[Yahoo-eng-team] [Bug 1225099] Re: Encoding hard-coded in gettextutils.Message

2013-10-02 Thread Thierry Carrez
** Changed in: oslo
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1225099

Title:
  Encoding hard-coded in gettextutils.Message

Status in Ceilometer:
  In Progress
Status in Cinder:
  In Progress
Status in Orchestration API (Heat):
  In Progress
Status in OpenStack Neutron (virtual network service):
  In Progress
Status in OpenStack Compute (Nova):
  In Progress
Status in Oslo - a Library of Common OpenStack Code:
  Fix Released

Bug description:
  The __str__ method in openstack.common.gettextutils.Message is hard-
  coded to encode to utf-8 which creates problems when other logic goes
  to decode the string using the default encoding, e.g. when formatting
  log messages.  Message objects with double-byte translations fail to
  log because of this.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ceilometer/+bug/1225099/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1229204] Re: Output for live migration corrupted

2013-10-02 Thread Thierry Carrez
** Changed in: oslo
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1229204

Title:
  Output for live migration corrupted

Status in OpenStack Compute (Nova):
  Fix Committed
Status in Oslo - a Library of Common OpenStack Code:
  Fix Released

Bug description:
  When performing live migration to the same host the following output
  is received:

  nicira@os-devstack:~$ nova --os-tenant-name demo live-migration Y os-devstack
  ERROR: [u'U', u'n', u'a', u'b', u'l', u'e', u' ', u't', u'o', u' ', u'm', 
u'i', u'g', u'r', u'a', u't', u'e', u' ', u'i', u'n', u's', u't', u'a', u'n', 
u'c', u'e', u' ', u'(', u'b', u'd', u'7', u'5', u'6', u'1', u'3', u'5', u'-', 
u'4', u'5', u'9', u'1', u'-', u'4', u'5', u'5', u'c', u'-', u'a', u'd', u'f', 
u'8', u'-', u'c', u'7', u'f', u'a', u'3', u'e', u'8', u'5', u'4', u'4', u'3', 
u'1', u')', u' ', u't', u'o', u' ', u'c', u'u', u'r', u'r', u'e', u'n', u't', 
u' ', u'h', u'o', u's', u't', u' ', u'(', u'o', u's', u'-', u'd', u'e', u'v', 
u's', u't', u'a', u'c', u'k', u')', u'.'] (HTTP 400) (Request-ID: 
req-0c12766b-3c0a-4b8b-98bc-aebbb77cdf99)

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1229204/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1182861] Re: Switch to oslo.config 1.2.0 final

2013-10-02 Thread Thierry Carrez
** Changed in: oslo
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1182861

Title:
  Switch to oslo.config 1.2.0 final

Status in Ceilometer:
  Fix Committed
Status in OpenStack Image Registry and Delivery Service (Glance):
  Fix Committed
Status in Orchestration API (Heat):
  Fix Committed
Status in OpenStack Identity (Keystone):
  Fix Committed
Status in OpenStack Message Queuing Service (Marconi):
  Fix Committed
Status in OpenStack Neutron (virtual network service):
  Fix Committed
Status in OpenStack Compute (Nova):
  Fix Committed
Status in Oslo - a Library of Common OpenStack Code:
  Fix Released
Status in Python client library for Keystone:
  Fix Committed
Status in Trove - Database as a Service:
  Fix Committed

Bug description:
  These commits:

  https://review.openstack.org/#/q/I7826087147e0713edaaea85a72283998295e2281,n,z

  mean we're using an oslo.config tarball from
  http://tarballs.openstack.org/oslo.config/

  Once oslo.config-1.2.0 has been published to pypi, we should switch
  to:

oslo.config=1.2.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ceilometer/+bug/1182861/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1226374] Re: misused assertTrue in unit tests

2013-10-02 Thread Thierry Carrez
** Changed in: oslo
   Status: Fix Committed = Fix Released

** Changed in: oslo
Milestone: None = havana-rc1

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1226374

Title:
   misused assertTrue in unit tests

Status in OpenStack Image Registry and Delivery Service (Glance):
  In Progress
Status in Orchestration API (Heat):
  Fix Committed
Status in Ironic (Bare Metal Provisioning):
  Fix Committed
Status in OpenStack Identity (Keystone):
  Fix Committed
Status in Oslo - a Library of Common OpenStack Code:
  Fix Released
Status in Python client library for Keystone:
  Fix Committed
Status in OpenStack Object Storage (Swift):
  Fix Committed
Status in Tempest:
  Fix Committed

Bug description:
  1)signature for  assertTure:
  def failUnless(self, expr, msg=None):
  Fail the test unless the expression is true.
  if not expr: raise self.failureException, msg
   
  assert_ = assertTrue = failUnless

  2) signature for assertEqual:
  def failUnlessEqual(self, first, second, msg=None):
  Fail if the two objects are unequal as determined by the '=='
 operator.
  
  if not first == second:
  raise self.failureException, \
(msg or '%r != %r' % (first, second))
...
assertEqual = assertEquals = failUnlessEqual

  assertTrue used to evaluate  one expression
  assertEqual used to compare two  expressions

  If passed two expressions to assertTrue  , it always evaluate first
  expression . That 's not expected .

