diff options
author | Christian Breunig <christian@breunig.cc> | 2024-04-02 18:32:23 +0200 |
---|---|---|
committer | GitHub <noreply@github.com> | 2024-04-02 18:32:23 +0200 |
commit | 7ee2f016878ed29120baa66f8e1d372f97402c96 (patch) | |
tree | e480e1f12e0ca1dbe4c29fdccf213063ceda32a3 /src/conf_mode/vrf.py | |
parent | 2a031e68cbe6b0e9beb6e57b2f93b4ec4d95c84f (diff) | |
parent | 0529371bc587e2fcdd8794061e9bb9d60c792c43 (diff) | |
download | vyos-1x-7ee2f016878ed29120baa66f8e1d372f97402c96.tar.gz vyos-1x-7ee2f016878ed29120baa66f8e1d372f97402c96.zip |
Merge pull request #3230 from c-po/syntax-cleanup
firewall: nat: policy: vrf: nft call syntax and import cleanup
Diffstat (limited to 'src/conf_mode/vrf.py')
-rwxr-xr-x | src/conf_mode/vrf.py | 11 |
1 files changed, 7 insertions, 4 deletions
diff --git a/src/conf_mode/vrf.py b/src/conf_mode/vrf.py index 16908100f..1fc813189 100755 --- a/src/conf_mode/vrf.py +++ b/src/conf_mode/vrf.py @@ -14,8 +14,6 @@ # You should have received a copy of the GNU General Public License # along with this program. If not, see <http://www.gnu.org/licenses/>. -import os - from sys import exit from json import loads @@ -33,6 +31,7 @@ from vyos.utils.network import get_vrf_members from vyos.utils.network import interface_exists from vyos.utils.process import call from vyos.utils.process import cmd +from vyos.utils.process import popen from vyos.utils.system import sysctl_write from vyos import ConfigError from vyos import frr @@ -227,7 +226,11 @@ def apply(vrf): # Remove nftables conntrack zone map item nft_del_element = f'delete element inet vrf_zones ct_iface_map {{ "{tmp}" }}' - cmd(f'nft {nft_del_element}') + # Check if deleting is possible first to avoid raising errors + _, err = popen(f'nft --check {nft_del_element}') + if not err: + # Remove map element + cmd(f'nft {nft_del_element}') # Delete the VRF Kernel interface call(f'ip link delete dev {tmp}') @@ -307,7 +310,7 @@ def apply(vrf): if vrf['conntrack']: for chain, rule in nftables_rules.items(): cmd(f'nft add rule inet vrf_zones {chain} {rule}') - + if 'name' not in vrf or not vrf['conntrack']: for chain, rule in nftables_rules.items(): cmd(f'nft flush chain inet vrf_zones {chain}') |