GaOrtiga opened a new pull request, #9223:
URL: https://github.com/apache/cloudstack/pull/9223

   ### Description
   
   During the creation of firewall rules, if one of the limits for the ports is 
not informed, it is saved in the database as Null, indicating that there is no 
starting/ending limit.
   
   while creating a Kubernetes cluster, if the selected network has a rule that 
contains ports saved as null, an error is thrown, stopping the execution of the 
process.
   
   This behaviour has been fixed, making it so that any port saved as null is 
regarded as being being on its respective limit (1 for start ports and 65535 
for end ports) during the creation of a Kubernetes cluster.
   
   ### Types of changes
   
   - [ ] Breaking change (fix or feature that would cause existing 
functionality to change)
   - [ ] New feature (non-breaking change which adds functionality)
   - [X] Bug fix (non-breaking change which fixes an issue)
   - [ ] Enhancement (improves an existing feature and functionality)
   - [ ] Cleanup (Code refactoring and cleanup, that may add test cases)
   - [ ] build/CI
   
   ### Feature/Enhancement Scale or Bug Severity
   
   #### Bug Severity
   
   - [ ] BLOCKER
   - [ ] Critical
   - [ ] Major
   - [X] Minor
   - [ ] Trivial
   
   
   ### Screenshots (if appropriate):
   
   
   ### How Has This Been Tested?
   
   I created a rule in an existing network, with null starting port and ending 
on port 10, making it so it should not conflict with any of the ports required 
by the Kubernetes cluster. Before applying the changes, an error would be 
thrown.
   
   I repeated the process after applying the changes and the cluster was 
successfully created.


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscr...@cloudstack.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org

Reply via email to