This is an automated email from the ASF dual-hosted git repository.
dahn pushed a commit to branch 4.20
in repository https://gitbox.apache.org/repos/asf/cloudstack.git
The following commit(s) were added to refs/heads/4.20 by this push:
new b5e9178078f UI: fix issues when deploy VNF applicance on network with
SG (#12436)
b5e9178078f is described below
commit b5e9178078f0efac75fdb3eb5b07459228da471d
Author: Wei Zhou <[email protected]>
AuthorDate: Thu Jan 22 10:56:03 2026 +0100
UI: fix issues when deploy VNF applicance on network with SG (#12436)
---
ui/public/locales/en.json | 2 +-
ui/src/config/section/network.js | 5 ++++-
ui/src/views/compute/DeployVnfAppliance.vue | 2 +-
ui/src/views/network/VnfAppliancesTab.vue | 2 +-
4 files changed, 7 insertions(+), 4 deletions(-)
diff --git a/ui/public/locales/en.json b/ui/public/locales/en.json
index aaf499d2f95..64437a4d07c 100644
--- a/ui/public/locales/en.json
+++ b/ui/public/locales/en.json
@@ -2527,7 +2527,7 @@
"label.vnf.app.action.reinstall": "Reinstall VNF Appliance",
"label.vnf.cidr.list": "CIDR from which access to the VNF appliance's
Management interface should be allowed from",
"label.vnf.cidr.list.tooltip": "the CIDR list to forward traffic from to the
VNF management interface. Multiple entries must be separated by a single comma
character (,). The default value is 0.0.0.0/0.",
-"label.vnf.configure.management": "Configure Firewall and Port Forwarding
rules for VNF's management interfaces",
+"label.vnf.configure.management": "Configure network rules for VNF's
management interfaces",
"label.vnf.configure.management.tooltip": "True by default, security group or
network rules (source nat and firewall rules) will be configured for VNF
management interfaces. False otherwise. Learn what rules are configured at
http://docs.cloudstack.apache.org/en/latest/adminguide/networking/vnf_templates_appliances.html#deploying-vnf-appliances",
"label.vnf.detail.add": "Add VNF detail",
"label.vnf.detail.remove": "Remove VNF detail",
diff --git a/ui/src/config/section/network.js b/ui/src/config/section/network.js
index 30aae3a8deb..fbc044ff500 100644
--- a/ui/src/config/section/network.js
+++ b/ui/src/config/section/network.js
@@ -356,7 +356,10 @@ export default {
permission: ['listVnfAppliances'],
resourceType: 'UserVm',
params: () => {
- return { details: 'servoff,tmpl,nics', isvnf: true }
+ return {
+ details:
'group,nics,secgrp,tmpl,servoff,diskoff,iso,volume,affgrp,backoff,vnfnics',
+ isvnf: true
+ }
},
columns: () => {
const fields = ['name', 'state', 'ipaddress']
diff --git a/ui/src/views/compute/DeployVnfAppliance.vue
b/ui/src/views/compute/DeployVnfAppliance.vue
index 1117413d710..fec1139ab9b 100644
--- a/ui/src/views/compute/DeployVnfAppliance.vue
+++ b/ui/src/views/compute/DeployVnfAppliance.vue
@@ -1305,7 +1305,7 @@ export default {
for (const deviceId of managementDeviceIds) {
if (this.vnfNicNetworks && this.vnfNicNetworks[deviceId] &&
((this.vnfNicNetworks[deviceId].type === 'Isolated' &&
this.vnfNicNetworks[deviceId].vpcid === undefined) ||
- (this.vnfNicNetworks[deviceId].type === 'Shared' &&
this.zone.securitygroupsenabled))) {
+ (this.vnfNicNetworks[deviceId].type === 'Shared' &&
this.vnfNicNetworks[deviceId].service.filter(svc => svc.name ===
'SecurityGroupProvider')))) {
return true
}
}
diff --git a/ui/src/views/network/VnfAppliancesTab.vue
b/ui/src/views/network/VnfAppliancesTab.vue
index 0db85323d15..139516187c4 100644
--- a/ui/src/views/network/VnfAppliancesTab.vue
+++ b/ui/src/views/network/VnfAppliancesTab.vue
@@ -120,7 +120,7 @@ export default {
methods: {
fetchData () {
var params = {
- details: 'servoff,tmpl,nics',
+ details:
'group,nics,secgrp,tmpl,servoff,diskoff,iso,volume,affgrp,backoff,vnfnics',
isVnf: true,
listAll: true
}