ExtraDHCPOptionsTestJSON.test_create_list_port_with_extra_dhcp_options fails

Bug #1546848 reported by Isaku Yamahata
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
networking-odl
Fix Released
High
Isaku Yamahata

Bug Description

ExtraDHCPOptionsTestJSON.test_create_list_port_with_extra_dhcp_options and tempest.api.network.test_extra_dhcp_options.ExtraDHCPOptionsIpV6TestJSON fails.

Changed in networking-odl:
assignee: nobody → Isaku Yamahata (yamahata)
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix proposed to networking-odl (master)

Fix proposed to branch: master
Review: https://review.openstack.org/281621

Changed in networking-odl:
status: New → In Progress
Changed in networking-odl:
importance: Undecided → High
Revision history for this message
Isaku Yamahata (yamahata) wrote :
Download full text (15.5 KiB)

json value to port creation
{
  "port": {
    "binding:host_id": "",
    "name": "",
    "allowed_address_pairs": [],
    "admin_state_up": true,
    "network_id": "db4eb2e8-584c-4a7a-9c6e-db2480cdc0b6",
    "dns_name": null,
    "extra_dhcp_opts": [
      {
        "opt_value": "123.123.123.45",
        "ip_version": 4,
        "opt_name": "server-ip-address"
      },
      {
        "opt_value": "pxelinux.0",
        "ip_version": 4,
        "opt_name": "bootfile-name"
      },
      {
        "opt_value": "123.123.123.123",
        "ip_version": 4,
        "opt_name": "tftp-server"
      }
    ],
    "mac_address": "FA:16:3E:9D:24:37",
    "binding:vif_details": {},
    "binding:vif_type": "unbound",
    "device_owner": "",
    "tenant_id": "b30288a23cbb4c7dae414212033bd537",
    "port_security_enabled": true,
    "binding:profile": {},
    "binding:vnic_type": "normal",
    "fixed_ips": [
      {
        "subnet_id": "d3ba6720-9957-40fb-8db8-10be1b7f4af3",
        "ip_address": "10.100.0.4"
      }
    ],
    "id": "7520dbeb-0bf3-48b7-aa77-5fb2fbe62dd1",
    "security_groups": [
      {
        "tenant_id": "b30288a23cbb4c7dae414212033bd537",
        "description": "Default security group",
        "id": "bd7954cd-3c10-455a-a242-102ac15eecd3",
        "security_group_rules": [
          {
            "remote_group_id": null,
            "direction": "egress",
            "remote_ip_prefix": null,
            "protocol": null,
            "ethertype": "IPv6",
            "tenant_id": "b30288a23cbb4c7dae414212033bd537",
            "port_range_max": null,
            "port_range_min": null,
            "id": "1426dcc9-7a61-4637-801d-d4822d228777",
            "security_group_id": "bd7954cd-3c10-455a-a242-102ac15eecd3"
          },
          {
            "remote_group_id": "bd7954cd-3c10-455a-a242-102ac15eecd3",
            "direction": "ingress",
            "remote_ip_prefix": null,
            "protocol": null,
            "ethertype": "IPv6",
            "tenant_id": "b30288a23cbb4c7dae414212033bd537",
            "port_range_max": null,
            "port_range_min": null,
            "id": "69d51186-00b3-4234-8583-c143c387ced4",
            "security_group_id": "bd7954cd-3c10-455a-a242-102ac15eecd3"
          },
          {
            "remote_group_id": null,
            "direction": "egress",
            "remote_ip_prefix": null,
            "protocol": null,
            "ethertype": "IPv4",
            "tenant_id": "b30288a23cbb4c7dae414212033bd537",
            "port_range_max": null,
            "port_range_min": null,
            "id": "7ab71f42-aa89-495a-86f0-c415ff31c503",
            "security_group_id": "bd7954cd-3c10-455a-a242-102ac15eecd3"
          },
          {
            "remote_group_id": "bd7954cd-3c10-455a-a242-102ac15eecd3",
            "direction": "ingress",
            "remote_ip_prefix": null,
            "protocol": null,
            "ethertype": "IPv4",
            "tenant_id": "b30288a23cbb4c7dae414212033bd537",
            "port_range_max": null,
            "port_range_min": null,
            "id": "9f17130c-a0cc-463c-9e47-4c9f044537a7",
            "security_group_id": "bd7954cd-3c10-455a-a242-102ac15eecd...

Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix merged to networking-odl (master)

Reviewed: https://review.openstack.org/281621
Committed: https://git.openstack.org/cgit/openstack/networking-odl/commit/?id=8ac83b3fada7ec779df3ae7099d2317962753a12
Submitter: Jenkins
Branch: master

commit 8ac83b3fada7ec779df3ae7099d2317962753a12
Author: Isaku Yamahata <email address hidden>
Date: Wed Feb 17 18:41:44 2016 -0800

    bug work around of Java MOXy bug of 475475

    On port creation with dns_name: None, null pointer exception occurs
    in opendaylight. This is due to the following bug
    https://bugs.eclipse.org/bugs/show_bug.cgi?id=475475
    EClipsLink MOXy is used as json parser and it wrongly parses json
    and stores wrongly null. In order to work around it, networking-odl
    shouldn't send unmapped keys whose value is null.

    Closes-Bug: #1546848
    Change-Id: I1efce0bfb8f943177a7f3e9555f038f13b3ac2a9

Changed in networking-odl:
status: In Progress → Fix Released
Revision history for this message
Doug Hellmann (doug-hellmann) wrote : Fix included in openstack/networking-odl 2.0.0

This issue was fixed in the openstack/networking-odl 2.0.0 release.

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.