Initial firewall config causes temporary packet loss

Due to ordering of firewall rule/policy configuration, all incoming
packets may be dropped during firewall configuration, until its
completion. This creates a race condition where this packet loss
could result in manifest application failure, causing the initial
unlock to fail.

In order to avoid this packet loss, this update adds ordering
dependencies to ensure the default policies are applied only after
the common platform firewall rules.

Change-Id: I196911a197e6efb58e41d742a57216d0175cd4be
Closes-Bug: 1814619
Signed-off-by: Don Penney <don.penney@windriver.com>
This commit is contained in:
Don Penney 2019-02-04 23:28:04 -05:00
parent 29cd437d79
commit 7c263d19b1
2 changed files with 7 additions and 7 deletions

View File

@ -1,2 +1,2 @@
SRC_DIR="src"
TIS_PATCH_VER=78
TIS_PATCH_VER=79

View File

@ -298,38 +298,38 @@ class platform::firewall::oam (
version => 'ipv4',
}
platform::firewall::common { 'platform:firewall:ipv6':
-> platform::firewall::common { 'platform:firewall:ipv6':
interface => $interface_name,
version => 'ipv6',
}
platform::firewall::services { 'platform:firewall:services':
-> platform::firewall::services { 'platform:firewall:services':
version => $version,
}
# Set default table policies
firewallchain { 'INPUT:filter:IPv4':
-> firewallchain { 'INPUT:filter:IPv4':
ensure => present,
policy => drop,
before => undef,
purge => false,
}
firewallchain { 'INPUT:filter:IPv6':
-> firewallchain { 'INPUT:filter:IPv6':
ensure => present,
policy => drop,
before => undef,
purge => false,
}
firewallchain { 'FORWARD:filter:IPv4':
-> firewallchain { 'FORWARD:filter:IPv4':
ensure => present,
policy => drop,
before => undef,
purge => false,
}
firewallchain { 'FORWARD:filter:IPv6':
-> firewallchain { 'FORWARD:filter:IPv6':
ensure => present,
policy => drop,
before => undef,