@@ -63,7 +63,7 @@ func (oc *DefaultNetworkController) setupUDNACLs(mgmtPortIPs []net.IP) error {
6363 pgName := libovsdbutil .GetPortGroupName (pgIDs )
6464 egressDenyIDs := oc .getUDNACLDbIDs (DenySecondaryACL , libovsdbutil .ACLEgress )
6565 match := libovsdbutil .GetACLMatch (pgName , "" , libovsdbutil .ACLEgress )
66- egressDenyACL := libovsdbutil .BuildACL (egressDenyIDs , types .PrimaryUDNDenyPriority , match , nbdb .ACLActionDrop , nil , libovsdbutil .LportEgress )
66+ egressDenyACL := libovsdbutil .BuildACLWithDefaultTier (egressDenyIDs , types .PrimaryUDNDenyPriority , match , nbdb .ACLActionDrop , nil , libovsdbutil .LportEgress )
6767
6868 getARPMatch := func (direction libovsdbutil.ACLDirection ) string {
6969 match := "("
@@ -89,15 +89,15 @@ func (oc *DefaultNetworkController) setupUDNACLs(mgmtPortIPs []net.IP) error {
8989
9090 egressARPIDs := oc .getUDNACLDbIDs (AllowHostARPACL , libovsdbutil .ACLEgress )
9191 match = libovsdbutil .GetACLMatch (pgName , getARPMatch (libovsdbutil .ACLEgress ), libovsdbutil .ACLEgress )
92- egressARPACL := libovsdbutil .BuildACL (egressARPIDs , types .PrimaryUDNAllowPriority , match , nbdb .ACLActionAllow , nil , libovsdbutil .LportEgress )
92+ egressARPACL := libovsdbutil .BuildACLWithDefaultTier (egressARPIDs , types .PrimaryUDNAllowPriority , match , nbdb .ACLActionAllow , nil , libovsdbutil .LportEgress )
9393
9494 ingressDenyIDs := oc .getUDNACLDbIDs (DenySecondaryACL , libovsdbutil .ACLIngress )
9595 match = libovsdbutil .GetACLMatch (pgName , "" , libovsdbutil .ACLIngress )
96- ingressDenyACL := libovsdbutil .BuildACL (ingressDenyIDs , types .PrimaryUDNDenyPriority , match , nbdb .ACLActionDrop , nil , libovsdbutil .LportIngress )
96+ ingressDenyACL := libovsdbutil .BuildACLWithDefaultTier (ingressDenyIDs , types .PrimaryUDNDenyPriority , match , nbdb .ACLActionDrop , nil , libovsdbutil .LportIngress )
9797
9898 ingressARPIDs := oc .getUDNACLDbIDs (AllowHostARPACL , libovsdbutil .ACLIngress )
9999 match = libovsdbutil .GetACLMatch (pgName , getARPMatch (libovsdbutil .ACLIngress ), libovsdbutil .ACLIngress )
100- ingressARPACL := libovsdbutil .BuildACL (ingressARPIDs , types .PrimaryUDNAllowPriority , match , nbdb .ACLActionAllow , nil , libovsdbutil .LportIngress )
100+ ingressARPACL := libovsdbutil .BuildACLWithDefaultTier (ingressARPIDs , types .PrimaryUDNAllowPriority , match , nbdb .ACLActionAllow , nil , libovsdbutil .LportIngress )
101101
102102 ingressAllowIDs := oc .getUDNACLDbIDs (AllowHostSecondaryACL , libovsdbutil .ACLIngress )
103103 match = "("
@@ -114,7 +114,7 @@ func (oc *DefaultNetworkController) setupUDNACLs(mgmtPortIPs []net.IP) error {
114114 }
115115 match += ")"
116116 match = libovsdbutil .GetACLMatch (pgName , match , libovsdbutil .ACLIngress )
117- ingressAllowACL := libovsdbutil .BuildACL (ingressAllowIDs , types .PrimaryUDNAllowPriority , match , nbdb .ACLActionAllowRelated , nil , libovsdbutil .LportIngress )
117+ ingressAllowACL := libovsdbutil .BuildACLWithDefaultTier (ingressAllowIDs , types .PrimaryUDNAllowPriority , match , nbdb .ACLActionAllowRelated , nil , libovsdbutil .LportIngress )
118118
119119 ops , err := libovsdbops .CreateOrUpdateACLsOps (oc .nbClient , nil , oc .GetSamplingConfig (), egressDenyACL , egressARPACL , ingressARPACL , ingressDenyACL , ingressAllowACL )
120120 if err != nil {
@@ -199,11 +199,11 @@ func (oc *DefaultNetworkController) setUDNPodOpenPortsOps(podNamespacedName stri
199199 ingressMatch , egressMatch , parseErr := getPortsMatches (podAnnotations , lspName )
200200 // don't return on parseErr, as we need to cleanup potentially present ACLs from the previous config
201201 ingressIDs := oc .getUDNOpenPortDbIDs (podNamespacedName , libovsdbutil .ACLIngress )
202- ingressACL := libovsdbutil .BuildACL (ingressIDs , types .PrimaryUDNAllowPriority ,
202+ ingressACL := libovsdbutil .BuildACLWithDefaultTier (ingressIDs , types .PrimaryUDNAllowPriority ,
203203 ingressMatch , nbdb .ACLActionAllowRelated , nil , libovsdbutil .LportIngress )
204204
205205 egressIDs := oc .getUDNOpenPortDbIDs (podNamespacedName , libovsdbutil .ACLEgress )
206- egressACL := libovsdbutil .BuildACL (egressIDs , types .PrimaryUDNAllowPriority ,
206+ egressACL := libovsdbutil .BuildACLWithDefaultTier (egressIDs , types .PrimaryUDNAllowPriority ,
207207 egressMatch , nbdb .ACLActionAllow , nil , libovsdbutil .LportEgress )
208208
209209 var err error
@@ -282,7 +282,7 @@ func BuildAdvertisedNetworkSubnetsDropACL(advertisedNetworkSubnetsAddressSet add
282282 dropMatches = append (dropMatches , fmt .Sprintf ("(ip6.src == $%s && ip6.dst == $%s)" , v6AddrSet , v6AddrSet ))
283283 }
284284
285- dropACL := libovsdbutil .BuildACL (
285+ dropACL := libovsdbutil .BuildACLWithDefaultTier (
286286 GetAdvertisedNetworkSubnetsDropACLdbIDs (),
287287 types .AdvertisedNetworkDenyPriority ,
288288 strings .Join (dropMatches , " || " ),
@@ -325,7 +325,7 @@ func (bnc *BaseNetworkController) addAdvertisedNetworkIsolation(nodeName string)
325325 ops = append (ops , addrOps ... )
326326
327327 if len (passMatches ) > 0 {
328- passACL := libovsdbutil .BuildACL (
328+ passACL := libovsdbutil .BuildACLWithDefaultTier (
329329 GetAdvertisedNetworkSubnetsPassACLdbIDs (bnc .controllerName , bnc .GetNetworkName (), bnc .GetNetworkID ()),
330330 types .AdvertisedNetworkPassPriority ,
331331 strings .Join (passMatches , " || " ),
0 commit comments