[Yahoo-eng-team] [Bug 1837882] Re: while creating external network subnet range through Horizon UI helper message says give subnet range as comma separated but accept hyphen("-")

2020-07-13 Thread varun kumar yadav
** Project changed: horizon-cisco-ui => horizon

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1837882

Title:
  while creating external network subnet range through Horizon UI helper
  message says give subnet range as comma separated but accept
  hyphen("-")

Status in OpenStack Dashboard (Horizon):
  New

Bug description:
  Description: When user is trying to create an external network with
  subnet range using  hyphen "-" delimiter (20.x.x.10-20.x.x.100) even
  when the helper message says clearly notify user  the
  "(start_ip_range,end_ip_range) as comma separated delimeter"   is
  going through successfully without error message. please see the Ui
  attachment  for more info.

  Also after giving  Hyphen range in the external subnet. External
  network window leads to an unexpected error saying "Specify additional
  attributes for the subnet" without giving any proper error message.

  Pre - condition :
  create a tenant router r1  router with gateway external network .

  Step1 ->Create external network using admin user from Horizon.
  Step2 ->on the create network window . name -> external
 project->admin
 provider network type->external
 leave the physical network blank(but 
make sure user has tier 0 gateway set)
  Step3-> click next-> subnet name -> subnet1
   network address-> Try to give external network range as 
that of the gateway ip.
   Gateway IP-> Give the gateway IP of the subnet

  Step4-> under subnet details. Uncheck the "Enable Dhcp".
allocation pool-> give subnet range as 
(20.x.x.10-20.x.x.100)

  Step5-> Once user click "next" window comes back to step2  and further
  clicking  next leads to message "Specify additional attributes for the
  subnet"

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1837882/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1833374] [NEW] Default behavior is not consistent while creating FWaaS-v2 group through Horizon Dashboard and through CLI command.

2019-06-19 Thread varun kumar yadav
Public bug reported:

Description:  Creating Firewall Group  through openstack CLI command set
the admin state to true please find the below command, but through
Horizon Dashboard  Admin state is set to "False" by default.

[root@vioshim-l42jp6xt7m-vioshim-84bb866c4d-lw6wj /]# openstack firewall group 
create --name  F9
+---+--+
| Field | Value|
+---+--+
| Description   |  |
| Egress Policy ID  | None |
| ID| b16bbdd5-ba11-475a-b74a-acf27b3667ac |
| Ingress Policy ID | None |
| Name  | F9   |
| Ports | []   |
| Project   | 52e5cd63615243cd9439952c5214d0f7 |
| Shared| False|
| State | UP   |
| Status| INACTIVE |
| project_id| 52e5cd63615243cd9439952c5214d0f7 |
+---+--+

Expected: Dafault behavior should be consistent whether the Firewall
group created using Horizon or through the  neutron cLi command.

** Affects: neutron-fwaas-dashboard
 Importance: Undecided
 Status: New

** Project changed: neutron => neutron-fwaas-dashboard

** Description changed:

- Description:  Creating Firewall Group  through openstack CLI command
- please find the below command, but through Horizon Dashboard  Admin
- state is set to "False" by default
- 
+ Description:  Creating Firewall Group  through openstack CLI command set
+ the admin state to true please find the below command, but through
+ Horizon Dashboard  Admin state is set to "False" by default.
  
  [root@vioshim-l42jp6xt7m-vioshim-84bb866c4d-lw6wj /]# openstack firewall 
group create --name  F9
  +---+--+
  | Field | Value|
  +---+--+
  | Description   |  |
  | Egress Policy ID  | None |
  | ID| b16bbdd5-ba11-475a-b74a-acf27b3667ac |
  | Ingress Policy ID | None |
  | Name  | F9   |
  | Ports | []   |
  | Project   | 52e5cd63615243cd9439952c5214d0f7 |
  | Shared| False|
  | State | UP   |
  | Status| INACTIVE |
  | project_id| 52e5cd63615243cd9439952c5214d0f7 |
  +---+--+
  
- 
- Expected: Dafault behavior should be consistent whether the Firewall group 
created using Horizon or through the  neutron cLi command.
+ Expected: Dafault behavior should be consistent whether the Firewall
+ group created using Horizon or through the  neutron cLi command.

