Bug 1293647

Summary: os-endpoint-type parameter is broken for OSP 6 neutron client
Product: Red Hat OpenStack Reporter: Matt Flusche <mflusche>
Component: python-neutronclientAssignee: Bernard Cafarelli <bcafarel>
Status: CLOSED ERRATA QA Contact: Alexander Stafeyev <astafeye>
Severity: medium Docs Contact:
Priority: low    
Version: 6.0 (Juno)CC: amuller, bcafarel, chrisw, jruzicka, nyechiel, srevivo
Target Milestone: ---Keywords: Triaged, ZStream
Target Release: 6.0 (Juno)   
Hardware: x86_64   
OS: Linux   
Whiteboard:
Fixed In Version: python-neutronclient-2.3.9-3.el7ost Doc Type: Bug Fix
Doc Text:
Previously, an incompatibility with keystoneclient v3 caused some parameters to be ignored. Now, the keyword argument `endpoint_type` has been replaced with `interface`, resolving this issue.
Story Points: ---
Clone Of: Environment:
Last Closed: 2017-06-14 15:43:28 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:

Description Matt Flusche 2015-12-22 14:38:02 UTC
Description of problem:

OSP 6 neutron client seems to be impacted by this bug.  I would like to get this reviewed for backporting to address.

https://review.openstack.org/#/c/121047/


Version-Release number of selected component (if applicable):

python-neutronclient-2.3.9-1.el7ost.noarch

How reproducible:
100%


Steps to Reproduce:
1.neutron --os-endpoint-type internalURL --debug net-list (where internalURL is different from publicURL)
2.
3.

Actual results:
uses publicURL for neutron client request

Expected results:
should use internalURL for neutron client request

Additional info:
I've tested this change and it addresses the issue in OSP 6

Comment 1 Assaf Muller 2016-06-07 23:11:05 UTC
Confirmed to exist in OSP 7+ but missing in OSP 6, simple backport request.

Comment 5 errata-xmlrpc 2017-06-14 15:43:28 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2017:1448