mirror of
https://github.com/tailscale/tailscale.git
synced 2025-02-19 19:38:40 +00:00

This package is an initial implementation of something that can read netfilter and iptables rules from the Linux kernel without needing to shell out to an external utility; it speaks directly to the kernel using syscalls and parses the data returned. Currently this is read-only since it only knows how to parse a subset of the available data. Signed-off-by: Andrew Dunham <andrew@tailscale.com> Change-Id: Iccadf5dcc081b73268d8ccf8884c24eb6a6f1ff5
20 lines
345 B
Go
20 lines
345 B
Go
// Copyright (c) Tailscale Inc & AUTHORS
|
|
// SPDX-License-Identifier: BSD-3-Clause
|
|
|
|
//go:build linux && !(386 || loong64)
|
|
|
|
package linuxfw
|
|
|
|
import (
|
|
"testing"
|
|
"unsafe"
|
|
|
|
"tailscale.com/util/linuxfw/linuxfwtest"
|
|
)
|
|
|
|
func TestSizes(t *testing.T) {
|
|
linuxfwtest.TestSizes(t, &linuxfwtest.SizeInfo{
|
|
SizeofSocklen: unsafe.Sizeof(sockLen(0)),
|
|
})
|
|
}
|