To manage notifications about this bug go to:
https://bugs.launchpad.net/glance/+bug/1226374/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1227019] Re: Error with run_tests.sh: Invalid version of six installed

2013-10-02 Thread Thierry Carrez
** Changed in: oslo
   Status: Fix Committed = Fix Released

** Changed in: oslo
Milestone: None = havana-rc1

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1227019

Title:
  Error with run_tests.sh: Invalid version of six installed

Status in OpenStack Compute (Nova):
  Fix Committed
Status in Oslo - a Library of Common OpenStack Code:
  Fix Released

Bug description:
  run_tests.sh installs+upgrades the requirements from requirements.txt
  followed by doing the same for test-requirements.txt

  test_requirements.txt does not have an upper bound on six and
  therefore upgrades it beyond the version permitted in
  requirements.txt.

  tox installs+upgrades for both files at the same time rather than in
  serial, therefore identifies a version of six that satisfies all of
  the requirements.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1227019/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1229475] Re: terminate_instance(): RuntimeError: Second simultaneous read on fileno 16 detected

2013-10-02 Thread Thierry Carrez
No need for a nova patch

** Changed in: nova
   Status: Triaged = In Progress

** Changed in: nova
   Status: In Progress = Invalid

** No longer affects: oslo

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1229475

Title:
  terminate_instance(): RuntimeError: Second simultaneous read on fileno
  16 detected

Status in OpenStack Compute (Nova):
  Invalid
Status in Python client library for Neutron:
  In Progress

Bug description:
  http://logs.openstack.org/59/47659/6/check/gate-tempest-devstack-vm-
  neutron/fc83d44/logs/screen-n-cpu.txt.gz#_2013-09-23_18_25_06_484


  2013-09-23 18:25:06.484 ERROR nova.openstack.common.rpc.amqp 
[req-3a80ff5a-817b-4eb8-be67-7f180bef8a6e demo demo] Exception during message 
handling
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp Traceback 
(most recent call last):
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp   File 
/opt/stack/new/nova/nova/openstack/common/rpc/amqp.py, line 461, in 
_process_data
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp **args)
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp   File 
/opt/stack/new/nova/nova/openstack/common/rpc/dispatcher.py, line 172, in 
dispatch
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp result 
= getattr(proxyobj, method)(ctxt, **kwargs)
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp   File 
/opt/stack/new/nova/nova/compute/manager.py, line 354, in decorated_function
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp return 
function(self, context, *args, **kwargs)
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp   File 
/opt/stack/new/nova/nova/exception.py, line 90, in wrapped
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp payload)
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp   File 
/opt/stack/new/nova/nova/exception.py, line 73, in wrapped
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp return 
f(self, context, *args, **kw)
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp   File 
/opt/stack/new/nova/nova/compute/manager.py, line 244, in decorated_function
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp pass
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp   File 
/opt/stack/new/nova/nova/compute/manager.py, line 230, in decorated_function
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp return 
function(self, context, *args, **kwargs)
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp   File 
/opt/stack/new/nova/nova/compute/manager.py, line 295, in decorated_function
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp 
function(self, context, *args, **kwargs)
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp   File 
/opt/stack/new/nova/nova/compute/manager.py, line 272, in decorated_function
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp e, 
sys.exc_info())
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp   File 
/opt/stack/new/nova/nova/compute/manager.py, line 259, in decorated_function
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp return 
function(self, context, *args, **kwargs)
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp   File 
/opt/stack/new/nova/nova/compute/manager.py, line 1793, in terminate_instance
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp 
do_terminate_instance(instance, bdms)
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp   File 
/opt/stack/new/nova/nova/openstack/common/lockutils.py, line 246, in inner
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp return 
f(*args, **kwargs)
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp   File 
/opt/stack/new/nova/nova/compute/manager.py, line 1785, in 
do_terminate_instance
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp 
reservations=reservations)
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp   File 
/opt/stack/new/nova/nova/hooks.py, line 105, in inner
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp rv = 
f(*args, **kwargs)
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp   File 
/opt/stack/new/nova/nova/compute/manager.py, line 1758, in _delete_instance
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp 
user_id=user_id)
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp   File 
/opt/stack/new/nova/nova/compute/manager.py, line 1727, in _delete_instance
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp 