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1833374

Title:
  Default behavior is not consistent  while creating  FWaaS-v2 group
  through  Horizon Dashboard and through CLI command.

Status in Neutron FWaaS dashboard:
  New

Bug description:
  Description:  Creating Firewall Group  through openstack CLI command
  set the admin state to true please find the below command, but through
  Horizon Dashboard  Admin state is set to "False" by default.

  [root@vioshim-l42jp6xt7m-vioshim-84bb866c4d-lw6wj /]# openstack firewall 
group create --name  F9
  +---+--+
  | Field | Value|
  +---+--+
  | Description   |  |
  | Egress Policy ID  | None |
  | ID| b16bbdd5-ba11-475a-b74a-acf27b3667ac |
  | Ingress Policy ID | None |
  | Name  | F9   |
  | Ports | []   |
  | Project   | 52e5cd63615243cd9439952c5214d0f7 |
  | Shared| False|
  | State | UP   |
  | Status| INACTIVE |
  | project_id| 52e5cd63615243cd9439952c5214d0f7 |
  +---+--+

  Expected: Dafault behavior should be consistent whether the Firewall
  group created using Horizon or through the  neutron cLi 

[Yahoo-eng-team] [Bug 1831613] [NEW] Deletion of Lbaas-listener is successfull even when it is part of Lbaas pool

2019-06-04 Thread varun kumar yadav
Public bug reported:

Description ->Deletion of  loadbalancer   listener  is successfull  even
when  it is attached to Lbaas pool. After deletion of listener  when
user creates a new listener neutron Cli command do not support  addition
of new listener in existing lbaas pool.

User impact of deletion-> loadbalancer stops working if user  able to
delete listener accidentally

Step to reproduce the scenario->

neutron lbaas-loadbalancer-create --name lb-15 public-subnet
neutron lbaas-listener-create --name listener-15-1 --loadbalancer lb-15 
--protocol HTTP --protocol-port 80 --connection-limit 1
neutron lbaas-pool-create --name pool-15 --lb-algorithm  ROUND_ROBIN  
--listener listener-15-1  --protocol HTTP
neutron lbaas-healthmonitor-create --name health-15 --delay 5 --max-retries 4 
--timeout 3 --type PING --pool pool-15
neutron lbaas-listener-delete 

create a listener again and try to add to existing pool no cli support
this operation as well as no Horizon support for the same

Expected output-> Two approach to look for.

1. If deletion of listener is possible then addition of listener should
also be allowed.

2. Another option is if listener is mandatory field for pool creation
then like other field lbaaS listener  deletion  should throw an error.

version of openstack -> stable stein
linux ubuntu -> 18.04


Reason why it is needed:(while creation of listener is mandatory for a pool 
then deletion also should not be allowed without deleting pool).
 root@vmware:~/vio6.0# neutron lbaas-pool-create --name lb-pool2 --lb-algorithm 
ROUND_ROBIN --protocol HTTP --insecure
neutron CLI is deprecated and will be removed in the future. Use openstack CLI 
instead.
/usr/local/lib/python2.7/dist-packages/urllib3/connectionpool.py:857: 
InsecureRequestWarning: Unverified HTTPS request is being made. Adding 
certificate verification is strongly advised. See: 
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#ssl-warnings
  InsecureRequestWarning)
/usr/local/lib/python2.7/dist-packages/urllib3/connectionpool.py:857: 
InsecureRequestWarning: Unverified HTTPS request is being made. Adding 
certificate verification is strongly advised. See: 
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#ssl-warnings
  InsecureRequestWarning)
At least one of --listener or --loadbalancer must be specified.

** Affects: neutron
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1831613

Title:
  Deletion of Lbaas-listener is successfull  even when it is part of
  Lbaas pool

Status in neutron:
  New

Bug description:
  Description ->Deletion of  loadbalancer   listener  is successfull
  even when  it is attached to Lbaas pool. After deletion of listener
  when user creates a new listener neutron Cli command do not support
  addition of new listener in existing lbaas pool.

  User impact of deletion-> loadbalancer stops working if user  able to
  delete listener accidentally

  Step to reproduce the scenario->

  neutron lbaas-loadbalancer-create --name lb-15 public-subnet
  neutron lbaas-listener-create --name listener-15-1 --loadbalancer lb-15 
--protocol HTTP --protocol-port 80 --connection-limit 1
  neutron lbaas-pool-create --name pool-15 --lb-algorithm  ROUND_ROBIN  
--listener listener-15-1  --protocol HTTP
  neutron lbaas-healthmonitor-create --name health-15 --delay 5 --max-retries 4 
--timeout 3 --type PING --pool pool-15
  neutron lbaas-listener-delete 

  create a listener again and try to add to existing pool no cli support
  this operation as well as no Horizon support for the same

  Expected output-> Two approach to look for.

  1. If deletion of listener is possible then addition of listener
  should also be allowed.

  2. Another option is if listener is mandatory field for pool creation
  then like other field lbaaS listener  deletion  should throw an error.

  version of openstack -> stable stein
  linux ubuntu -> 18.04


  
  Reason why it is needed:(while creation of listener is mandatory for a pool 
then deletion also should not be allowed without deleting pool).
   root@vmware:~/vio6.0# neutron lbaas-pool-create --name lb-pool2 
--lb-algorithm ROUND_ROBIN --protocol HTTP --insecure
  neutron CLI is deprecated and will be removed in the future. Use openstack 
CLI instead.
  /usr/local/lib/python2.7/dist-packages/urllib3/connectionpool.py:857: 
InsecureRequestWarning: Unverified HTTPS request is being made. Adding 
certificate verification is strongly advised. See: 
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#ssl-warnings
InsecureRequestWarning)
  /usr/local/lib/python2.7/dist-packages/urllib3/connectionpool.py:857: 
InsecureRequestWarning: Unverified HTTPS request is being made. Adding 
certificate verification is strongly advised. See: 
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#ssl-warnings

[Yahoo-eng-team] [Bug 1318550] [NEW] vpnaas:Aether-Vpn_agent is not able to handle two ipsec-site connection creation request simultaneously.

2014-05-12 Thread varun kumar yadav
Public bug reported:


neutron net-create  ext-net1 --router:external=True
neutron subnet-create  --allocation-pool start=192.142.0.60,end=192.142.0.100 
--gateway 192.142.0.1 ext-net1 192.142.0.0/16 --enable_dhcp=False

step 1=
neutron net-create net1
neutron subnet-create net1 10.10.1.0/24 --name sub1
neutron router-create r1
neutron router-interface-add r1 sub1
neutron router-gateway-set r1 ext-net1

neutron net-create net2
neutron subnet-create net2 10.10.2.0/24 --name sub2
neutron router-create r2
neutron router-interface-add r2 sub2
neutron router-gateway-set r2 ext-net1


neutron vpn-ikepolicy-create ikepolicy1
neutron vpn-ipsecpolicy-create ipsecpolicy1
neutron vpn-service-create --name myvpn1 --description My vpn service r1 sub1
neutron ipsec-site-connection-create --name vpnconnection1 --vpnservice-id 
myvpn1 --ikepolicy-id ikepolicy1 --ipsecpolicy-id ipsecpolicy1 --peer-address 
192.142.0.61 --peer-id 192.142.0.61 --peer-cidr 10.10.2.0/24 --psk secret


neutron vpn-ikepolicy-create ikepolicy2
neutron vpn-ipsecpolicy-create ipsecpolicy2
neutron vpn-service-create --name myvpn2 --description My vpn service r2 sub2

neutron ipsec-site-connection-create --name vpnconnection2 --vpnservice-
id myvpn2 --ikepolicy-id ikepolicy2 --ipsecpolicy-id ipsecpolicy2
--peer-address 192.142.0.60 --peer-id 192.142.0.60 --peer-cidr
10.10.1.0/24 --psk secret


create  one more network on site1  net3  with subnet 5.5.5.0/24 sub3
create  a network on site2 net4 with subnet 8.8.8.0/24 sub4

create a  service objects   myvpn3  with  r1 and sub3
create a service  objects  myvpn4 with r2 and sub4


create a ipsecsite connection 

 neutron ipsec-site-connection-create --name vpnconnection3
--vpnservice-id myvpn3 --ikepolicy-id ikepolicy1 --ipsecpolicy-id
ipsecpolicy1 --peer-address 192.142.0.61 --peer-id 192.142.0.61 --peer-
cidr 5.5.5.0/24 --psk secret


neutron ipsec-site-connection-create --name vpnconnection4  --vpnservice-id 
myvpn2 --ikepolicy-id ikepolicy2 --ipsecpolicy-id ipsecpolicy2 --peer-address 
192.142.0.60 --peer-id 192.142.0.60 --peer-cidr 8.8.8.0/24 --psk secret

ipsecsite  connection with vpnconnection3 and  vpnconnection4  always
goes into pending create state.

basically i am trying to bind  two vpn service  objects  with one
routerid

** Affects: neutron
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1318550

Title:
  vpnaas:Aether-Vpn_agent is not able to handle two ipsec-site
  connection creation request simultaneously.

Status in OpenStack Neutron (virtual network service):
  New

Bug description:
  
  neutron net-create  ext-net1 --router:external=True
  neutron subnet-create  --allocation-pool start=192.142.0.60,end=192.142.0.100 
--gateway 192.142.0.1 ext-net1 192.142.0.0/16 --enable_dhcp=False

  step 1=
  neutron net-create net1
  neutron subnet-create net1 10.10.1.0/24 --name sub1
  neutron router-create r1
  neutron router-interface-add r1 sub1
  neutron router-gateway-set r1 ext-net1

  neutron net-create net2
  neutron subnet-create net2 10.10.2.0/24 --name sub2
  neutron router-create r2
  neutron router-interface-add r2 sub2
  neutron router-gateway-set r2 ext-net1

  
  neutron vpn-ikepolicy-create ikepolicy1
  neutron vpn-ipsecpolicy-create ipsecpolicy1
  neutron vpn-service-create --name myvpn1 --description My vpn service r1 
sub1
  neutron ipsec-site-connection-create --name vpnconnection1 --vpnservice-id 
myvpn1 --ikepolicy-id ikepolicy1 --ipsecpolicy-id ipsecpolicy1 --peer-address 
192.142.0.61 --peer-id 192.142.0.61 --peer-cidr 10.10.2.0/24 --psk secret


  neutron vpn-ikepolicy-create ikepolicy2
  neutron vpn-ipsecpolicy-create ipsecpolicy2
  neutron vpn-service-create --name myvpn2 --description My vpn service r2 
sub2

  neutron ipsec-site-connection-create --name vpnconnection2
  --vpnservice-id myvpn2 --ikepolicy-id ikepolicy2 --ipsecpolicy-id
  ipsecpolicy2 --peer-address 192.142.0.60 --peer-id 192.142.0.60
  --peer-cidr 10.10.1.0/24 --psk secret

  
  create  one more network on site1  net3  with subnet 5.5.5.0/24 sub3
  create  a network on site2 net4 with subnet 8.8.8.0/24 sub4

  create a  service objects   myvpn3  with  r1 and sub3
  create a service  objects  myvpn4 with r2 and sub4

  
  create a ipsecsite connection 

   neutron ipsec-site-connection-create --name vpnconnection3
  --vpnservice-id myvpn3 --ikepolicy-id ikepolicy1 --ipsecpolicy-id
  ipsecpolicy1 --peer-address 192.142.0.61 --peer-id 192.142.0.61
  --peer-cidr 5.5.5.0/24 --psk secret

  
  neutron ipsec-site-connection-create --name vpnconnection4  --vpnservice-id 
myvpn2 --ikepolicy-id ikepolicy2 --ipsecpolicy-id ipsecpolicy2 --peer-address 
192.142.0.60 --peer-id 192.142.0.60 --peer-cidr 8.8.8.0/24 --psk secret

  ipsecsite  connection with vpnconnection3 and  vpnconnection4  always
  goes into pending create state.

  basically i am trying to 

[Yahoo-eng-team] [Bug 1318600] [NEW] VPNasS- Vpn service object cannot be updated with multiple subnets

2014-05-12 Thread varun kumar yadav
Public bug reported:


neutron net-create  ext-net1 --router:external=True
neutron subnet-create  --allocation-pool start=192.142.0.60,end=192.142.0.100 
--gateway 192.142.0.1 ext-net1 192.142.0.0/16 --enable_dhcp=False


neutron net-create net1
neutron subnet-create net1 10.10.1.0/24 --name sub1
neutron router-create r1
neutron router-interface-add r1 sub1
neutron router-gateway-set r1 ext-net1

neutron net-create net2
neutron subnet-create net2 10.10.2.0/24 --name sub2
neutron router-create r2
neutron router-interface-add r2 sub2
neutron router-gateway-set r2 ext-net1


neutron vpn-ikepolicy-create ikepolicy1
neutron vpn-ipsecpolicy-create ipsecpolicy1
neutron vpn-service-create --name myvpn1 --description My vpn service r1 sub1


neutron vpn-ikepolicy-create ikepolicy2
neutron vpn-ipsecpolicy-create ipsecpolicy2
neutron vpn-service-create --name myvpn2 --description My vpn service r2 sub2

neutron ipsec-site-connection-create --name vpnconnection1 --vpnservice-
id myvpn1 --ikepolicy-id ikepolicy1 --ipsecpolicy-id ipsecpolicy1
--peer-address 192.142.0.61 --peer-id 192.142.0.61 --peer-cidr
10.10.2.0/24 --psk secret


neutron ipsec-site-connection-create --name vpnconnection2 --vpnservice-id 
myvpn2 --ikepolicy-id ikepolicy2 --ipsecpolicy-id ipsecpolicy2 --peer-address 
192.142.0.60 --peer-id 192.142.0.60 --peer-cidr 10.10.1.0/24 --psk secret


create a subnet  in the network net1 and net2 respectively.
neutron vpn-service-update  myvpn1  new-subnet-id 1
neutron vpn-service-update  myvpn2 new-subnet-id 2

** Affects: neutron
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1318600

Title:
  VPNasS- Vpn service object cannot be updated  with multiple subnets

Status in OpenStack Neutron (virtual network service):
  New

Bug description:
  
  neutron net-create  ext-net1 --router:external=True
  neutron subnet-create  --allocation-pool start=192.142.0.60,end=192.142.0.100 
--gateway 192.142.0.1 ext-net1 192.142.0.0/16 --enable_dhcp=False

  
  neutron net-create net1
  neutron subnet-create net1 10.10.1.0/24 --name sub1
  neutron router-create r1
  neutron router-interface-add r1 sub1
  neutron router-gateway-set r1 ext-net1

  neutron net-create net2
  neutron subnet-create net2 10.10.2.0/24 --name sub2
  neutron router-create r2
  neutron router-interface-add r2 sub2
  neutron router-gateway-set r2 ext-net1

  
  neutron vpn-ikepolicy-create ikepolicy1
  neutron vpn-ipsecpolicy-create ipsecpolicy1
  neutron vpn-service-create --name myvpn1 --description My vpn service r1 
sub1


  
  neutron vpn-ikepolicy-create ikepolicy2
  neutron vpn-ipsecpolicy-create ipsecpolicy2
  neutron vpn-service-create --name myvpn2 --description My vpn service r2 
sub2

  neutron ipsec-site-connection-create --name vpnconnection1
  --vpnservice-id myvpn1 --ikepolicy-id ikepolicy1 --ipsecpolicy-id
  ipsecpolicy1 --peer-address 192.142.0.61 --peer-id 192.142.0.61
  --peer-cidr 10.10.2.0/24 --psk secret

  
  neutron ipsec-site-connection-create --name vpnconnection2 --vpnservice-id 
myvpn2 --ikepolicy-id ikepolicy2 --ipsecpolicy-id ipsecpolicy2 --peer-address 
192.142.0.60 --peer-id 192.142.0.60 --peer-cidr 10.10.1.0/24 --psk secret

  
  create a subnet  in the network net1 and net2 respectively.
  neutron vpn-service-update  myvpn1  new-subnet-id 1
  neutron vpn-service-update  myvpn2 new-subnet-id 2

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1318600/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp