Bug 2027490

Summary: firewalld upstream test rhbz1928860.at fails with "INVALID_INTERFACE: ovs-interface-port"
Product: Red Hat Enterprise Linux 8 Reporter: Eric Garver <egarver>
Component: NetworkManagerAssignee: Beniamino Galvani <bgalvani>
Status: CLOSED ERRATA QA Contact: Matej Berezny <mberezny>
Severity: medium Docs Contact:
Priority: high    
Version: 8.6CC: bgalvani, ferferna, fge, lrintel, qe-baseos-daemons, rkhan, sukulkar, thaller, till, todoleza, vbenes
Target Milestone: rcKeywords: Triaged
Target Release: ---Flags: pm-rhel: mirror+
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: NetworkManager-1.36.0-0.3.el8 Doc Type: No Doc Update
Doc Text:
Story Points: ---
Clone Of: 2026024 Environment:
Last Closed: 2022-05-10 14:54:52 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2026024    
Bug Blocks:    

Comment 2 Fernando F. Mancera 2021-12-16 18:04:40 UTC
Tested with: NetworkManager-1.36.0-0.3.el9, works for me :-)

Comment 3 Eric Garver 2021-12-16 20:12:09 UTC
(In reply to Fernando F. Mancera from comment #2)
> Tested with: NetworkManager-1.36.0-0.3.el9, works for me :-)

Did you also run the firewalld CI that detected this bug?

Comment 4 Fernando F. Mancera 2021-12-17 08:32:19 UTC
(In reply to Eric Garver from comment #3)
> (In reply to Fernando F. Mancera from comment #2)
> > Tested with: NetworkManager-1.36.0-0.3.el9, works for me :-)
> 
> Did you also run the firewalld CI that detected this bug?

Hi Eric, no I didn't. What I did is to configure ovs-bridge, ovs-interface, ovs-port and then run "firewall-cmd -q --reload". Basically the steps from: https://github.com/firewalld/firewalld/blob/master/src/tests/integration/rhbz1928860.at

Do you think I should run the firewalld CI too? If so, let me know and I will do it :-)

Thanks!

Comment 5 Eric Garver 2021-12-17 13:31:27 UTC
(In reply to Fernando F. Mancera from comment #4)
> (In reply to Eric Garver from comment #3)
> > (In reply to Fernando F. Mancera from comment #2)
> > > Tested with: NetworkManager-1.36.0-0.3.el9, works for me :-)
> > 
> > Did you also run the firewalld CI that detected this bug?
> 
> Hi Eric, no I didn't. What I did is to configure ovs-bridge, ovs-interface,
> ovs-port and then run "firewall-cmd -q --reload". Basically the steps from:
> https://github.com/firewalld/firewalld/blob/master/src/tests/integration/
> rhbz1928860.at
> 
> Do you think I should run the firewalld CI too? If so, let me know and I
> will do it :-)

Yes please. Pinging @todoleza.

Comment 6 Tomas Dolezal 2021-12-18 00:45:39 UTC
Hello, I've just checked that on x86_64 with
NetworkManager-1.36.0-0.3.el8.x86_64
firewalld-0.9.3-11.el8.noarch

both cases pass. No need to rerun the CI now.

## --------------------------- ##
## firewalld 0.9.3 test suite. ##
## --------------------------- ##

NetworkManager (nftables)

  1: NM overrides interface on reload                ok
  2: reload don't consider non IP capable interfaces ok

NetworkManager (iptables)

  3: NM overrides interface on reload                ok
  4: reload don't consider non IP capable interfaces ok

## ------------- ##
## Test results. ##
## ------------- ##

All 4 tests were successful.

Comment 9 Matej Berezny 2021-12-20 15:16:31 UTC
added test case to NM-ci as well.

Comment 13 errata-xmlrpc 2022-05-10 14:54:52 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (NetworkManager bug fix and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHEA-2022:1985