RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 2027490 - firewalld upstream test rhbz1928860.at fails with "INVALID_INTERFACE: ovs-interface-port"
Summary: firewalld upstream test rhbz1928860.at fails with "INVALID_INTERFACE: ovs-int...
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 8
Classification: Red Hat
Component: NetworkManager
Version: 8.6
Hardware: Unspecified
OS: Unspecified
high
medium
Target Milestone: rc
: ---
Assignee: Beniamino Galvani
QA Contact: Matej Berezny
URL:
Whiteboard:
Depends On: 2026024
Blocks:
TreeView+ depends on / blocked
 
Reported: 2021-11-29 19:29 UTC by Eric Garver
Modified: 2022-05-10 15:32 UTC (History)
11 users (show)

Fixed In Version: NetworkManager-1.36.0-0.3.el8
Doc Type: No Doc Update
Doc Text:
Clone Of: 2026024
Environment:
Last Closed: 2022-05-10 14:54:52 UTC
Type: Bug
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Issue Tracker RHELPLAN-104198 0 None None None 2021-11-29 19:50:37 UTC
Red Hat Product Errata RHEA-2022:1985 0 None None None 2022-05-10 14:55:07 UTC
freedesktop.org Gitlab NetworkManager NetworkManager-ci merge_requests 899 0 None opened ovs: added @ovs_set_firewalld_zone test for +=1.36 2021-12-20 15:16:31 UTC
freedesktop.org Gitlab NetworkManager NetworkManager merge_requests 1042 0 None merged device: fix update of the ip-iface property 2021-12-16 12:15:21 UTC

Comment 2 Fernando F. Mancera 2021-12-16 18:04:40 UTC
Tested with: NetworkManager-1.36.0-0.3.el9, works for me :-)

Comment 3 Eric Garver 2021-12-16 20:12:09 UTC
(In reply to Fernando F. Mancera from comment #2)
> Tested with: NetworkManager-1.36.0-0.3.el9, works for me :-)

Did you also run the firewalld CI that detected this bug?

Comment 4 Fernando F. Mancera 2021-12-17 08:32:19 UTC
(In reply to Eric Garver from comment #3)
> (In reply to Fernando F. Mancera from comment #2)
> > Tested with: NetworkManager-1.36.0-0.3.el9, works for me :-)
> 
> Did you also run the firewalld CI that detected this bug?

Hi Eric, no I didn't. What I did is to configure ovs-bridge, ovs-interface, ovs-port and then run "firewall-cmd -q --reload". Basically the steps from: https://github.com/firewalld/firewalld/blob/master/src/tests/integration/rhbz1928860.at

Do you think I should run the firewalld CI too? If so, let me know and I will do it :-)

Thanks!

Comment 5 Eric Garver 2021-12-17 13:31:27 UTC
(In reply to Fernando F. Mancera from comment #4)
> (In reply to Eric Garver from comment #3)
> > (In reply to Fernando F. Mancera from comment #2)
> > > Tested with: NetworkManager-1.36.0-0.3.el9, works for me :-)
> > 
> > Did you also run the firewalld CI that detected this bug?
> 
> Hi Eric, no I didn't. What I did is to configure ovs-bridge, ovs-interface,
> ovs-port and then run "firewall-cmd -q --reload". Basically the steps from:
> https://github.com/firewalld/firewalld/blob/master/src/tests/integration/
> rhbz1928860.at
> 
> Do you think I should run the firewalld CI too? If so, let me know and I
> will do it :-)

Yes please. Pinging @todoleza.

Comment 6 Tomas Dolezal 2021-12-18 00:45:39 UTC
Hello, I've just checked that on x86_64 with
NetworkManager-1.36.0-0.3.el8.x86_64
firewalld-0.9.3-11.el8.noarch

both cases pass. No need to rerun the CI now.

## --------------------------- ##
## firewalld 0.9.3 test suite. ##
## --------------------------- ##

NetworkManager (nftables)

  1: NM overrides interface on reload                ok
  2: reload don't consider non IP capable interfaces ok

NetworkManager (iptables)

  3: NM overrides interface on reload                ok
  4: reload don't consider non IP capable interfaces ok

## ------------- ##
## Test results. ##
## ------------- ##

All 4 tests were successful.

Comment 9 Matej Berezny 2021-12-20 15:16:31 UTC
added test case to NM-ci as well.

Comment 13 errata-xmlrpc 2022-05-10 14:54:52 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (NetworkManager bug fix and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHEA-2022:1985


Note You need to log in before you can comment on or make changes to this bug.