[Yahoo-eng-team] [Bug 1231709] Re: oauth controller calls are not protected

2013-10-02 Thread Thierry Carrez
** Changed in: keystone
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1231709

Title:
  oauth controller calls are not protected

Status in OpenStack Identity (Keystone):
  Fix Released

Bug description:
  It's open season for the oauth controllers, and anyone can call anything they 
want.
  None of the controllers are protected. The policy.json file needs to be 
updated accordingly.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1231709/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1226225] Re: v2 token cache not correctly invalidated when using Belongs To

2013-10-02 Thread Thierry Carrez
** Changed in: keystone
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1226225

Title:
  v2 token cache not correctly invalidated when using Belongs To

Status in OpenStack Identity (Keystone):
  Fix Released

Bug description:
  v2 token deletion and validation methods take an optional belongs_to
  parameter, which is the tenant.  Due to how sensitive the dogpile
  caching is on the parameters to validate_token, this can lead to
  problems where a token cache is not correctly cleared, for example,
  the following (pseudo test) will fail:

  - create a scoped token for a user to a project
  - check the token is valid, just using the token ID (without passing in 
belongs_to).[this sets the cache]
  - delete the token using the driver function delete_tokens, passing in user 
and tenant
  - check if token is still valid, just using token ID (it will be return 
successfully from the cache - which is incorrect)
  - check if token is still valid, token ID and tenant ID (it will not be found 
- which is correct)

  The problem is in invalidate_individual_token_cache in the token
  provider, which already tries to handle the case of invalidating a
  token with and without a belongs_to tenantbut doesn't catch the
  case when dogpile has cached the key as tokenID, None as the
  parameters.

  Thanks to morganfainberg for his help in debugging the above.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1226225/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1226475] Re: Update user v2.0 does not automatically assign user on new tenantId

2013-10-02 Thread Thierry Carrez
** Changed in: keystone
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1226475

Title:
  Update user v2.0 does not automatically assign user on new tenantId

Status in OpenStack Identity (Keystone):
  Fix Released

Bug description:
  Updating a user's tenantId doesn't assign the user automatically on
  the new tenant. Even if the tenantId is null before the update, the
  user is still not assigned.

  On create user, the new user is automatically assigned to the tenant when the 
tenantId is provided.
   
  Ref: 
http://docs.openstack.org/api/openstack-identity-service/2.0/content/POST_updateUser_v2.0_users__userId__.html

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1226475/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1231772] Re: Cannot create a user with LDAP backend

2013-10-02 Thread Thierry Carrez
** Changed in: keystone
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1231772

Title:
  Cannot create a user with LDAP backend

Status in OpenStack Identity (Keystone):
  Fix Released

Bug description:
  When running Keystone with the LDAP identity backend, creating a user
  fails with 400 and must be string, not None

  Set up devstack to use LDAP.

  While devstack is running commands fail, like this:

  keystone user-create --name=nova --pass=mypwd --tenant_id
  948d57ba2523423e96ca2f98c29973a8 --email=n...@example.com

  Here's the error in the Keystone log:

  (keystone.common.ldap.core): 2013-09-26 21:10:35,701 DEBUG core add_s
  LDAP add:
  dn=cn=591959d3f2cd42d09230789af9504e12,ou=Users,dc=openstack,dc=org,
  attrs=[('objectClass', ['person', 'inetOrgPerson']), ('sn', ['nova']),
  ('userPassword', ['']), (None,
  ['948d57ba2523423e96ca2f98c29973a8'])]

  (keystone.common.wsgi): 2013-09-26 21:10:35,702 ERROR wsgi __call__ must be 
string, not None
  Traceback (most recent call last):
File /opt/stack/keystone/keystone/common/wsgi.py, line 238, in __call__
  result = method(context, **params)
File /opt/stack/keystone/keystone/identity/controllers.py, line 214, in 
create_user
  self.identity_api.create_user(user_id, user_ref))
File /opt/stack/keystone/keystone/notifications.py, line 44, in wrapper
  result = f(*args, **kwargs)
File /opt/stack/keystone/keystone/identity/core.py, line 177, in wrapper
  return f(self, *args, **kwargs)
File /opt/stack/keystone/keystone/identity/core.py, line 322, in 
create_user
  ref = driver.create_user(user_id, user)
File /opt/stack/keystone/keystone/identity/backends/ldap.py, line 95, in 
create_user
  user_ref = self.user.create(user)
File /opt/stack/keystone/keystone/identity/backends/ldap.py, line 229, in 
create
  values = super(UserApi, self).create(values)
File /opt/stack/keystone/keystone/common/ldap/core.py, line 730, in create
  return super(EnabledEmuMixIn, self).create(values)
File /opt/stack/keystone/keystone/common/ldap/core.py, line 328, in create
  conn.add_s(self._id_to_dn(values['id']), attrs)
File /opt/stack/keystone/keystone/common/ldap/core.py, line 551, in add_s
  return self.conn.add_s(dn, ldap_attrs)
File /usr/lib/python2.7/dist-packages/ldap/ldapobject.py, line 193, in 
add_s
  msgid = self.add(dn,modlist)
File /usr/lib/python2.7/dist-packages/ldap/ldapobject.py, line 190, in add
  return self.add_ext(dn,modlist,None,None)
File /usr/lib/python2.7/dist-packages/ldap/ldapobject.py, line 176, in 
add_ext
  return 
self._ldap_call(self._l.add_ext,dn,modlist,EncodeControlTuples(serverctrls),EncodeControlTuples(clientctrls))
File /usr/lib/python2.7/dist-packages/ldap/ldapobject.py, line 96, in 
_ldap_call
  result = func(*args,**kwargs)
  TypeError: must be string, not None

