)]}'
{"doc/source/contributor/internals/openvswitch_firewall.rst":[{"author":{"_account_id":1131,"name":"Brian Haley","email":"haleyb.dev@gmail.com","username":"brian-haley"},"change_message_id":"252ba3e92289914bd5c7c52f40425cce82d1cd04","unresolved":false,"context_lines":[{"line_number":347,"context_line":"pipeline. Since the connection was already accepted by egress pipeline, all"},{"line_number":348,"context_line":"remaining egress connections are sent to normal flood\u0027n\u0027learn switching"},{"line_number":349,"context_line":"in |table_94|."},{"line_number":350,"context_line":"Packets which comes from ports with disabled port security are also sent to"},{"line_number":351,"context_line":"normal flood\u0027n\u0027learn switching in |table_94|."},{"line_number":352,"context_line":""},{"line_number":353,"context_line":"::"}],"source_content_type":"text/x-rst","patch_set":1,"id":"5f681702_b520c04b","line":350,"range":{"start_line":350,"start_character":14,"end_line":350,"end_character":19},"updated":"2020-10-16 01:22:17.000000000","message":"s/come","commit_id":"8cd739e0e1e50300c9641fb3b6a30b85929a1197"},{"author":{"_account_id":16688,"name":"Rodolfo Alonso","email":"ralonsoh@redhat.com","username":"rodolfo-alonso-hernandez"},"change_message_id":"8d0c686079c66d9320159672eab10eb5130ccf13","unresolved":false,"context_lines":[{"line_number":348,"context_line":"remaining egress connections are sent to normal flood\u0027n\u0027learn switching"},{"line_number":349,"context_line":"in |table_94|."},{"line_number":350,"context_line":"Packets which come from ports with disabled port security are also sent to"},{"line_number":351,"context_line":"normal flood\u0027n\u0027learn switching in |table_94|."},{"line_number":352,"context_line":""},{"line_number":353,"context_line":"::"},{"line_number":354,"context_line":""}],"source_content_type":"text/x-rst","patch_set":2,"id":"5f681702_ad8228c7","line":351,"updated":"2020-10-17 16:30:55.000000000","message":"But that means any multicast packet coming from a port with disabled security will be processed in table 94, that will send the packet with action\u003dNORMAL. That\u0027s exactly what I tried to avoid in https://review.opendev.org/#/c/748719/\n\nThis patch will effectively revert mine.","commit_id":"09a03f4d573ec052a44ddb4a82622604715695d7"}],"neutron/agent/linux/openvswitch_firewall/firewall.py":[{"author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"tag":"autogenerated:zuul:check","change_message_id":"b185cc0372a1ecaaeea7762fe845487746d55c06","unresolved":false,"context_lines":[{"line_number":955,"context_line":"    def _initialize_ingress_no_port_security(self, port_id):"},{"line_number":956,"context_line":"        try:"},{"line_number":957,"context_line":"            ovs_port \u003d self.get_ovs_port(port_id)"},{"line_number":958,"context_line":"            vlan_tag \u003d self._get_port_vlan_tag(ovs_port.port_name)"},{"line_number":959,"context_line":"        except exceptions.OVSFWTagNotFound:"},{"line_number":960,"context_line":"            # It\u0027s a patch port, don\u0027t set anything"},{"line_number":961,"context_line":"            return"}],"source_content_type":"text/x-python","patch_set":1,"id":"5f681702_f5e5183a","line":958,"updated":"2020-10-16 00:51:05.000000000","message":"pep8: F841 local variable \u0027vlan_tag\u0027 is assigned to but never used","commit_id":"8cd739e0e1e50300c9641fb3b6a30b85929a1197"}]}
