.
Finally, see the following blog post for more detail and a timeline of
communications with the vendor:
--
https://medium.com/@ewindisch/seagate-central-nas-vulnerabilities-4b78114c9d0b
Regards,
Eric Windisch
___
Sent through the Full Disclosure
, of course, is that users would not need
to contact the server using bay-show in order to obtain the UUID of their
bay.
Regards,
Eric Windisch
__
OpenStack Development Mailing List (not for usage questions)
Unsubscribe
uniqueness (or as unique as UUID gets, anyway).
Regards,
Eric Windisch
__
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: openstack-dev-requ...@lists.openstack.org?subject:unsubscribe
http
in my free time.
I'll finish to say that I do think it's finally time to consider pulling it
back it. While doing so may not attract contributors, I know being in
stackforge has certainly been a deterrent both potential contributors and
users.
Regards,
Eric Windisch
are believed vulnerable. Users running untrusted
images are encouraged to upgrade.
Discovered by Eric Windisch of the Docker Security Team.
===
[CVE-2015-3631] Volume mounts allow LSM profile escalation
From my experience, making fast moving changes is far easier when code is
split out. Changes occur too slowly when integrated.
I'd be +1 on splitting the code out. I expect you will get more done this
way.
Regards,
Eric Windisch
driver...
7. Need more technical documentation on the driver like [6].
I'm willing to prepare a current driver architecture overview with some
graphics UML charts, and to continue discuss the driver architecture.
Documentation has always been a sore point. +2
--
Regards,
Eric Windisch
ᐧ
conundrums and simplify principle of least privilege.
Regards,
Eric Windisch
__
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: openstack-dev-requ...@lists.openstack.org?subject:unsubscribe
http
, the Docker backend would work with both single docker hosts and
clusters of Docker machines powered by Swarm. It would be nice, however, if
scheduler hints could be passed from Magnum to Swarm.
Regards,
Eric Windisch
and contribute outside of the tent. That's what developers are
being told to do, at any rate. At this point, perhaps that's okay.
Regards,
Eric Windisch
___
OpenStack-operators mailing list
OpenStack-operators@lists.openstack.org
http://lists.openstack.org/cgi
that made this possible!
Regards,
Eric Windisch
__
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: openstack-dev-requ...@lists.openstack.org?subject:unsubscribe
http://lists.openstack.org/cgi-bin/mailman
.
We are releasing Docker 1.3.3 to address this vulnerability. Users are highly
encouraged to upgrade.
Discovered by Eric Windisch of Docker, Inc.
signature.asc
Description: Message signed with OpenPGP using GPGMail
___
Sent through the Full Disclosure
. Users are highly
encouraged to upgrade.
Discovered by Eric Windisch of Docker, Inc.
are breaking
without manually checking Kibana, such as an email.
Regards,
Eric Windisch
___
OpenStack-dev mailing list
OpenStack-dev@lists.openstack.org
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev
Today, we are releasing Docker 1.3.2 in order to address two critical
security issues. This release also includes several bugfixes,
including changes to the insecure-registry option. Below are CVE
descriptions for the vulnerabilities addressed in this release.
Docker 1.3.2 is available
I think for this cycle we really do need to focus on consolidating and
testing the existing driver design and fixing up the biggest
deficiency (1) before we consider moving forward with lots of new
+1
1) Outbound messaging connection re-use - right now every outbound
messaging creates
testing.
Regards,
Eric Windisch
___
OpenStack-dev mailing list
OpenStack-dev@lists.openstack.org
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev
improves, or support in consuming projects and/or
oslo.messaging itself improves. I'd suggest that effort is better spent
there than building new bespoke tests.
Thanks and good luck! :)
Regards,
Eric Windisch
___
OpenStack-dev mailing list
OpenStack-dev
for a static configuration,
making tempest tests much easier to run and generally easier for anyone to
deploy, but it's intended to be an example of hooking into an inventory
service, not necessarily the defacto solution.
--
Regards,
Eric Windisch
___
OpenStack
up testing will be, in my opinion, better for any new
maintainers and users of this driver.
Regards,
Eric Windisch
___
OpenStack-dev mailing list
OpenStack-dev@lists.openstack.org
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev
be useful for making sure that changes in the
upstream project doesn't break drivers, or that breakages could at least
invoke action by the driver team:
https://github.com/openstack/nova/blob/4ce3f55d169290015063131134f93fca236807ed/nova/tests/virt/test_ironic_api_contracts.py
--
Regards,
Eric
and having our own core team would be beneficial, but I wouldn't want
to do this unless it applied equally to all drivers.
