port security payload sent to agents changed after push notifications

Bug #1709408 reported by Jakub Libosvar
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
neutron
Confirmed
Critical
Jakub Libosvar

Bug Description

Agent call to get_device_info for security groups changed the payload format. Specifically port_security_enabled is now not part of port dict but under 'security'. So when firewalls check for port security [1] they always get True cause they access port['port_security_enabled'] instead of port['security']['port_security_enabled'].

[1] https://github.com/openstack/neutron/blob/master/neutron/agent/firewall.py#L49

Tags: sg-fw
Revision history for this message
YaZug (jon-schlueter) wrote :
Revision history for this message
YaZug (jon-schlueter) wrote :

test_port_security_macspoofing_port[compute,id-7c0bb1a2-d053-49a4-98f9-ca1a1d849f63,network,slow] - this is the tempest test that is failing

Revision history for this message
wes hayutin (weshayutin) wrote :

This is a dupe lp, https://bugs.launchpad.net/tripleo/+bug/1605654 is the original

Revision history for this message
YaZug (jon-schlueter) wrote :

this is the candidate for regression: https://review.openstack.org/#/c/410422/

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.