This is an automated email from the ASF dual-hosted git repository.

dahn pushed a commit to branch 4.20
in repository https://gitbox.apache.org/repos/asf/cloudstack.git


The following commit(s) were added to refs/heads/4.20 by this push:
     new b5e9178078f UI: fix issues when deploy VNF applicance on network with 
SG (#12436)
b5e9178078f is described below

commit b5e9178078f0efac75fdb3eb5b07459228da471d
Author: Wei Zhou <[email protected]>
AuthorDate: Thu Jan 22 10:56:03 2026 +0100

    UI: fix issues when deploy VNF applicance on network with SG (#12436)
---
 ui/public/locales/en.json                   | 2 +-
 ui/src/config/section/network.js            | 5 ++++-
 ui/src/views/compute/DeployVnfAppliance.vue | 2 +-
 ui/src/views/network/VnfAppliancesTab.vue   | 2 +-
 4 files changed, 7 insertions(+), 4 deletions(-)

diff --git a/ui/public/locales/en.json b/ui/public/locales/en.json
index aaf499d2f95..64437a4d07c 100644
--- a/ui/public/locales/en.json
+++ b/ui/public/locales/en.json
@@ -2527,7 +2527,7 @@
 "label.vnf.app.action.reinstall": "Reinstall VNF Appliance",
 "label.vnf.cidr.list": "CIDR from which access to the VNF appliance's 
Management interface should be allowed from",
 "label.vnf.cidr.list.tooltip": "the CIDR list to forward traffic from to the 
VNF management interface. Multiple entries must be separated by a single comma 
character (,). The default value is 0.0.0.0/0.",
-"label.vnf.configure.management": "Configure Firewall and Port Forwarding 
rules for VNF's management interfaces",
+"label.vnf.configure.management": "Configure network rules for VNF's 
management interfaces",
 "label.vnf.configure.management.tooltip": "True by default, security group or 
network rules (source nat and firewall rules) will be configured for VNF 
management interfaces. False otherwise. Learn what rules are configured at 
http://docs.cloudstack.apache.org/en/latest/adminguide/networking/vnf_templates_appliances.html#deploying-vnf-appliances";,
 "label.vnf.detail.add": "Add VNF detail",
 "label.vnf.detail.remove": "Remove VNF detail",
diff --git a/ui/src/config/section/network.js b/ui/src/config/section/network.js
index 30aae3a8deb..fbc044ff500 100644
--- a/ui/src/config/section/network.js
+++ b/ui/src/config/section/network.js
@@ -356,7 +356,10 @@ export default {
       permission: ['listVnfAppliances'],
       resourceType: 'UserVm',
       params: () => {
-        return { details: 'servoff,tmpl,nics', isvnf: true }
+        return {
+          details: 
'group,nics,secgrp,tmpl,servoff,diskoff,iso,volume,affgrp,backoff,vnfnics',
+          isvnf: true
+        }
       },
       columns: () => {
         const fields = ['name', 'state', 'ipaddress']
diff --git a/ui/src/views/compute/DeployVnfAppliance.vue 
b/ui/src/views/compute/DeployVnfAppliance.vue
index 1117413d710..fec1139ab9b 100644
--- a/ui/src/views/compute/DeployVnfAppliance.vue
+++ b/ui/src/views/compute/DeployVnfAppliance.vue
@@ -1305,7 +1305,7 @@ export default {
       for (const deviceId of managementDeviceIds) {
         if (this.vnfNicNetworks && this.vnfNicNetworks[deviceId] &&
           ((this.vnfNicNetworks[deviceId].type === 'Isolated' && 
this.vnfNicNetworks[deviceId].vpcid === undefined) ||
-            (this.vnfNicNetworks[deviceId].type === 'Shared' && 
this.zone.securitygroupsenabled))) {
+            (this.vnfNicNetworks[deviceId].type === 'Shared' && 
this.vnfNicNetworks[deviceId].service.filter(svc => svc.name === 
'SecurityGroupProvider')))) {
           return true
         }
       }
diff --git a/ui/src/views/network/VnfAppliancesTab.vue 
b/ui/src/views/network/VnfAppliancesTab.vue
index 0db85323d15..139516187c4 100644
--- a/ui/src/views/network/VnfAppliancesTab.vue
+++ b/ui/src/views/network/VnfAppliancesTab.vue
@@ -120,7 +120,7 @@ export default {
   methods: {
     fetchData () {
       var params = {
-        details: 'servoff,tmpl,nics',
+        details: 
'group,nics,secgrp,tmpl,servoff,diskoff,iso,volume,affgrp,backoff,vnfnics',
         isVnf: true,
         listAll: true
       }

Reply via email to