Remove dead code _arp_spoofing_rule()
This code should have been removed when the allowed_address_pair
extension was added here (0efce6195f
).
The arp spoofing rules are handled in the method _setup_spoof_filter_chain().
Reported by: Amir Sadoughi that this was crud I left behind :)
Change-Id: Ib0e2e2a5c13fb8fa7af1f988510143f40ac335e2
Closes-bug: #1258629
This commit is contained in:
parent
4066a6d9f6
commit
d85deaedf3
@ -185,9 +185,6 @@ class IptablesFirewallDriver(firewall.FirewallDriver):
|
|||||||
for rule in port.get('security_group_rules', [])
|
for rule in port.get('security_group_rules', [])
|
||||||
if rule['direction'] == direction]
|
if rule['direction'] == direction]
|
||||||
|
|
||||||
def _arp_spoofing_rule(self, port):
|
|
||||||
return '-m mac ! --mac-source %s -j DROP' % port['mac_address']
|
|
||||||
|
|
||||||
def _setup_spoof_filter_chain(self, port, table, mac_ip_pairs, rules):
|
def _setup_spoof_filter_chain(self, port, table, mac_ip_pairs, rules):
|
||||||
if mac_ip_pairs:
|
if mac_ip_pairs:
|
||||||
chain_name = self._port_chain_name(port, SPOOF_FILTER)
|
chain_name = self._port_chain_name(port, SPOOF_FILTER)
|
||||||
|
Loading…
Reference in New Issue
Block a user