               ret = mnl_cb_run(buf, ret, obj_seq, portid, NULL, NULL);
+               if (ret <= 0)
+                       break;
+               ret = mnl_socket_recvfrom(nl, buf, sizeof(buf));
+       }
+       if (ret == -1) {
+               perror("error");
+               exit(EXIT_FAILURE);
+       }
+       mnl_socket_close(nl);
+
+       return EXIT_SUCCESS;
+}
diff --git a/examples/nft-ct-timeout-del.c b/examples/nft-ct-timeout-del.c
new file mode 100644
index 0000000..4581c39
--- /dev/null
+++ b/examples/nft-ct-timeout-del.c
@@ -0,0 +1,124 @@
+/*
+ * (C) 2012 by Pablo Neira Ayuso <pa...@netfilter.org>
+ *
+ * This program is free software; you can redistribute it and/or modify it
+ * under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 2 of the License, or
+ * (at your option) any later version.
+ *
+ * This software has been sponsored by Sophos Astaro <http://www.sophos.com>
+ */
+
+#include <stdlib.h>
+#include <time.h>
+#include <string.h>
+#include <netinet/in.h>
+
+#include <linux/netfilter.h>
+#include <linux/netfilter/nf_tables.h>
+
+#include <libmnl/libmnl.h>
+#include <libnftnl/object.h>
+
+static struct nftnl_obj *ct_timeout_del_parse(int argc, char *argv[])
+{
+       struct nftnl_obj *t;
+       uint16_t family;
+
+       if (strcmp(argv[1], "ip") == 0)
+               family = NFPROTO_IPV4;
+       else if (strcmp(argv[1], "ip6") == 0)
+               family = NFPROTO_IPV6;
+       else if (strcmp(argv[1], "inet") == 0)
+               family = NFPROTO_INET;
+       else {
+               fprintf(stderr, "Unknown family: ip, ip6, inet\n");
+               return NULL;
+       }
+
+       t = nftnl_obj_alloc();
+       if (t == NULL) {
+               perror("OOM");
+               return NULL;
+       }
+
+       nftnl_obj_set_str(t, NFTNL_OBJ_TABLE, argv[2]);
+       nftnl_obj_set_str(t, NFTNL_OBJ_NAME, argv[3]);
+       nftnl_obj_set_u32(t, NFTNL_OBJ_TYPE, NFT_OBJECT_CT_TIMEOUT);
+       nftnl_obj_set_u32(t, NFTNL_OBJ_FAMILY, family);
+
+       return t;
+}
+
+int main(int argc, char *argv[])
+{
+       struct mnl_socket *nl;
+       char buf[MNL_SOCKET_BUFFER_SIZE];
+       struct nlmsghdr *nlh;
+       uint32_t portid, seq, obj_seq, family;
+       struct nftnl_obj *t;
+       struct mnl_nlmsg_batch *batch;
+       int ret;
+
+       if (argc != 4) {
+               fprintf(stderr, "%s <family> <table> <name>\n", argv[0]);
+               exit(EXIT_FAILURE);
+       }
+
+       t = ct_timeout_del_parse(argc, argv);
+       if (t == NULL)
+               exit(EXIT_FAILURE);
+
+       seq = time(NULL);
+       batch = mnl_nlmsg_batch_start(buf, sizeof(buf));
+
+       nftnl_batch_begin(mnl_nlmsg_batch_current(batch), seq++);
+       mnl_nlmsg_batch_next(batch);
+
+       obj_seq = seq;
+       family = nftnl_obj_get_u32(t, NFTNL_OBJ_FAMILY);
+       nlh = nftnl_nlmsg_build_hdr(mnl_nlmsg_batch_current(batch),
+                                   NFT_MSG_DELOBJ, family, NLM_F_ACK,
+                                   seq++);
+       nftnl_obj_nlmsg_build_payload(nlh, t);
+       mnl_nlmsg_batch_next(batch);
+       nftnl_obj_free(t);
+
+       nftnl_batch_end(mnl_nlmsg_batch_current(batch), seq++);
+       mnl_nlmsg_batch_next(batch);
+
+       nl = mnl_socket_open(NETLINK_NETFILTER);
+       if (nl == NULL) {
+               perror("mnl_socket_open");
+               exit(EXIT_FAILURE);
+       }
+
+       if (mnl_socket_bind(nl, 0, MNL_SOCKET_AUTOPID) < 0) {
+               perror("mnl_socket_bind");
+               exit(EXIT_FAILURE);
+       }
+       portid = mnl_socket_get_portid(nl);
+
+       if (mnl_socket_sendto(nl, mnl_nlmsg_batch_head(batch),
+                             mnl_nlmsg_batch_size(batch)) < 0) {
+               perror("mnl_socket_send");
+               exit(EXIT_FAILURE);
+       }
+
+       mnl_nlmsg_batch_stop(batch);
+
+       ret = mnl_socket_recvfrom(nl, buf, sizeof(buf));
+       while (ret > 0) {
+               ret = mnl_cb_run(buf, ret, obj_seq, portid, NULL, NULL);
+               if (ret <= 0)
+                       break;
+               ret = mnl_socket_recvfrom(nl, buf, sizeof(buf));
+       }
+       if (ret == -1) {
+               perror("error");
+               exit(EXIT_FAILURE);
+       }
+       mnl_socket_close(nl);
+
+       return EXIT_SUCCESS;
+}
diff --git a/examples/nft-ct-timeout-get.c b/examples/nft-ct-timeout-get.c
new file mode 100644
index 0000000..503c488
--- /dev/null
+++ b/examples/nft-ct-timeout-get.c
@@ -0,0 +1,150 @@
+/*
+ * (C) 2012 by Pablo Neira Ayuso <pa...@netfilter.org>
+ *
+ * This program is free software; you can redistribute it and/or modify it
+ * under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 2 of the License, or
+ * (at your option) any later version.
