-
Notifications
You must be signed in to change notification settings - Fork 933
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Optimize network forwards #11983
Optimize network forwards #11983
Conversation
Signed-off-by: Mark Laing <[email protected]>
Signed-off-by: Mark Laing <[email protected]>
Signed-off-by: Mark Laing <[email protected]>
Signed-off-by: Mark Laing <[email protected]>
@tomponline FYI this is passing the |
Please can you run the ones from https://github.com/lxc/lxc-ci/blob/master/bin/test-lxd-network-bridge-firewall with it. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM thanks!
Just waiting on confirmation that the daily tests run with this.
@tomponline This is passing the LXD network bridge firewall daily test (after much effort). The actual test script I am running is https://github.com/markylaing/lxc-ci/blob/fad37d48ab1254dcbf06e1a53c7cd252fdbef0aa/bin/test-lxd-network-bridge-firewall. I've made a few changes to account for side loading the LXD binary. Additionally, the test was run in an You can view the changes here lxc/lxc-ci@master...markylaing:lxc-ci:local-firewall-test |
Thanks! |
Reuses the logic from #9633 to optimise firewall rule generation when applying network forwards.
Additionally adds some revert logic to the
NetworkApplyForwards
method inxtables
to clean up any forwarding rules that may be partially applied (this is not required fornftables
as the rules are collated and applied together in a template).Closes #11911