Özhan Rüzgar Karaman created CLOUDSTACK-10242:
-------------------------------------------------
Summary: Problem Using Ingress/Egress SG Rules over 4.11 rc Tests
Key: CLOUDSTACK-10242
URL: https://issues.apache.org/jira/browse/CLOUDSTACK-10242
Project: CloudStack
Issue Type: Bug
Security Level: Public (Anyone can view this level - this is the default.)
Components: KVM, Management Server
Affects Versions: 4.11.0.0
Environment: KVM Host Ubuntu 16.04.3, Management Server Ubuntu 14.04.5
Reporter: Özhan Rüzgar Karaman
We noticed that Cloudstack-9853 fix generates some problems on applying SG
rules on security_group.py script. We compare the commands which send to script
between 4.9.3 and 4.11 versions and we noticed that SG rule delimiter and
nicsecips values changed on 4.11 release its examples are below:
4.9.3
/usr/share/cloudstack-common/scripts/vm/network/security_group.py
default_network_rules --vmname i-2-573-VM --vmid 573 --vmip 192.168.2.56
--vmmac 06:31:56:00:04:09 --vif vnet15 --brname brenp4s0f0-23 --nicsecips 0:
/usr/share/cloudstack-common/scripts/vm/network/security_group.py
add_network_rules --vmname i-2-573-VM --vmid 573 --vmip 192.168.2.56 --sig
d60255deb618b7be9f477eed10d65234 --seq 2 --vmmac 06:31:56:00:04:09 --vif vnet15
--brname brenp4s0f0-23 --nicsecips 0: --rules
"I:icmp:-1:-1:0.0.0.0/0,NEXT;I:tcp:1:65535:0.0.0.0/0,NEXT;I:udp:1:65535:0.0.0.0/0,NEXT;E:icmp:-1:-1:0.0.0.0/0,NEXT;E:tcp:1:65535:0.0.0.0/0,NEXT;E:udp:1:65535:0.0.0.0/0,NEXT;"
4.11.0
/usr/share/cloudstack-common/scripts/vm/network/security_group.py
default_network_rules --vmname i-2-3-VM --vmid 3 --vmip 192.168.18.189 --vmmac
1e:00:50:00:00:bc --vif vnet10 --brname breth0-23 --nicsecips 0;
/usr/share/cloudstack-common/scripts/vm/network/security_group.py
add_network_rules --vmname "i-2-3-VM" --vmid "3" --vmip "192.168.18.189" --sig
"9b1c4aa31c811204e1dae5310d7711b5" --seq "12" --vmmac "1e:00:50:00:00:bc" --vif
"vnet10" --brname "breth0-23" --nicsecips "0:" --rules
"I:icmp;-1;-1;0.0.0.0/0,NEXT;I:tcp;1;65535;0.0.0.0/0,NEXT;I:udp;1;65535;0.0.0.0/0,NEXT;E:icmp;-1;-1;0.0.0.0/0,NEXT;E:tcp;1;65535;0.0.0.0/0,NEXT;E:udp;1;65535;0.0.0.0/0,NEXT;"
This change creates problem on parse_network_rules function in
security_group.py. We made this test only on ipv4 enabled environment. So this
need to be fixed to make SG operational for 4.11 release.
--
This message was sent by Atlassian JIRA
(v7.6.3#76005)