}
Integer remoteAclTag = this.aclServiceUtils.getAclTag(remoteAclId);
if (remoteAclTag == null || remoteAclTag == AclConstants.INVALID_ACL_TAG) {
- LOG.error("remoteAclTag=[] is null or invalid for remoteAclId={}", remoteAclTag, remoteAclId);
+ LOG.error("remoteAclTag={} is null or invalid for remoteAclId={}", remoteAclTag, remoteAclId);
return;
}
List<MatchInfoBase> lportAndAclMatches =
matches.add(AclServiceUtils.buildLPortTagMatch(lportTag, serviceMode));
List<InstructionInfo> instructions = getDispatcherTableResubmitInstructions();
- LOG.debug(addOrRemove == NwConstants.DEL_FLOW ? "Deleting " : "Adding " + "ARP Rule on DPID {}, "
- + "lportTag {}", dpId, lportTag);
+ LOG.debug("{} ARP Rule on DPID {}, lportTag {}",
+ addOrRemove == NwConstants.DEL_FLOW ? "Deleting" : "Adding", dpId, lportTag);
String flowName = "Egress_ARP_" + dpId + "_" + lportTag + "_" + allowedAddress.getMacAddress().getValue()
+ String.valueOf(allowedAddressIp.getValue());
syncFlow(dpId, getAclAntiSpoofingTable(), flowName, AclConstants.PROTO_ARP_TRAFFIC_MATCH_PRIORITY, "ACL", 0,
matches.add(MatchEthernetType.ARP);
matches.add(AclServiceUtils.buildLPortTagMatch(lportTag, serviceMode));
List<InstructionInfo> instructions = getDispatcherTableResubmitInstructions();
- LOG.debug(addOrRemove == NwConstants.DEL_FLOW ? "Deleting " : "Adding " + "ARP Rule on DPID {}, "
- + "lportTag {}", dpId, lportTag);
+ LOG.debug("{} ARP Rule on DPID {}, lportTag {}", addOrRemove == NwConstants.DEL_FLOW ? "Deleting" : "Adding",
+ dpId, lportTag);
String flowName = "Ingress_ARP_" + dpId + "_" + lportTag;
syncFlow(dpId, getAclAntiSpoofingTable(), flowName, AclConstants.PROTO_ARP_TRAFFIC_MATCH_PRIORITY, "ACL", 0, 0,
AclConstants.COOKIE_ACL_BASE, matches, instructions, addOrRemove);
@Singleton
public class AclClusterUtilImpl implements AclClusterUtil {
- private static final Logger LOG = LoggerFactory.getLogger(AclClusterUtil.class);
+ private static final Logger LOG = LoggerFactory.getLogger(AclClusterUtilImpl.class);
private static final String ACL_ENTITY_TYPE_FOR_OWNERSHIP = "netvirt-acl";
private static final String ACL_ENTITY_NAME = "netvirt-acl";
}
InterfaceAcl aclInPort = port.getAugmentation(InterfaceAcl.class);
if (aclInPort == null) {
- LOG.error("getSecurityGroupInPortList: no security group associated}",
+ LOG.error("getSecurityGroupInPortList: no security group associated with port {}",
port.getName());
return null;
}
// To handle overlapping rules, aclTag is added to priority
priority += aclTag;
} else {
- LOG.warn("aclTag=[] is null or invalid for aclName={}", aclTag, aclName);
+ LOG.warn("aclTag={} is null or invalid for aclName={}", aclTag, aclName);
}
return priority;
}
try {
inetAddress = InetAddress.getByName(addr);
} catch (UnknownHostException e) {
- LOG.error("Invalid address : {}", addr, e.getMessage());
+ LOG.error("Invalid address : {}", addr, e);
return null;
}
return inetAddress;
uuid = Uuid.getDefaultInstance(uuidStr);
} catch (IllegalArgumentException e) {
session.getConsole().println("Invalid uuid" + e.getMessage());
- log.error("Invalid uuid" + e);
+ log.error("Invalid uuid", e);
return;
}
Collection<AclInterface> aclInterfaceList = aclDataCache.getInterfaceList(uuid);
uuidRef = Uuid.getDefaultInstance(uuidStr);
} catch (IllegalArgumentException e) {
session.getConsole().println("Invalid uuid" + e.getMessage());
- log.error("Invalid uuid" + e);
+ log.error("Invalid uuid", e);
return;
}
Collection<Uuid> remoteUuidLst = aclDataCache.getRemoteAcl(uuidRef, direction);