--
Regards,
Eric Windisch
___
OpenStack-dev mailing list
OpenStack-dev@lists.openstack.org
http://lists.openstack.org/cgi-bin/mailman
On Tue, Aug 26, 2014 at 3:35 PM, Martinx - ジェームズ thiagocmarti...@gmail.com
wrote:
Hey Stackers! Wait! =)
Let me ask something...
Why are you guys using Docker within a VM?!?! What is the point of doing
such thing?!
I thought Docker was here to entirely replace the virtualization layer,
an environment similar to openstack-infra that can consistently
and reliably run on one's laptop, while bringing a devstack-managed
OpenStack installation online in 5-8 minutes.
Like other devstack-based installs, this is not for running production
OpenStack deployments.
--
Regards,
Eric Windisch
of the Linux containers features are disabled for
one reason or another.
--
Regards,
Eric Windisch
___
OpenStack-dev mailing list
OpenStack-dev@lists.openstack.org
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev
of Nova more meaningful and would be a boon for Nova
security overall.
--
Regards,
Eric Windisch
___
OpenStack-dev mailing list
OpenStack-dev@lists.openstack.org
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev
(and possibly write) plugins for
libswarm/swarmd to provide your scheduling. Your docker_endpoint would be
the IP/port of swarmd, and it would proxy those requests to the correct
backend Docker hosts.
--
Regards,
Eric Windisch
___
OpenStack-dev mailing list
at least one wikipage so far, it is far easier
if folks simply employ the correct usage from the beginning.
On wiki pages and other published medium -- absolutely.
For our daily use in IRC and other casual discussion? Lets not get pedantic.
--
Regards,
Eric Windisch
Given resource concerns, maybe just adding it to the experimental
pipeline would be sufficient?
For clarity, the discussed patch is to promote an existing experimental job
to silent.
Regards -Eric
___
OpenStack-dev mailing list
and usable from Docker.
The Heat plugin allow settings the CMD as a resource property. The
user-data is only passed to the instance that runs Docker, not the
containers. Configuring the CMD and/or environment variables for the
container is the correct approach.
--
Regards,
Eric Windisch
candidates for 3rd-party CI.
Regards,
Eric Windisch
___
OpenStack-dev mailing list
OpenStack-dev@lists.openstack.org
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev
On Wed, Jul 16, 2014 at 12:55 PM, Roman Bogorodskiy
rbogorods...@mirantis.com wrote:
Eric Windisch wrote:
This thread highlights more deeply the problems for the FreeBSD folks.
First, I still disagree with the recommendation that they contribute to
libvirt. It's a classic example
to last
week's addition of the containers breakout room.
I suspect other containers-oriented folks might yet want to register. If
so, I think now would be the time to speak up.
--
Regards,
Eric Windisch
___
OpenStack-dev mailing list
OpenStack-dev
provides a certain awareness to the
container of the existence of that volume. It allows the container to
ATTEMPT to perform a mount operation, even if its denied by policy. That,
of course, is where seccomp would come into play...
--
Regards,
Eric Windisch
@jogo - in the future, it would be helpful if you might send these over
to the nova-docker project. This (and the other recent) bug has already
had a fix committed. Thanks.
** Also affects: nova-docker
Importance: Undecided
Status: New
** Changed in: nova-docker
Status: New =
*** This bug is a duplicate of bug 1314322 ***
https://bugs.launchpad.net/bugs/1314322
** Also affects: nova-docker
Importance: Undecided
Status: New
** Changed in: nova
Status: Incomplete = Invalid
** This bug has been marked a duplicate of bug 1314322
snapshots return
** Also affects: nova-docker
Importance: Undecided
Status: New
** Changed in: nova
Status: New = Invalid
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
** Also affects: nova-docker
Importance: Undecided
Status: New
** Changed in: nova
Status: Confirmed = Invalid
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
** Also affects: nova-docker
Importance: Undecided
Status: New
** Changed in: nova-docker
Status: New = Fix Committed
** Changed in: nova
Status: Confirmed = Invalid
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is
** Also affects: nova-docker
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1242820
Title:
Nova docker virt driver triggers
in
userspace.
