Description of problem: The following test fails in composable (networker) deployment after performing OSP 12 update: neutron.tests.tempest.api.test_trunk_negative.TrunkTestJSON.test_create_subport_invalid_inherit_network_segmentation_type Version-Release number of selected component (if applicable): Latest OSP 12 How reproducible: 100% Steps to Reproduce: 1. Deploy OSP 12 (previous minor release to latest) 2. Perform update to latest minor 3. Run neutron tests Actual results: Traceback (most recent call last): File "/usr/lib/python2.7/site-packages/neutron/tests/tempest/api/test_trunk_negative.py", line 114, in test_create_subport_invalid_inherit_network_segmentation_type 'segmentation_id': -1}]) File "/usr/lib/python2.7/site-packages/testtools/testcase.py", line 422, in assertRaises self.assertThat(our_callable, matcher) File "/usr/lib/python2.7/site-packages/testtools/testcase.py", line 435, in assertThat raise mismatch_error testtools.matchers._impl.MismatchError: <bound method NetworkClientJSON.add_subports of <neutron.tests.tempest.services.network.json.network_client.NetworkClientJSON object at 0x63f27d0>> returned {u'status': u'DOWN', u'created_at': u'2017-12-14T23:53:57Z', u'name': u'', u'admin_state_up': True, u'tenant_id': u'17fc2519823644b48e513406a97ee697', u'sub_ports': [{u'port_id': u'21cf29d1-2c7b-487e-bf06-6ca9f016580e', u'segmentation_type': u'vlan', u'segmentation_id': 1033}], u'tags': [], u'updated_at': u'2017-12-14T23:54:00Z', u'revision_number': 1, u'project_id': u'17fc2519823644b48e513406a97ee697', u'port_id': u'6f7f83ef-4e95-416c-b9c9-d5399548ccd6', u'id': u'43f787f8-570f-48b8-beea-568f2552366b', u'description': u''} Expected results: Test passed successfully
The reason test is failing is that network of is parent trunk port is actually vlan, which is supported segmentation type. So when inherit is passed to api, it's expected to get vlan instead of -1.
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2018:0617