Remove dead code _arp_spoofing_rule()

This code should have been removed when the allowed_address_pair
extension was added here (0efce6195f).
The arp spoofing rules are handled in the method _setup_spoof_filter_chain().

Reported by: Amir Sadoughi that this was crud I left behind :)

Change-Id: Ib0e2e2a5c13fb8fa7af1f988510143f40ac335e2
Closes-bug: #1258629
This commit is contained in:
Aaron Rosen 2013-12-06 11:12:33 -08:00
parent 4066a6d9f6
commit d85deaedf3

View File

@ -185,9 +185,6 @@ class IptablesFirewallDriver(firewall.FirewallDriver):
for rule in port.get('security_group_rules', []) for rule in port.get('security_group_rules', [])
if rule['direction'] == direction] if rule['direction'] == direction]
def _arp_spoofing_rule(self, port):
return '-m mac ! --mac-source %s -j DROP' % port['mac_address']
def _setup_spoof_filter_chain(self, port, table, mac_ip_pairs, rules): def _setup_spoof_filter_chain(self, port, table, mac_ip_pairs, rules):
if mac_ip_pairs: if mac_ip_pairs:
chain_name = self._port_chain_name(port, SPOOF_FILTER) chain_name = self._port_chain_name(port, SPOOF_FILTER)