  
  Also, the error should be 500 Internal Server Error and not 400 Bad Request.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1231772/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1233228] Re: Last translations refresh before RC1

2013-10-02 Thread Thierry Carrez
** Changed in: keystone
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1233228

Title:
  Last translations refresh before RC1

Status in Ceilometer:
  Fix Committed
Status in OpenStack Image Registry and Delivery Service (Glance):
  Fix Committed
Status in OpenStack Identity (Keystone):
  Fix Released

Bug description:
  Before issuing RC1 we need to refresh translations.
  Those are automatically proposed and can be found at 
https://review.openstack.org/#/q/topic:transifex/translations,n,z

To manage notifications about this bug go to:
https://bugs.launchpad.net/ceilometer/+bug/1233228/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1227980] Re: Pluggable auth provider: Can't write a custom plugin due to hardcoded check

2013-10-02 Thread Thierry Carrez
** Changed in: keystone
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1227980

Title:
  Pluggable auth provider:  Can't write a custom plugin due to hardcoded
  check

Status in OpenStack Identity (Keystone):
  Fix Released

Bug description:
  Provider plugin provides an interface so that some one customize or
  rewrite UUID and PKI providers.  But unfortunately  there is a hard
  coded check which prevents  pluggablity

  provider.py -- get_provider

   if ((CONF.signing.token_format == 'PKI' and
  CONF.token.provider != PKI_PROVIDER or
  (CONF.signing.token_format == 'UUID' and
  CONF.token.provider != UUID_PROVIDER))):
  raise exception.UnexpectedError(
  _('keystone.conf [signing] token_format (deprecated) '
'conflicts with keystone.conf [token] provider'))
  return CONF.token.provider

  PKI_PROVIDER and UUID_PROVIDERS are global variable which hold default
  provider.  Do we need this check?

  Ofcourse, I can change the value of the global variable, but that
  doesn't fit the pluggable design.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1227980/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1221808] Re: some API responses which should be translated when using accept-language header are not

2013-10-02 Thread Thierry Carrez
** Changed in: keystone
   Status: Fix Committed = Fix Released

** Changed in: keystone
Milestone: None = havana-rc1

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1221808

Title:
  some API responses which should be translated when using accept-
  language header are not

Status in Cinder:
  Fix Committed
Status in Orchestration API (Heat):
  Fix Committed
Status in OpenStack Identity (Keystone):
  Fix Released
Status in OpenStack Neutron (virtual network service):
  Fix Committed

Bug description:
  1. Update cinder.po file
  # vim /usr/lib/python2.6/site-packages/cinder/locale/ja/LC_MESSAGES/cinder.po
  #: cinder/volume/flows/create_volume.py:301
  #, python-format
  msgid Volume size %(size)s must be an integer and greater than 0
  msgstr memo memo memo memo memo %(size)s memo memo memo memo memo memo memo 
memo memo memo memo memo memomemomeo meomeomeomeo 0.

  
  2. Compile new .mo file, install
  # msgfmt -o cinder.mo 
/usr/lib/python2.6/site-packages/cinder/locale/ja/LC_MESSAGES/cinder.po
  # cp cinder.mo /usr/share/locale/ja_JP/LC_MESSAGES/
  # cp cinder.mo /usr/share/locale/ja/LC_MESSAGES/

  3. Restart cinder services
  # service openstack-cinder-volume restart
  # service openstack-cinder-scheduler restart
  # service openstack-cinder-api restart

  4. API call to trigger translated message
  # curl -i http://127.0.0.1:8776/v1/89fb0710a5214d3596fb82e09d40fe4e/volumes 
-X POST -H X-Auth-Project-Id: service -H User-Agent: python-cinderclient -H 
Content-Type: application/json -H Accept: application/json -H 
X-Auth-Token: 347ecfadfc2c4783a9fc0f24729eecaa -d '{volume: {status: 
creating, availability_zone: null, source_volid: null, 
display_description: null, snapshot_id: null, user_id: null, size: 0, 
display_name: volumetest, imageRef: null, attach_status: detached, 
volume_type: null, project_id: null, metadata: {}}}' -H Accept-Language: 
ja

