can update the gateway of ipv6 subnet with ipv6 address which has a leading "0" via cli
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
neutron |
Fix Released
|
Wishlist
|
Unassigned |
Bug Description
[Summary]
can update the gateway of ipv6 subnet with ipv6 address which has a leading "0" via cli
[Topo]
devstack all-in-one node
[Description and expect result]
if update the gateway of ipv6 subnet with ipv6 address which has a leading "0",
should reject leading '0's to avoid ambiguity.
[Reproduceable or not]
reproduceable
[Recreate Steps]
1) create 1 ipv6 subnet:
root@45-
--ip-version 6 --name sub11
Created a new subnet:
+------
| Field | Value |
+------
| allocation_pools | {"start": "2::2", "end": "2::ffff:
| cidr | 2::/64 |
| dns_nameservers | |
| enable_dhcp | True |
| gateway_ip | 2::1 |
| host_routes | |
| id | e2a09fa2-
| ip_version | 6 |
| ipv6_address_mode | |
| ipv6_ra_mode | |
| name | sub11 |
| network_id | af909be2-
| subnetpool_id | |
| tenant_id | bc125faaf00041f
+------
root@45-
2)update the gateway of subnet with needless "0" in the ip address:
root@45-
Updated subnet: sub11
root@45-
root@45-
+------
| Field | Value |
+------
| allocation_pools | {"start": "2::2", "end": "2::ffff:
| cidr | 2::/64 |
| dns_nameservers | |
| enable_dhcp | True |
| gateway_ip | 2::0001 >>>ISSUE |
| host_routes | |
| id | e2a09fa2-
| ip_version | 6 |
| ipv6_address_mode | |
| ipv6_ra_mode | |
| name | sub11 |
| network_id | af909be2-
| subnetpool_id | |
| tenant_id | bc125faaf00041f
+------
3) if update the gateway of ipv6 subnet with ipv6 address which has a leading
"0" via dashboard, no this issue
4) For reference, below is the occurence of updating gateway of ipv4 subnet:
root@45-
Invalid input for gateway_ip. Reason: '1.0.0.001' is not an accepted IP address,
'1.0.0.1' is recommended.
root@45-
[Configration]
reproduceable bug, no need
[logs]
reproduceable bug, no need
[Root cause anlyze or debug inf]
reproduceable bug
[Attachment]
None
Changed in neutron: | |
assignee: | nobody → Reedip (reedip-banerjee) |
affects: | neutron → python-neutronclient |
Changed in neutron: | |
assignee: | nobody → Reedip (reedip-banerjee) |
status: | Incomplete → In Progress |
Changed in neutron: | |
assignee: | Reedip (reedip-banerjee) → Brian Haley (brian-haley) |
Changed in neutron: | |
assignee: | Brian Haley (brian-haley) → Reedip (reedip-banerjee) |
Changed in neutron: | |
status: | In Progress → Fix Committed |
status: | Fix Committed → In Progress |
Changed in neutron: | |
assignee: | nobody → Reedip (reedip-banerjee) |
Changed in neutron: | |
status: | New → In Progress |
Changed in neutron: | |
status: | In Progress → Triaged |
tags: |
added: rfe-approved removed: rfe |
Changed in neutron: | |
status: | Triaged → In Progress |
Found a similar bug has been fixed in neutron for IPv4.
This can be added to the same, and the validation can hence be taken care in a single API call