neutron/neutron/tests
Slawek Kaplonski 1e220d7136 [OVS FW] Clean conntrack entries with mark == CT_MARK_INVALID
In case when security group is removed from port, connections
established to/from port which were hitting some of the removed SG
rules will be marked with CT_MARK_INVALID in the conntrack table.
Due to that such existing connections will be stopped.
But then if SG will be added again to the port, those conntrack entries
marked as invalid will not be removed and those hang connections will
not be revived.
To fix that, this patch adds deletion of the conntrack entries marked
with CT_MARK_INVALID and related to the port of which SG are
updated/added.

Closes-Bug: #1915530
Change-Id: I84718b8ac4d8d6e39426e1c4485c2d7fe28185dd
2021-02-18 09:14:23 +01:00
..
common Remove rootwrap execution (2) 2021-02-06 16:23:03 +00:00
contrib Add port device profile extension 2021-01-22 16:17:30 +00:00
etc Convert policy.json into policy-in-code 2018-12-13 20:37:53 +00:00
fullstack Merge "[goal] Deprecate the JSON formatted policy file" 2021-01-19 16:31:51 +00:00
functional Remove rootwrap execution (2) 2021-02-06 16:23:03 +00:00
unit [OVS FW] Clean conntrack entries with mark == CT_MARK_INVALID 2021-02-18 09:14:23 +01:00
var
__init__.py
base.py Suppress deprecation warnings in policy enforer 2021-01-12 19:18:51 +00:00
post_mortem_debug.py
tools.py Add port NUMA affinity policy 2020-11-13 15:49:34 +00:00