  5. Response still in english'
  HTTP/1.1 400
  Content-Length: 119
  Content-Type: application/json; charset=UTF-8
  X-Compute-Request-Id: req-b71abcbf-9dfb-4d92-8062-6338438c84a4
  Date: Tue, 27 Aug 2013 03:21:05 GMT

  {badRequest: {message: Invalid input received: Volume size 0 must
  be an integer and greater than 0, code: 400}}

  6. Update system locale to make sure error message is properly translated
  # cat /etc/sysconfig/i18n
  LANG=ja_JP.UTF-8
  #LANG=en_US.UTF-8
  SYSFONT=latarcyrheb-sun16

  7. Restart servers
  # service openstack-cinder-volume restart
  # service openstack-cinder-scheduler restart
  # service openstack-cinder-api restart

  8. Response is partial translated.

  [root@localhost locale]# curl -i 
http://127.0.0.1:8776/v1/89fb0710a5214d3596fb82e09d40fe4e/volumes -X POST -H 
X-Auth-Project-Id: service -H User-Agent: python-cinderclient -H 
Content-Type: application/json -H Accept: application/json -H 
X-Auth-Token: 347ecfadfc2c4783a9fc0f24729eecaa -d '{volume: {status: 
creating, availability_zone: null, source_volid: null, 
display_description: null, snapshot_id: null, user_id: null, size: 0, 
display_name: volumetest, imageRef: null, attach_status: detached, 
volume_type: null, project_id: null, metadata: {}}}' -H Accept-Language: 
ja
  HTTP/1.1 400
  Content-Length: 182
  Content-Type: application/json; charset=UTF-8
  X-Compute-Request-Id: req-49be059a-8e6a-4922-9349-e51028725f26
  Date: Tue, 27 Aug 2013 03:28:00 GMT

  {badRequest: {message: Invalid input received: memo memo memo
  memo memo 0 memo memo memo memo memo memo memo memo memo memo memo
  memo memomemomeo meomeomeomeo 0., code: 400}}

  9. Expected results:
  The response in message should be translated without changing system local 
to ja

  10. Actual results:
  The response in message has not translated.

To manage notifications about this bug go to:
https://bugs.launchpad.net/cinder/+bug/1221808/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1224565] Re: Can't establish qpid connection with impl_qpid.py

2013-10-02 Thread Thierry Carrez
** Changed in: keystone
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1224565

Title:
  Can't establish qpid connection with impl_qpid.py

Status in OpenStack Identity (Keystone):
  Fix Released

Bug description:
  The notifier module from Oslo has been sync'd with Keystone and is
  being used to deliver notifications using the log_notifier and
  rpc_notifier. By default the rpc_backend is impl_kombu.py and I can
  verify the notifications arrive on the queue. When using impl_qpid as
  the rpc_backend and sending a notification, the process hangs
  attempting to establish a connection with qpid.

  Steps to reproduce:
  1.) Update keystone.conf to send notifications
  # === NOTIFICATIONS =
  notification_driver = keystone.openstack.common.notifier.rpc_notifier
  rpc_backend = keystone.openstack.common.rpc.impl_qpid
  2.) restart Keystone
  3.) create/update/delete project or a user (both resources will send a 
notification)
  $ keystone tenant-create --name my_project

  After setting a break point I have followed the call in to qpid code
  before it hangs. I am not sure if the problem here lies in impl_qpid
  or possibly something with qpid code. I have been able to reproduce
  this on qpid 0.20 and 0.22.

  The following is a trace with pdb included:

  http://paste.openstack.org/show/46886/

  I've tried this using config options for qpid username and password
  and leaving them as default, neither work for establishing a
  connection.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1224565/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1209440] Re: LDAP identity still allows setting domain via attribute

2013-10-02 Thread Thierry Carrez
** Changed in: keystone
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1209440

Title:
  LDAP identity still allows setting domain via attribute

Status in OpenStack Identity (Keystone):
  Fix Released

Bug description:
  At keystone/identity/backends/ldap.py:230 we allow mapping domain_id
  of a user based on the attribute specified in
  conf.ldap.user_domain_id_attribute which defaults to
  'businessCategory'.