References:
*
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/tree/Documentation/prctl/seccomp_filter.txt?id=HEAD
* http://chdir.org/~nico/seccomp-nurse/
--
Regards,
Eric Windisch
___
OpenStack-dev mailing list
OpenStack-dev
with the presumption there is value in having access to block
devices without filesystems, but that there would be additional utility
should we have a viable story for mounting filesystems.
--
Regards,
Eric Windisch
___
OpenStack-dev mailing list
OpenStack-dev
'software config' as I should be, although I attended a couple sessions on
it last week. I'm not sure how this solves the problem? Is the plan to have
the software-config-agent communicate over the network to/from Heat, and to
the instance's local unix socket?
--
Regards,
Eric Windisch
it on 0.8.1. I'll be updating the Dockerfile
and testing it throughly with the latest Docker release once we merge the
devstack patches.
Regards,
Eric Windisch
___
OpenStack-dev mailing list
OpenStack-dev@lists.openstack.org
http://lists.openstack.org/cgi-bin
What I hope to do is setup a check doing CI on devstack-f20 nodes[3],
this will setup a devstack based nova with the nova-docker driver and
can then run what ever tests make sense (currently only a minimal test,
Eric I believe you were looking at tempest support maybe it could be
hooked in
not
consolidate these into a single solution that is always fast for everyone,
all the time? Something used in dev and gating? Something that might reduce
the costs for running openstack-infra? That's what dockenstack is.
--
Regards,
Eric Windisch
** Project changed: nova = nova-docker
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1288940
Title:
docker list_instances race condition with inspect_container results
** Project changed: nova = nova-docker
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1286171
Title:
docker performs slow registry port discovery (/w containers list)
** Project changed: nova = nova-docker
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1292479
Title:
Instance creation fails using Docker /w libcontainer execution
** Project changed: nova = nova-docker
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1249108
Title:
nova docker virt driver always reports 1 vcpu
Status in Nova
** Project changed: nova = nova-docker
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1284761
Title:
Docker hypervisor cannot create or run images with upper-case chars
** Project changed: nova = nova-docker
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1284990
Title:
docker unit tests fail on non-Linux with get_host_stats accessing
** Project changed: nova = nova-docker
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1249114
Title:
nova docker virt driver does not support lxc options
Status in
** Project changed: nova = nova-docker
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1242996
Title:
Add more test cases for docker driver
Status in Nova Docker
** Project changed: nova = nova-docker
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1247295
Title:
Docker virt driver networking fails with Neutron
Status in Nova
Public bug reported:
The docker hypervisor plugin has a race condition during list_instances
where the instance list is constructed by creating a listing of
containers, then extracting instance names from the result of inspecting
that container. It may happen that the between fetching the list of
variables in
devstack).
--
Regards,
Eric Windisch
___
OpenStack-dev mailing list
OpenStack-dev@lists.openstack.org
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev
Public bug reported:
While the docker registry port is most likely to be static for any given
host during the runtime of the compute service, the registry port is
rediscovered on every spawn/snapshot/etc.
While it is possible that the registry container might be relaunched and
the port moved,
, although it must be public.
** Affects: nova
Importance: Undecided
Assignee: Eric Windisch (ewindisch)
Status: In Progress
** Tags: docker
** Tags added: docker
** Changed in: nova
Status: New = Confirmed
** Changed in: nova
Assignee: (unassigned) = Eric Windisch
overlapped with the existing v2 failures. I'm not sure how
Russell or the community feels about skipping Tempest tests for v3, and I
would like to try making these pass, but I presently see it as lower
priority versus making v2 work and pass.
--
Regards,
Eric Windisch
Public bug reported:
2014/02/25 18:09:22 POST
/v1.7/images/172.17.0.2:5042/ListImageFiltersTestJSON-image-10169062/push
[/var/lib/docker|5186c3f6] +job
push(172.17.0.2:5042/ListImageFiltersTestJSON-image-10169062)
Invalid repository name (ListImageFiltersTestJSON-image-10169062), only
Public bug reported:
==
FAIL:
nova.tests.virt.docker.test_driver.DockerDriverTestCase.test_get_host_stats
tags: worker-4
--
Empty attachments:
of the container would be able to route correctly to the host and reach
the services.
Swapnil, try adding a value for HOST_IP into your localrc, matching your
machine's IP address.
Regards,
Eric Windisch
___
OpenStack-dev mailing list
OpenStack-dev
to 127.0.0.1 as the error that is received currently is certainty not
obvious enough.
