-
Notifications
You must be signed in to change notification settings - Fork 164
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
testing: add integration testing that asserts STUN/NAT hole punching is working properly #27
Comments
If one NAT type is ok, then we can do it using docker containers. The idea is to have multiple layers of dockers (docker-in-docker technique), where outer most docker represents a WAN (we can run STUN/TURN/signaling server there), second layer is to set up an IP masquerade, and innermost container will be the NATted application. As far as I know, Ubuntu's IP masquerade (based on iptables) exhibits "Port-restricted cone NAT". You can emulate more than one virtual "NATted" subnets inside a docker, so we can simulate App-->NAT-->WAN-->NAT-->App. Let me know if this could help. |
Eventually it would be nice to test using a variety of NAT types but for now it would already help a lot to automate one test. That would mean we no longer have to manually test NAT traversal. |
I just put my demo code together... |
@enobufs you ok with me closing this as a We can simulate all NAT types between peers (and that we get the expected behavior) so I think that covers everything! |
Yes, I'd agree. Let me close this issue. |
Investigate ways to simulate and test traversal of different NAT types and combinations of NAT types.
Related:
The text was updated successfully, but these errors were encountered: