neutron allows security group rules with invalid cidrs
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
neutron |
Fix Released
|
Medium
|
Marios Andreou | ||
Havana |
Fix Released
|
Undecided
|
Unassigned | ||
Icehouse |
New
|
Undecided
|
Unassigned |
Bug Description
Neutron is allowing security group rules having invalid CIDR values in the "remote_ip_prefix" parameter.
Two examples illustrate the problem:
$ neutron security-
Created a new security_
+------
| Field | Value |
+------
| direction | ingress |
| ethertype | IPv4 |
| id | bdb49ccd-
| port_range_max | 28069 |
| port_range_min | 28060 |
| protocol | tcp |
| remote_group_id | |
| remote_ip_prefix | badprefix |
| security_group_id | e89783db-
| tenant_id | e030326f884445a
+------
$ neutron security-
Created a new security_
+------
| Field | Value |
+------
| direction | ingress |
| ethertype | IPv4 |
| id | 72a7c232-
| port_range_max | 28069 |
| port_range_min | 28060 |
| protocol | tcp |
| remote_group_id | |
| remote_ip_prefix | 10.11.12.0/33 |
| security_group_id | e89783db-
| tenant_id | e030326f884445a
+------
If I were to use the "nova secgroup-rule-add" command instead of the neutron commands, the nova api server returns errors to the python-novaclient for both cases.
description: | updated |
Changed in neutron: | |
status: | New → Confirmed |
assignee: | nobody → Marios Andreou (marios-b) |
Changed in neutron: | |
importance: | Undecided → Medium |
milestone: | none → icehouse-2 |
tags: | added: sg-fw |
Changed in neutron: | |
milestone: | icehouse-2 → icehouse-3 |
Changed in neutron: | |
milestone: | icehouse-3 → icehouse-rc1 |
Changed in neutron: | |
milestone: | icehouse-rc1 → none |
Changed in neutron: | |
milestone: | none → juno-1 |
Changed in neutron: | |
status: | Fix Committed → Fix Released |
Changed in neutron: | |
milestone: | juno-1 → 2014.2 |
Fix proposed to branch: master /review. openstack. org/59212
Review: https:/