--
Regards,
Eric Windisch
___
OpenStack-dev mailing list
OpenStack-dev@lists.openstack.org
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev
Public bug reported:
The following methods are public and should be prefixed with a _ to
indicate that they are private:
is_daemon_running
find_container_by_name
get_available_resource
** Affects: nova
Importance: Undecided
Status: New
--
You received this bug
, but wish
to confirm that this matches the error you're seeing.
Regards,
Eric Windisch
___
OpenStack-dev mailing list
OpenStack-dev@lists.openstack.org
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev
don't expect it to be an issue. The monkey-patching
will cause eventlet.spawn to be called for threading.Thread. The code looks
eventlet-friendly enough on the surface. Error handing around file
read/write could be affected, but it also looks fine.
--
Regards,
Eric Windisch
and reproduce this myself.
Regards,
Eric Windisch
___
OpenStack-dev mailing list
OpenStack-dev@lists.openstack.org
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev
docker-registry, or stopping it if it
is already running.
Regards,
Eric Windisch
___
OpenStack-dev mailing list
OpenStack-dev@lists.openstack.org
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev
should take this off the developer list which is not for usage questions
(those usually go to the general list, operator list, or Ask OpenStack)
Regards,
Eric Windisch
___
OpenStack-dev mailing list
OpenStack-dev@lists.openstack.org
http://lists.openstack.org
and process, while not perfect, isn't
too dysfunctional. Attempting to move the EC2 or GCE code into a
Stackforge repository might kill them before they can reach that bar
you're looking to set.
What more is needed from the blueprint or the patch authors to proceed?
--
Regards,
Eric Windisch
offerings improvements and feature requests for
oslo.messaging.
--
Regards,
Eric Windisch
___
OpenStack-dev mailing list
OpenStack-dev@lists.openstack.org
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev
On Fri, Nov 22, 2013 at 11:49 AM, Krishna Raman kra...@gmail.com wrote:
Reminder: We are meting in about 15 minutes on #openstack-meeting channel.
I wasn't able to make it. Was meeting-bot triggered? Is there a log of
today's discussion?
Thank you,
Eric Windisch
stiffen innovation around
hypervisor-based virtualization. That isn't necessarily a bad thing,
it will help maintain stability in the project. However, the choice
and the implications shouldn't be ignored.
--
Regards,
Eric Windisch
___
OpenStack-dev mailing
.
--
Regards,
Eric Windisch
___
OpenStack-dev mailing list
OpenStack-dev@lists.openstack.org
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev
as
standalone libraries. For these, it might make sense to aggressively
consider rolling some modules together?
One clear example would be log.py and log_handler.py, another would be
periodic_task.py and loopingcall.py
--
Regards,
Eric Windisch
___
OpenStack
Are Bill Ted really our patrons of anti-harassment? We need something
more substantial than a Bill Ted quote. Party on!
https://www.youtube.com/watch?v=N_yJFLvmjJYfeature=youtube_gdata_player
On Sep 11, 2013 10:12 AM, Thierry Carrez thie...@openstack.org wrote:
David Mortman wrote:
Given
On Wed, Sep 11, 2013 at 11:11 AM, Thierry Carrez thie...@openstack.orgwrote:
Eric Windisch wrote:
Are Bill Ted really our patrons of anti-harassment? We need something
more substantial than a Bill Ted quote. Party on!
I'm not saying what we have is sufficient. I'm just accurately
of session.py. This
session management code is probably what you'll most have to decide is
worthwhile bringing in and if Glance really has such unique
requirements that it needs to bother with maintaining this code on its
own.
--
Regards,
Eric Windisch
here is we should be following the
principle of ask forgiveness, not permission. Try Python 3 and then
fallback to Python 2 whenever possible.
--
Regards,
Eric Windisch
___
OpenStack-dev mailing list
OpenStack-dev@lists.openstack.org
http
. These are private methods.
They can be broken for external consumers of these methods, because there
shouldn't be any. It will be a good lesson to anyone that tries to abuse
private methods.
--
Regards,
Eric Windisch
___
OpenStack-dev mailing list
OpenStack-dev
updating all the existing method calls that exist in
amqp.py, impl_kombu.py, and impl_qpid.py.
--
Regards,
Eric Windisch
___
OpenStack-dev mailing list
OpenStack-dev@lists.openstack.org
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev
Yes, thank you.
I'm not sure if the videos weren't posted when I checked, or if I may have
accidentally been looking at the Grizzly summit video listing. Either way,
they're now where they belong (as long as one looks in the right place).
Regards,
Eric Windisch
On Tuesday, May 21, 2013
missing, are those
project wrap-up talks given by the various PTLs.
Perhaps someone (Stefano?) knows if those videos might be available? Having
videos such as these available following Hong Kong will be all so much more
important for those that fail to make it.
Regards,
Eric Windisch
Extending the rules to those things of cultural or political significance
would have established precedence with the 'Grizzly exception'.
If such an exception were useful in naming this release, I'd suggest it
become a standard part of the naming scheme.
On May 10, 2013 6:40 AM, Matt Joyce
think I want
that message processed ever.
For what it is worth, Grizzly introduces TTLs for individual messages as
they're injected into RabbitMQ and Qpid. This was already the behavior for
ZeroMQ, in Folsom.
Regards,
Eric Windisch
___
Mailing
Is there a good reason there is no Android app published for ODS?
I've use the website on my phone in the past and it is okay, but not great.
I see there is an iOS app, but sched.org offers applications for both
ecosystems.
Regards,
Eric Windisch
On Thursday, April 11, 2013 at 18:54 PM, Stefano Maffulli wrote:
On Thu 11 Apr 2013 03:22:46 PM PDT, Eric Windisch wrote:
Is there a good reason there is no Android app published for ODS?
I have no idea... is there supposed to be one?
I use no app, I'm in the I can't stand apps phase
Someone has just informed me of the @OpenStack twitter feed which reads:
Coming to the Summit? Download the new iphone app! (Android coming soon)
awe.sm/dE87S (http://awe.sm/dE87S)
Case closed, I guess ;-)
Regards,
Eric Windisch
On Thursday, April 11, 2013 at 19:48 PM, Eric Windisch wrote
with doing HTTPS push. Someone on the QA team could comment
on whether or not it is worth providing support.
More information:
https://groups.google.com/d/msg/repo-discuss/7BXB_t7cHs8/KQ6TCLKYEh4J
Regards,
Eric Windisch
___
Mailing list: https://launchpad.net
help them succeed, and especially for those
individually elected seats -- can bring them to together.
I am deeply committed to the success of OpenStack and to open source cloud. I
thank you for your consideration and ask that you please vote for me.
Regards,
Eric Windisch
Public bug reported:
Ceilometer should be loading its own configuration files, not those of
Nova.
Presently, all the upstart scripts contain:
--config-file /etc/nova/nova.conf
** Affects: ceilometer (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug
Likely fixed in Raring as that package is based on a newer Debian
package.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1140206
Title:
pydist-overrides ignores package names with hyphens
To
Public bug reported:
This is a bug that has already been found and fixed in Debian. I have
verified this bug exists in Quantal (python-defaults 2.7.3-0ubuntu7).
Because Ubuntu's package is not based on Debian's, this fix has not made
it into Ubuntu releases.
Here is a copy of the Debian bug
Public bug reported:
Reporting this bug for python-ceilometer (ceilometer_0.1-0ubuntu1) in
Quantal.
dist-packages/tests/ is being filled with files from Ceilometer.
My local fix has been to modify
debian/python-ceilometer.install
to change:
- usr/lib/python*/dist-packages/*
+
Public bug reported:
Package descriptions in ceilometer_0.1-0ubuntu1 reference 'ceiolmeter',
an obvious typo.
Fix:
sed -i 's/ceiolmeter/ceilometer/g' debian/control
** Affects: ceilometer (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because
James: yes, this is the same as in bug 1065532.
Upstream bug:
https://bitbucket.org/which_linden/eventlet/issue/128/zeromq-fd-can-be-readable-without-being
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Patch has proven not to solve problem. An alternative patch exists,
although more testing may be necessary.
Upstream effort is being made to resolve this problem in eventlet.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
of the box with ZeroMQ selected.
Regards,
Eric Windisch
___
Mailing list: https://launchpad.net/~openstack
Post to : openstack@lists.launchpad.net
Unsubscribe : https://launchpad.net/~openstack
More help : https://help.launchpad.net/ListHelp
collateral consequences?
I generally advise not to do this due to potential security concerns.
In practice, your concerns will be with deleting manually created volumes and
creating volumes that match the pattern set in the nova-volumes/cinder
configuration.
Regards,
Eric Windisch
1 - 100 of 209 matches
Mail list logo