Bug 2033584

Summary: Update subnet with same gateway_ip as is already used should be allowed
Product: Red Hat OpenStack Reporter: Slawek Kaplonski <skaplons>
Component: openstack-neutronAssignee: Slawek Kaplonski <skaplons>
Status: CLOSED ERRATA QA Contact: Bharath M V <bmv>
Severity: high Docs Contact:
Priority: urgent    
Version: 16.1 (Train)CC: chrisw, ralonsoh, scohen, sputhenp
Target Milestone: ---Keywords: Triaged
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: openstack-neutron-15.2.1-1.20211222153343.40d217c.el8ost Doc Type: No Doc Update
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-03-24 10:56:13 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Slawek Kaplonski 2021-12-17 11:08:27 UTC
During subnet update neutron validates, if gateway_ip is passed in the PUT request and if it is, validates if old gateway_ip isn't already allocated to some router's port. If it is, Neutron will forbid to update subnet.
That's totally valid behavior but in case when "new" gateway_ip is actually the same as old one Neutron should not raise exception and allow to update subnet.
It may be useful for example for some automation tools, like Heat and Tripleo which will not need to have additional logic to check if gateway_ip is actually changed or not and if it should be eventually cleaned manually.

This came from the bugzilla https://bugzilla.redhat.com/show_bug.cgi?id=2032295

Comment 9 errata-xmlrpc 2022-03-24 10:56:13 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: Red Hat OpenStack Platform 16.1 (openstack-neutron) security update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2022:0990