+ *
+ * This software has been sponsored by Sophos Astaro <http://www.sophos.com>
+ */
+
+
+#include <stdlib.h>
+#include <time.h>
+#include <string.h>
+#include <netinet/in.h>
+
+#include <linux/netfilter.h>
+#include <linux/netfilter/nf_tables.h>
+
+#include <libmnl/libmnl.h>
+#include <libnftnl/object.h>
+
+static int obj_cb(const struct nlmsghdr *nlh, void *data)
+{
+       struct nftnl_obj *t;
+       char buf[4096];
+       uint32_t *type = data;
+
+       t = nftnl_obj_alloc();
+       if (t == NULL) {
+               perror("OOM");
+               goto err;
+       }
+
+       if (nftnl_obj_nlmsg_parse(nlh, t) < 0) {
+               perror("nftnl_obj_nlmsg_parse");
+               goto err_free;
+       }
+
+       nftnl_obj_snprintf(buf, sizeof(buf), t, *type, 0);
+       printf("%s\n", buf);
+
+err_free:
+       nftnl_obj_free(t);
+err:
+       return MNL_CB_OK;
+}
+
+int main(int argc, char *argv[])
+{
+       struct mnl_socket *nl;
+       char buf[MNL_SOCKET_BUFFER_SIZE];
+       struct nlmsghdr *nlh;
+       uint32_t portid, seq, family;
+       struct nftnl_obj *t = NULL;
+       int ret;
+       uint32_t type = NFTNL_OUTPUT_DEFAULT;
+
+       if (argc < 3 || argc > 5) {
+               fprintf(stderr, "%s <family> <table> [<obj>] 
[<default|xml|json>]\n",
+                       argv[0]);
+               return EXIT_FAILURE;
+       }
+
+       if (strcmp(argv[1], "ip") == 0)
+               family = NFPROTO_IPV4;
+       else if (strcmp(argv[1], "ip6") == 0)
+               family = NFPROTO_IPV6;
+       else if (strcmp(argv[1], "inet") == 0)
+               family = NFPROTO_INET;
+       else if (strcmp(argv[1], "unspec") == 0)
+               family = NFPROTO_UNSPEC;
+       else {
+               fprintf(stderr, "Unknown family: ip, ip6, inet, unspec");
+               exit(EXIT_FAILURE);
+       }
+
+       if (strcmp(argv[argc-1], "xml") == 0) {
+               type = NFTNL_OUTPUT_XML;
+               argv[argc-1] = NULL;
+               argc--;
+       } else if (strcmp(argv[argc-1], "json") == 0) {
+               type = NFTNL_OUTPUT_JSON;
+               argv[argc-1] = NULL;
+               argc--;
+       } else if (strcmp(argv[argc - 1], "default") == 0) {
+               argc--;
+       }
+
+       if (argc == 3 || argc == 4) {
+               t = nftnl_obj_alloc();
+               if (t == NULL) {
+                       perror("OOM");
+                       exit(EXIT_FAILURE);
+               }
+       }
+
+       seq = time(NULL);
+       nftnl_obj_set_u32(t, NFTNL_OBJ_TYPE, NFT_OBJECT_CT_TIMEOUT);
+       if (argc < 4) {
+               nlh = nftnl_nlmsg_build_hdr(buf, NFT_MSG_GETOBJ, family,
+                                           NLM_F_DUMP, seq);
+               if (argc == 3) {
+                       nftnl_obj_set(t, NFTNL_OBJ_TABLE, argv[2]);
+                       nftnl_obj_nlmsg_build_payload(nlh, t);
+                       nftnl_obj_free(t);
+               }
+       } else {
+               nftnl_obj_set(t, NFTNL_OBJ_TABLE, argv[2]);
+               nftnl_obj_set(t, NFTNL_OBJ_NAME, argv[3]);
+
+               nlh = nftnl_nlmsg_build_hdr(buf, NFT_MSG_GETOBJ, family,
+                                           NLM_F_ACK, seq);
+               nftnl_obj_nlmsg_build_payload(nlh, t);
+               nftnl_obj_free(t);
+       }
+
+       nl = mnl_socket_open(NETLINK_NETFILTER);
+       if (nl == NULL) {
+               perror("mnl_socket_open");
+               exit(EXIT_FAILURE);
+       }
+
+       if (mnl_socket_bind(nl, 0, MNL_SOCKET_AUTOPID) < 0) {
+               perror("mnl_socket_bind");
+               exit(EXIT_FAILURE);
+       }
+       portid = mnl_socket_get_portid(nl);
+
+       if (mnl_socket_sendto(nl, nlh, nlh->nlmsg_len) < 0) {
+               perror("mnl_socket_send");
+               exit(EXIT_FAILURE);
+       }
+
+       ret = mnl_socket_recvfrom(nl, buf, sizeof(buf));
+       while (ret > 0) {
+               ret = mnl_cb_run(buf, ret, seq, portid, obj_cb, &type);
+               if (ret <= 0)
+                       break;
+               ret = mnl_socket_recvfrom(nl, buf, sizeof(buf));
+       }
+       if (ret == -1) {
+               perror("error");
+               exit(EXIT_FAILURE);
+       }
+       mnl_socket_close(nl);
+
+       return EXIT_SUCCESS;
+}
-- 
2.14.1

--
To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to