neutron/neutron/agent/linux/openvswitch_firewall
Slawek Kaplonski 6da1543f49 [OVS FW] Clean conntrack entries with mark == CT_MARK_INVALID
In case when security group is removed from port, connections
established to/from port which were hitting some of the removed SG
rules will be marked with CT_MARK_INVALID in the conntrack table.
Due to that such existing connections will be stopped.
But then if SG will be added again to the port, those conntrack entries
marked as invalid will not be removed and those hang connections will
not be revived.
To fix that, this patch adds deletion of the conntrack entries marked
with CT_MARK_INVALID and related to the port of which SG are
updated/added.

Closes-Bug: #1915530
Change-Id: I84718b8ac4d8d6e39426e1c4485c2d7fe28185dd
(cherry picked from commit 1e220d7136)
2021-02-23 13:41:58 +00:00
..
__init__.py Open vSwitch conntrack based firewall driver 2016-02-16 16:47:21 +00:00
constants.py remove neutron.common.constants 2019-04-04 14:10:26 -06:00
exceptions.py ovsfw: Don't create rules if updated port doesn't exist 2018-01-05 16:28:18 +00:00
firewall.py [OVS FW] Clean conntrack entries with mark == CT_MARK_INVALID 2021-02-23 13:41:58 +00:00
iptables.py remove neutron.common.constants 2019-04-04 14:10:26 -06:00
rules.py Revert "[Security] fix allowed-address-pair 0.0.0.0/0 issue" 2021-01-20 17:02:06 +01:00