Open gsanchietti opened 4 days ago
Image: 23.05.5-ns.1.3.0-52-ge672f104
Since the importance of the fix, a thorough QA is provided.
forward
rule with just manual addresses
1.2 Ensure that in the Changes
section there's no ipset
defined for the rule.
1.3 Edit the rule, add a domain set as a source and save
1.4 Ensure that ipset
is defined
1.5 Edit the rule and set a static IP as a source, make sure that ipset
has been deleted from the rule
1.6 Repeat the steps 1.3
and 1.5
for the destinationinput
rule with just a manual address
2.2 Edit such rule and set a domain set as source
2.3 Verify that ipset
is defined
2.4 Edit the rule again and set a static IP as a source
2.5 Ensure that ipset
is not definedoutput
rule with just a manual address
3.2 Edit such rule and set a domain set as destination
3.3 Verify that ipset
is defined
3.4 Edit the rule again and set a static IP as a destination
3.5 Ensure that ipset
is not definedTest Case 1 : Verified Test Case 2 : Verified Test Case 3 : Verified
In all cases, when ipsets are substituted with ip adresses they are not present anymore in the related firewall db rules.
Ipset definition still continues to be present in nft rules, e.g.
set nethesis {
type ipv4_addr
timeout 30m
elements = { 35.214.216.68 expires 29m53s500ms }
}
but correctly not used in any rule.
Steps to reproduce
input_wan
to see if the reference to the ipset is removed.uci
configuration before modification:uci
configuration after modification:Expected behavior
input_wan
once the source is changed to a specific IP address.Actual behavior
input_wan
even after changing the source to a specific IP address.Components NethSecurity version: 8-23.05.5-ns.1.3.0