  My understanding is that this is no longer required and should no
  longer be allowed and indeed in practice it completely overrides any
  domain information that is provided in the authentication body.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1209440/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1220945] Re: Create user with LDAP enabled_mask, enabled not boolean

2013-10-02 Thread Thierry Carrez
** Changed in: keystone
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1220945

Title:
  Create user with LDAP enabled_mask, enabled not boolean

Status in OpenStack Identity (Keystone):
  Fix Released

Bug description:
  When set up Keystone to use the LDAP identity backend and set
  user_enabled_mask to non-zero and then create a user with enabled
  set to 'false', the enabled value comes back as a number rather than
  a boolean. This is unexpected because the SQL backend always returns a
  boolean.

  Here's an example:

  $ curl -s \
-H X-Auth-Token: $TOKEN \
-H Content-Type: application/json \
--data '{user: {name: blk-test1, enabled: false}}' \
http://localhost:35357/v3/users | python -mjson.tool
  {
  user: {
  domain_id: default,
  enabled: 514,
  id: e5d09e0ff7944b28b151865ed6b300ba,
  links: {
  self: 
http://192.168.122.176:5000/v3/users/e5d09e0ff7944b28b151865ed6b300ba;
  },
  name: blk-test1
  }
  }

  -- enabled should be false and not 514.

  Here's the output when use the SQL identity backend:

  {
  user: {
  domain_id: default,
  enabled: false,
  id: 73734048e27545f185e2a37eda08f593,
  links: {
  self: 
http://192.168.122.176:5000/v3/users/73734048e27545f185e2a37eda08f593;
  },
  name: blk-test1
  }
  }

  
  To recreate, set in keystone.conf.sample:
  user_enabled_attribute = employeeType
  user_enabled_mask = 2
  user_enabled_default = 512

  Next, 
  change devstack to not set enabled in lib/keystone,
  configure localrc to use LDAP,
  start devstack, 
  and then run the curl command above.

  
  Note that when do an update, the enabled value is a Boolean and the 
enabled_nomask value is returned:

  curl -s \
   -X PATCH \
   -H X-Auth-Token: $TOKEN \
   -H Content-Type: application/json \
   --data '{user: {enabled: false}}' \
   http://localhost:35357/v3/users/$USER_ID | python -mjson.tool
  {
  user: {
  domain_id: default,
  enabled: true,
  enabled_nomask: 512,
  id: 4c6aebecf60e441dbbdb678405d4f5ab,
  links: {
  self: 
http://192.168.122.176:5000/v3/users/4c6aebecf60e441dbbdb678405d4f5ab;
  },
  name: demo
  }
  }

  Creating a user should probably work similarly to this, although I
  don't see how the enabled_nomask value is useful to anyone.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1220945/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1221889] Re: Invalid X-Subject-Token results in HTTP 401 rather than 404

2013-10-02 Thread Thierry Carrez
** Changed in: keystone
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1221889

Title:
  Invalid X-Subject-Token results in HTTP 401 rather than 404

Status in OpenStack Identity (Keystone):
  Fix Released
Status in Tempest:
  In Progress

Bug description:
  While fixing https://bugs.launchpad.net/keystone/+bug/1186059 I observed that 
lots of unit tests related to V3 head test is not correct.
  e.g. all the below unit test try to make a head call after deleting/revoking 
x-subject-token and assumes that it will be unauthorized.
  self.head('/auth/tokens', headers={'X-Subject-Token': token2}, 
expected_status=401)
  In reality the above call creates another scoped token and auth passed with 
the new token, in that case 401 is not a correct test it should be 404 which is 
also aligned with docs 
https://github.com/openstack/identity-api/blob/master/openstack-identity-api/v3/src/markdown/identity-api-v3.md#403-forbidden.
 

  test_deleting_group_grant_revokes_tokens 
(keystone.tests.test_v3_auth.TestTokenRevoking)
  test_deleting_project_revokes_token 
(keystone.tests.test_v3_auth.TestTokenRevoking)
  test_deleting_user_grant_revokes_token 
(keystone.tests.test_v3_auth.TestTokenRevoking)
  test_disabling_project_revokes_token 
(keystone.tests.test_v3_auth.TestTokenRevoking)
  test_group_membership_changes_revokes_token 
(keystone.tests.test_v3_auth.TestTokenRevoking)
  test_removing_role_assignment_does_not_affect_other_users 
(keystone.tests.test_v3_auth.TestTokenRevoking)

  I found this issue with lots of V3 token related tests but as per
  Morgan Fainberg (morganfainberg) this also affecting V2 auth unit
  tests.

  I am trying to fix V3 auth unit test issue as part of
  https://bugs.launchpad.net/keystone/+bug/1186059

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1221889/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1219739] Re: Inconsistent use of tenant_id, tenantId, default_project_id across identity drivers for the User object/ref

2013-10-02 Thread Thierry Carrez
** Changed in: keystone
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1219739

Title:
  Inconsistent use of tenant_id, tenantId, default_project_id across
  identity drivers for the User object/ref

Status in OpenStack Identity (Keystone):
  Fix Released

Bug description:
  When LDAP backend is configured, keystone user-get user-id can
  *NOT*  display 'tanantId'.

