diff options
author | Andrew Topp <andrewt@telekinetica.net> | 2024-09-04 04:09:46 +1000 |
---|---|---|
committer | Christian Breunig <christian@breunig.cc> | 2024-10-07 17:15:58 +0200 |
commit | 051cb6fbe2a9e4b8008bf21cec33eb2b8385305d (patch) | |
tree | 67613c9f57edc7d5c75a1d57f8f05b50377223ca /src/op_mode/ipsec.py | |
parent | 2f554aee334c8e52f1a22ea16acf9479d9812ea6 (diff) | |
download | vyos-1x-051cb6fbe2a9e4b8008bf21cec33eb2b8385305d.tar.gz vyos-1x-051cb6fbe2a9e4b8008bf21cec33eb2b8385305d.zip |
pbr: T6430: Local IP rules routing into VRFs by name
* This is the `policy local-route*` part of T6430, manipulating ip rules,
another PR covers firewall-backed `policy route*` for similar functionality
* Local PBR (policy local-route*) can only target table IDs up to 200 and
the previous PR to extend the range was rejected
* PBR with this PR can now also target VRFs directly by name, working around
targeting problems for VRF table IDs outside the overlapping 100-200 range
* Validation ensures rules can't target both a table ID and a VRF name
(internally they are handled the same)
* Relocated TestPolicyRoute.verify_rules() into VyOSUnitTestSHIM.TestCase,
extended to allow lookups in other address families (IPv6 in the new tests).
verify_rules() is used by original pbr and new lpbr smoketests in this PR.
Diffstat (limited to 'src/op_mode/ipsec.py')
0 files changed, 0 insertions, 0 deletions