From 5e62eac7a97a251ab3f2330d65950a4b9e2a33cf Mon Sep 17 00:00:00 2001 From: Maximilian Stinsky Date: Tue, 21 Dec 2021 22:31:18 +0100 Subject: [PATCH] Reduce iptables version check from 1.6.2 to 1.6.0 The check is required to check if --random-fully can be used. Neutron is only using MASQUERADE rules which --random-fully supports since version 1.6.0. Closes-Bug: #1951564 Change-Id: I4d9a2f7d396d6cc8c958f5be635c2d3236e3fe4f --- neutron/common/_constants.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/neutron/common/_constants.py b/neutron/common/_constants.py index bb1da44e264..b517007e542 100644 --- a/neutron/common/_constants.py +++ b/neutron/common/_constants.py @@ -63,7 +63,7 @@ RPC_RES_PROCESSING_STEP = 20 # IPtables version to support --random-fully option. # Do not move this constant to neutron-lib, since it is temporary -IPTABLES_RANDOM_FULLY_VERSION = '1.6.2' +IPTABLES_RANDOM_FULLY_VERSION = '1.6.0' # Segmentation ID pool; DB select limit to improve the performace. IDPOOL_SELECT_SIZE = 100