  I looked up the code,  user in LDAP dose not have attribute
  tenantId, but it has an attribute named tenant_id.

  This problem blocks us.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1219739/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1210515] Re: keystone chokes on empty description field in active directory

2013-10-02 Thread Thierry Carrez
** Changed in: keystone
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1210515

Title:
  keystone chokes on empty description field in active directory

Status in OpenStack Identity (Keystone):
  Fix Released

Bug description:
  I configured keystone (from grizzly) with an active directory backend, 
following https://wiki.openstack.org/wiki/HowtoIntegrateKeystonewithAD.
  It works so far. 

  Now I can create projects in horizon (tenants in keystone) with an
  empty description field. The result is that there is no attribute
  description for that tenant in AD. When I then try to edit such a
  project (e.g. add description, or add member), I get an

  Error: Unable to modify project test02.

  message from horizon, and in keystone.log I see

  2013-08-09 15:07:23ERROR [root] u'description'
  Traceback (most recent call last):
File /usr/lib/python2.6/site-packages/keystone/common/wsgi.py, line 236, 
in __call__
  result = method(context, **params)
File /usr/lib/python2.6/site-packages/keystone/identity/controllers.py, 
line 115, in update_project
  context, tenant_id, clean_tenant)
File /usr/lib/python2.6/site-packages/keystone/common/manager.py, line 
47, in _wrapper
  return f(*args, **kw)
File 
/usr/lib/python2.6/site-packages/keystone/identity/backends/ldap/core.py, 
line 229, in update_project
  return self._set_default_domain(self.project.update(tenant_id, tenant))
File 
/usr/lib/python2.6/site-packages/keystone/identity/backends/ldap/core.py, 
line 614, in update
  return super(ProjectApi, self).update(id, values, old_obj)
File /usr/lib/python2.6/site-packages/keystone/common/ldap/core.py, line 
586, in update
  object_id, values, old_obj)
File /usr/lib/python2.6/site-packages/keystone/common/ldap/core.py, line 
328, in update
  elif old_obj[k] != v:
  KeyError: u'description'

  I can add a description attribute to AD via its ldap interface using
  ldapmodify. Then I can modify the project without problems. I think
  keystone should be able to deal with a missing description field if
  its optional at creation time.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1210515/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1214016] Re: CA key and signing key are not really password protected

2013-10-02 Thread Thierry Carrez
** Changed in: keystone
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1214016

Title:
  CA key and signing key are not really password protected

Status in OpenStack Identity (Keystone):
  Fix Released

Bug description:
  OpenSSL offers two methods to protect sensitive cryptographic keys.

  1) standard file system permissions on key file
  2) encrypting the key file with a password, i.e. PBE (Password Passed 
Encryption)

  The key management code in keystone/common/openssl.py is confused to
  to whether it's encrypting keys or not.

  The keystone configuration defines a ssl.ca_password and
  signing.ca_password configuration option. These are defined in
  keystone/common/config.py and etc/keystone.conf.sample.

  However these passwords are never actually used to password protect
  any of the keys.

  The only use of either of the ca_password variables is a no-op when
  the CA self-signed cert is created in
  BaseCertificateConfigure.build_ca_cert()

  if not file_exists(ca_cert):
  self.exec_command('openssl req -new -x509 -extensions v3_ca '
'-passin pass:%(ca_password)s '
'-key %(ca_private_key)s -out %(ca_cert)s '
   ...

  In this instance there is no  point in passing in a password to
  decrypt the ca_private_key file because the ca_private_key file was
  never encrypted to begin with.

  The ca_private_key file is created a few lines above with this code:

  self.exec_command('openssl genrsa -out %(ca_private_key)s '
'%(key_size)d')

  To have applied PBE (Password Based Encryption) to the ca_private_key
  the openssl genrsa command would need to have included the -passout
  arg (i.e. the password to encrypt the output file with, the output
  file is the key) and the encryption method which is either DES,
  triple-DES, or IDEA (-des, -des3, or -idea respectively).

  The same problems exist with respect to the signing key.

  Issue:

  The point of protecting a key with a password is to further protect
  the key (keys are the most security sensitive components, especially
  both the CA and signing key). But using PBE on the keys currently
  requires storing the password in a configuration file which can only
  be protected by file system permissions. Thus using PBE on keys may
  not offer much additional security if the configuration file
  containing the key password can be read by an unauthorized user. If an
  attacker can read the file containing the password they probably also
  can read the key file or visa-versa. On the other hand one more layer
  of security doesn't hurt (perhaps the attacker only stole the key file
  because it's an obvious target but failed to find or obtain the config
  file with the password needed to extract the key from the key file.

