diff --git a/.mailmap b/.mailmap index 9e3badb65fc..5fcd106eda5 100644 --- a/.mailmap +++ b/.mailmap @@ -60,6 +60,7 @@ + diff --git a/nova/tests/test_libvirt.py b/nova/tests/test_libvirt.py index ef2374fca59..937c4786750 100644 --- a/nova/tests/test_libvirt.py +++ b/nova/tests/test_libvirt.py @@ -1871,6 +1871,10 @@ def test_static_filters(self): 'to_port': 81, 'group_id': src_secgroup['id']}) + db.security_group_rule_create(admin_ctxt, + {'parent_group_id': secgroup['id'], + 'group_id': src_secgroup['id']}) + db.instance_add_security_group(admin_ctxt, instance_ref['uuid'], secgroup['id']) db.instance_add_security_group(admin_ctxt, src_instance_ref['uuid'], @@ -1951,6 +1955,9 @@ def fake_iptables_execute(*cmd, **kwargs): '--dports 80:81 -s %s' % ip['address']) self.assertTrue(len(filter(regex.match, self.out_rules)) > 0, "TCP port 80/81 acceptance rule wasn't added") + regex = re.compile('-A .* -j ACCEPT -s %s' % ip['address']) + self.assertTrue(len(filter(regex.match, self.out_rules)) > 0, + "Protocol/port-less acceptance rule wasn't added") regex = re.compile('-A .* -j ACCEPT -p tcp ' '-m multiport --dports 80:81 -s 192.168.10.0/24') diff --git a/nova/virt/firewall.py b/nova/virt/firewall.py index be6a0f7c972..89559a82920 100644 --- a/nova/virt/firewall.py +++ b/nova/virt/firewall.py @@ -331,7 +331,11 @@ def instance_rules(self, instance, network_info): else: fw_rules = ipv6_rules - protocol = rule.protocol.lower() + protocol = rule.protocol + + if protocol: + protocol = rule.protocol.lower() + if version == 6 and protocol == 'icmp': protocol = 'icmpv6'