Race condition when creating neutron_pg_drop port group
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
networking-ovn |
Fix Released
|
Medium
|
Terry Wilson |
Bug Description
The neutron_pg_drop Port Group is created with some ACLs to drop all the traffic by default.
This Port Group doesn't match any Neutron resource and it's created once the first Neutron port with port_security enabled gets created.
A race condition exists when the first two ports get created simultaneously by different workers as both may attempt to create this Port Group. The result is that one of the port creations will fail.
A patch like this should fix it:
--- a/networking_
+++ b/networking_
@@ -1792,11 +1792,11 @@ class OVNClient(object):
with self._nb_
if not self._nb_
# If drop Port Group doesn't exist yet, create it.
- txn.add(
+ txn.add(
# Add ACLs to this Port Group so that all traffic is dropped.
- txn.add(
+ txn.add(
if ports:
Changed in networking-ovn: | |
assignee: | nobody → Terry Wilson (otherwiseguy) |
status: | New → Confirmed |
importance: | Undecided → Medium |
Fix proposed to branch: master /review. opendev. org/683246
Review: https:/