-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix private gateway acl on static routes #10262
Conversation
@blueorangutan package |
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## 4.19 #10262 +/- ##
============================================
- Coverage 15.16% 15.15% -0.01%
- Complexity 11314 11318 +4
============================================
Files 5409 5409
Lines 474473 474663 +190
Branches 57876 57903 +27
============================================
+ Hits 71947 71952 +5
- Misses 394482 394666 +184
- Partials 8044 8045 +1
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. |
@blueorangutan package |
@blueorangutan test |
iptables rules for ingress look good
however, the rules for egress seem wrong
I think it should be like
note: |
@blueorangutan package |
@vishesh92 similar change might be needed |
22462bd
to
2fa9d88
Compare
@blueorangutan package |
1 similar comment
@blueorangutan package |
@blueorangutan test |
[SF] Trillian test result (tid-12347)
|
@blueorangutan package |
@DaanHoogland a [SL] Jenkins job has been kicked to build packages. It will be bundled with KVM, XenServer and VMware SystemVM templates. I'll keep you posted as I make progress. |
Packaging result [SF]: ✔️ el8 ✔️ el9 ✔️ debian ✔️ suse15. SL-JID 12392 |
@blueorangutan test |
@DaanHoogland a [SL] Trillian-Jenkins test job (ol8 mgmt + kvm-ol8) has been kicked to run smoke tests |
[SF] Trillian test result (tid-12361)
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
tested this in a lab env with two VPCs
10.10.0.0/16 and 10.11.0.0/16
private gateways 10.200.20.1 and 10.200.20.2 connected (as each others gateway and tested several acl lists configurations to block/allow tcp/icmp.
The only noteworthy limitation is that running processes won't get blocked. I do not consider that part of this PR/issue and am not sure if that needs solving, as restart with cleanup would take care of that.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
code lgtm
Description
This PR fixes #9837
Types of changes
Feature/Enhancement Scale or Bug Severity
Feature/Enhancement Scale
Bug Severity
Screenshots (if appropriate):
How Has This Been Tested?
How did you try to break this feature and the system with this change?