[NETVIRT-1061] dual stack / Delete IPv6 Subnet And Check IPv4 datapath / ipv4 does not work after Created: 09/Jan/18 Updated: 04/Oct/18 Resolved: 04/Oct/18 |
|
| Status: | Resolved |
| Project: | netvirt |
| Component/s: | None |
| Affects Version/s: | None |
| Fix Version/s: | None |
| Type: | Bug | Priority: | Medium |
| Reporter: | Philippe Guibert | Assignee: | Unassigned |
| Resolution: | Cannot Reproduce | Votes: | 0 |
| Labels: | None | ||
| Remaining Estimate: | Not Specified | ||
| Time Spent: | Not Specified | ||
| Original Estimate: | Not Specified | ||
| Description |
|
setup create a router with 2 subnets, and one VM that VM is dual stack ( like the router) check that VM is reachable in both ipv4 and ipv6 delete subnet ipv6 from router observation check that ipv4 connectivity is still ok. it fails |
| Comments |
| Comment by Philippe Guibert [ 12/Jan/18 ] |
openstack router create router
openstack network create N1
openstack subnet create --network N1 SUB1 --subnet-range 10.10.10.0/24
openstack router add subnet router SUB1
openstack subnet create --network N1 SUB2 --subnet-range 2001:db8:0:2::0/64 --ip-version 6 --ipv6-ra-mode slaac --ipv6-address-mode slaac
openstack router add subnet router SUB2
openstack network create N2
openstack subnet create --network N2 SUB3 --subnet-range 20.10.10.0/24
openstack router add subnet router SUB3
openstack security group create X
openstack security group rule create X --egress --dst-port 1:65535 --protocol tcp
openstack security group rule create X --egress --dst-port 1:65535 --protocol udp
openstack security group rule create X --egress --protocol icmp
openstack security group rule create X --ethertype IPv6 --egress --dst-port 1:65535 --protocol tcp
openstack security group rule create X --ethertype IPv6 --egress --dst-port 1:65535 --protocol udp
openstack security group rule create X --ethertype IPv6 --egress --protocol icmp
openstack security group rule create X --ingress --dst-port 1:65535 --protocol tcp
openstack security group rule create X --ingress --dst-port 1:65535 --protocol udp
openstack security group rule create X --ingress --protocol icmp
openstack security group rule create X --ethertype IPv6 --ingress --dst-port 1:65535 --protocol tcp
openstack security group rule create X --ethertype IPv6 --ingress --dst-port 1:65535 --protocol udp
openstack security group rule create X --ethertype IPv6 --ingress --protocol icmp
neutron port-create N1 --name=port1 --security-group X
nova boot --image cirros-0.3.4-x86_64-uec --flavor m1.tiny --nic port-id=$(neutron port-list | grep "port1" | awk '{print $2}') VM1
neutron port-create N2 --name=port2 --security-group X
nova boot --image cirros-0.3.4-x86_64-uec --flavor m1.tiny --nic port-id=$(neutron port-list | grep "port2" | awk '{print $2}') VM2
// here, everything works fine. you can connect to VM1 and ping VM2 with IPv4.
openstack router delete subnet router SUB2
// here, IPv4 routed traffic does not work. you can not ping VM2 from VM1 with IPv4.
|
| Comment by Jamo Luhrsen [ 20/Feb/18 ] |
|
do we have an update on this? would love to get these fixed so we can move the dualstack suites in to the gating job |
| Comment by Valentina Krasnobaeva [ 15/Mar/18 ] |
|
Hi Jamo, Yes, here is the patch: https://git.opendaylight.org/gerrit/#/c/69444/ And here are sandbox job runs for OXYGEN and Fluorine: |
| Comment by Jamo Luhrsen [ 16/Mar/18 ] |
|
valentina.krasnobaeva, thanks. I assume the single failure is due to another bug. Do we have a Jira for that? |
| Comment by Valentina Krasnobaeva [ 16/Mar/18 ] |
|
Yes, the failure in Create Multiple L3VPNs is an another bug Here is a corresponding issue: |