From 2bb98f4881d6ac73644e1a98c69032dd40e45c2f Mon Sep 17 00:00:00 2001 From: Eric Garver Date: Wed, 5 Dec 2018 13:09:28 -0500 Subject: [PATCH 09/34] fw_zone: fix rich rule masquerading We weren't passing the rich rule to the backend so filtering on source/destination would not work. (cherry picked from commit 14acf26afe09ff9092bebbfc7ffe718b1758c573) (cherry picked from commit bd784bfd009859583b3606268d6109f8aff6c037) --- src/firewall/core/fw_zone.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/firewall/core/fw_zone.py b/src/firewall/core/fw_zone.py index ca90f7fba0d4..816fa50340b3 100644 --- a/src/firewall/core/fw_zone.py +++ b/src/firewall/core/fw_zone.py @@ -1690,7 +1690,7 @@ class FirewallZone(object): if backend.is_ipv_supported(ipv): zone_transaction.add_post(enable_ip_forwarding, ipv) - rules = backend.build_zone_masquerade_rules(enable, zone) + rules = backend.build_zone_masquerade_rules(enable, zone, rule) zone_transaction.add_rules(backend, rules) # FORWARD PORT -- 2.18.0