neutron/neutron/tests/functional
LIU Yulong 18a171808b [Security] fix allowed-address-pair 0.0.0.0/0 issue
When add allowed-address-pair 0.0.0.0/0 to one port, it will
unexpectedly open all others' protocol under same security
group. IPv6 has the same problem.

The root cause is the openflow rules calculation of the
security group, it will unexpectedly allow all IP(4&6)
traffic to get through.

For openvswitch openflow firewall, this patch adds a source
mac address match for the allowed-address-pair which has
prefix lenght 0, that means all ethernet packets from this
mac will be accepted. It exactly will meet the request of
accepting any IP address from the configured VM.

Test result shows that the remote security group and
allowed address pair works:
1. Port has 0.0.0.0/0 allowed-address-pair clould send any
   IP (src) packet out.
2. Port has x.x.x.x/y allowed-address-pair could be accepted
   for those VMs under same security group.
3. Ports under same network can reach each other (remote
   security group).
4. Protocol port number could be accessed only when there
   has related rule.

Closes-bug: #1867119
Change-Id: I2e3aa7c400d7bb17cc117b65faaa160b41013dde
(cherry picked from commit 00298fe6e8)
2020-07-31 11:23:01 +00:00
..
agent [Security] fix allowed-address-pair 0.0.0.0/0 issue 2020-07-31 11:23:01 +00:00
api Convert policy.json into policy-in-code 2018-12-13 20:37:53 +00:00
cmd Fix neutron-status upgrade check CLI tool 2019-03-21 15:01:50 +00:00
common All functional tests logs results now 2018-11-21 19:58:18 +00:00
db Check "security_group_rule" quota during security group creation 2020-04-24 11:45:27 +02:00
pecan_wsgi Fix bulk port functioning with requested security groups 2019-09-12 19:09:23 +00:00
plugins use neutron_lib's portbindings api-def 2017-03-31 09:16:22 -06:00
privileged Kill all processes running in a namespace before deletion 2020-04-20 16:35:04 +02:00
sanity All functional tests logs results now 2018-11-21 19:58:18 +00:00
scheduler Use constant IP_VERSION_4/6 in functional tests 2018-08-27 21:45:56 +00:00
services [DVR] Related routers should be included if are requested 2020-07-10 13:30:31 +00:00
tests NetcatTester.stop_processes skip "No such process" exception 2019-11-22 10:54:17 +00:00
__init__.py tests: removed 'retargetable' framework 2017-05-02 16:45:49 +00:00
base.py Increase timeouts for OVSDB in functional tests 2019-09-13 10:57:02 +00:00
constants.py TrunkManager for the OVS agent 2016-08-24 02:52:17 -04:00
requirements.txt Don't return null-byte separated string from ExternalProcess.cmdline() 2017-03-08 07:50:51 +00:00
test_server.py [Functional tests] Fix SIGHUP handling tests 2020-01-15 14:06:29 +01:00
test_service.py Modify api and rpc default number of workers 2019-02-19 13:24:01 -07:00