-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[caclmgrd] Add check for valid ethertype in IPv4/v6 rules #6193
base: master
Are you sure you want to change the base?
Conversation
Added check for valid ethertype in IPv4/v6 rule.
@anilkpan: Your description should be the PR title (e.g., |
@anilkpan , @jleveque - can we get this one moving please? Time is of the essence! Firstly, Anil pls update the PR title as Joe suggests, and provide the extra info requested. In the meantime, I would hope that there is sufficient information (and the PR is small enough) that Joe can proceed with the review anyway? |
It's difficult to review the code when I don't fully understand why the change was necessary and exactly what it is intended to do. |
@anilkpan: Can you please update the PR title and description? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
As comments. Also, please update the PR title to be more descriptive.
Retest broadcom please |
Retest vsimage please |
i think this change breaks the sonic-mgmt cacl test, please check see if we need to fix the test, and if this behavior is back-compatibile. |
retest this please |
1 similar comment
retest this please |
Retest vsimage please |
retest this please |
Retest vsimage please |
retest vsimage please |
retest vsimage please |
@ben-gale , we have created an issue to track this. sonic-net/sonic-mgmt#2743 |
retest vsimage please |
2 similar comments
retest vsimage please |
retest vsimage please |
/Azurepipelines run |
Azure Pipelines successfully started running 1 pipeline(s). |
Added check for valid ethertype in IPv4/v6 rule.
- Why I did it
Added check for valid ethertype in IPv4/v6 rule.
- How I did it
- How to verify it
- Which release branch to backport (provide reason below if selected)
- Description for the changelog
[caclmgrd] Add check for valid ethertype in IPv4/v6 rules
This was done to support stop all SSH sessions for IPv4 and IPv6 only. One option was to use source IP as 0.0.0.0/0 or ::/0 but now we just need to use Ether type or IP type instead of 0 for SIP and DIP.
- A picture of a cute animal (not mandatory but encouraged)