Skip to content

Commit 5bda63c

Browse files
Maksym BeleiNGorb-jabil
authored andcommitted
[caclmgrd] Refactor ACL_SERVICES
* Renaming ACL_SERVICES to KNOWN_SYSTEM_SERVICES to stay consistant, because the service list is used for setting rules for MGMT interface, which is not related to ACL functionality. Signed-off-by: Maksym Belei <[email protected]>
1 parent a0e55a9 commit 5bda63c

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

src/sonic-host-services/scripts/caclmgrd

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ class ControlPlaneAclManager(daemon_base.DaemonBase):
6161

6262
# To specify a port range instead of a single port, use iptables format:
6363
# separate start and end ports with a colon, e.g., "1000:2000"
64-
ACL_SERVICES = {
64+
KNOWN_SYSTEM_SERVICES = {
6565
"NTP": {
6666
"ip_protocols": ["udp"],
6767
"dst_ports": ["123"],
@@ -263,12 +263,12 @@ class ControlPlaneAclManager(daemon_base.DaemonBase):
263263
continue
264264

265265
# Add iptables rules to allow input packets of all the known services
266-
for acl_service in self.ACL_SERVICES:
266+
for acl_service in self.KNOWN_SYSTEM_SERVICES:
267267
# Skip "ANY" record
268268
if acl_service == "ANY":
269269
continue
270-
for ip_protocol in self.ACL_SERVICES[acl_service]["ip_protocols"]:
271-
for dst_port in self.ACL_SERVICES[acl_service]["dst_ports"]:
270+
for ip_protocol in self.KNOWN_SYSTEM_SERVICES[acl_service]["ip_protocols"]:
271+
for dst_port in self.KNOWN_SYSTEM_SERVICES[acl_service]["dst_ports"]:
272272
mgmt_intf_cmds.append(self.iptables_cmd_ns_prefix[namespace] + "{} -A INPUT -p {} -d {}/{} --dport {} -j ACCEPT".format(table, ip_protocol, ip_addr, mask, dst_port))
273273
# Drop the rest of traffic
274274
mgmt_intf_cmds.append(self.iptables_cmd_ns_prefix[namespace] + "{} -A INPUT -d {}/{} -j DROP".format(table, ip_addr, mask))
@@ -328,14 +328,14 @@ class ControlPlaneAclManager(daemon_base.DaemonBase):
328328
fwd_traffic_from_namespace_to_host_cmds.append(self.iptables_cmd_ns_prefix[namespace] + "ip6tables -t nat -X")
329329
fwd_traffic_from_namespace_to_host_cmds.append(self.iptables_cmd_ns_prefix[namespace] + "ip6tables -t nat -F")
330330

331-
for acl_service in self.ACL_SERVICES:
332-
if self.ACL_SERVICES[acl_service]["multi_asic_ns_to_host_fwd"]:
331+
for acl_service in self.KNOWN_SYSTEM_SERVICES:
332+
if self.KNOWN_SYSTEM_SERVICES[acl_service]["multi_asic_ns_to_host_fwd"]:
333333
# Get the Source IP Set if exists else use default source ip prefix
334334
nat_source_ipv4_set = acl_source_ip_map[acl_service]["ipv4"] if acl_source_ip_map and acl_source_ip_map[acl_service]["ipv4"] else { "0.0.0.0/0" }
335335
nat_source_ipv6_set = acl_source_ip_map[acl_service]["ipv6"] if acl_source_ip_map and acl_source_ip_map[acl_service]["ipv6"] else { "::/0" }
336336

337-
for ip_protocol in self.ACL_SERVICES[acl_service]["ip_protocols"]:
338-
for dst_port in self.ACL_SERVICES[acl_service]["dst_ports"]:
337+
for ip_protocol in self.KNOWN_SYSTEM_SERVICES[acl_service]["ip_protocols"]:
338+
for dst_port in self.KNOWN_SYSTEM_SERVICES[acl_service]["dst_ports"]:
339339
for ipv4_src_ip in nat_source_ipv4_set:
340340
# IPv4 rules
341341
fwd_traffic_from_namespace_to_host_cmds.append(self.iptables_cmd_ns_prefix[namespace] +
@@ -546,7 +546,7 @@ class ControlPlaneAclManager(daemon_base.DaemonBase):
546546
acl_services = table_data["services"]
547547

548548
for acl_service in acl_services:
549-
if acl_service not in self.ACL_SERVICES:
549+
if acl_service not in self.KNOWN_SYSTEM_SERVICES:
550550
self.log_warning("Ignoring control plane ACL '{}' with unrecognized service '{}'"
551551
.format(table_name, acl_service))
552552
continue
@@ -555,8 +555,8 @@ class ControlPlaneAclManager(daemon_base.DaemonBase):
555555
.format(table_name, acl_service))
556556

557557
# Obtain default IP protocol(s) and destination port(s) for this service
558-
ip_protocols = self.ACL_SERVICES[acl_service]["ip_protocols"]
559-
dst_ports = self.ACL_SERVICES[acl_service]["dst_ports"]
558+
ip_protocols = self.KNOWN_SYSTEM_SERVICES[acl_service]["ip_protocols"]
559+
dst_ports = self.KNOWN_SYSTEM_SERVICES[acl_service]["dst_ports"]
560560

561561
acl_rules = {}
562562

0 commit comments

Comments
 (0)