  As to which PBE scheme to use? DES is too weak. It's too bad AES is
  not an option. IDEA is faster and probably stronger than triple-DES
  (the patent protection on IDEA just recently expired so there
  shouldn't be any licensing issues)

  Summary:

  The the presence of key passwords in the configuration options gives
  the false illusion keys are password protected when in fact they
  aren't The only use of the password option in the current code is
  meaningless because it's being used to unlock a key file that was
  never locked in the first place.

  Either the key passwords should be removed (because they aren't
  actually used) or they should be used consistently to lock and unlock
  the keys.

  The security vulnerability is probably just do we want to alert folks
  that the key passwords are not actually used? and by extension
  grabbing the key file is sufficient to initiate an attack because
  you'll have immediate access to the key.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1214016/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1201487] Re: listing projects for a user omits those that only have group related roles

2013-10-02 Thread Thierry Carrez
** Changed in: keystone
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1201487

Title:
  listing projects for a user omits those that only have group related
  roles

Status in OpenStack Identity (Keystone):
  Fix Released

Bug description:
  The backend drivers currently support two (very similar) functions:

  list_user_projects() and get_projects_for_user().  Both claim to
  return the list of projects for which a user has a role on.  Neither
  take into account roles by virtue of group membership.  They are used
  in the following ways:

  uses list_user_projects() is used by:

  - The API GET /users/{user_id}/projects

  users get_projects_for_user() is used by

  - The diablo GET /users/{user_id}/roleRefs (should we still need to support 
this?)
  - The API GET/tenants, where you get all projects referenced the user in the 
token (weird)
  - An unused function the v2 controller (which we should delete)

  We should rationalize the above to use a single function in the driver
  manager (similar to the way we do get_roles_for_user_and_project() ),
  that correctly accounts for any projects for a which a user also has
  roles by virtue of group membership.

  If the os-inherit extension is installed, the above function should
  also take into account roles inherited from the domain.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1201487/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1221087] Re: Memcached token backend should work with any timezone

2013-10-02 Thread Thierry Carrez
** Changed in: keystone
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1221087

Title:
  Memcached token backend should work with any timezone

Status in OpenStack Identity (Keystone):
  Fix Released

Bug description:
  In configuration document, it looks like following configuration are
  required with memcache token backend.

  - Memcached server's timezone is set to UTC.
  - Timezone of both Memcached and Keystone server should be same.
  So Keystone server's timezone is  also set to UTC.

  http://docs.openstack.org/developer/keystone/configuration.html
  #memcached-and-system-time

  I guess this limitation is caused by incorrect expiration time is set
  when tokens are generated.

  backends/memcache.py call utils.unixtime() and it calls time.mktime().
  time.mktime() return localtime, not UTC, so its value depends on time zone.

  In my tests, if keystone server runs with UTC + N (N=1), token
  authorization failed.

  # run keystone server with UTC+1
   env TZ='UTC-1' tools/with_venv.sh bin/keystone-all
  # get token
   env TZ=UTC tools/with_venv.sh keystone .. token-get
  +---+--+
  |  Property |  Value   |
  +---+--+
  |  expires  |   2013-09-05T08:38:14Z   |
  | id| fecd5f9e1c1842f0a60d86a07584fca4 |
  | tenant_id | 7b1abdb5213a4962bcaf04a7e0881a91 |
  |  user_id  | 03a2d2e23ff94bfa908856d2c1081110 |
  +---+--+
  # use token
   env TZ=UTC curl -H X-Auth-Token:$TOKEN  http://localhost:5000/v2.0/tenants
  {error: {message: Could not find token, 
fecd5f9e1c1842f0a60d86a07584fca4., code: 401, title: Unauthorized}}

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1221087/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1182861] Re: Switch to oslo.config 1.2.0 final

2013-10-02 Thread Thierry Carrez
** Changed in: keystone
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1182861

Title:
  Switch to oslo.config 1.2.0 final

Status in Ceilometer:
  Fix Committed
Status in OpenStack Image Registry and Delivery Service (Glance):
  Fix Committed
Status in Orchestration API (Heat):
  Fix Committed
Status in OpenStack Identity (Keystone):
  Fix Released
Status in OpenStack Message Queuing Service (Marconi):
  Fix Committed
Status in OpenStack Neutron (virtual network service):
  Fix Committed
Status in OpenStack Compute (Nova):
  Fix Committed
Status in Oslo - a Library of Common OpenStack Code:
  Fix Released
Status in Python client library for Keystone:
  Fix Committed
Status in Trove - Database as a Service:
  Fix Committed

Bug description:
  These commits:

  https://review.openstack.org/#/q/I7826087147e0713edaaea85a72283998295e2281,n,z

  mean we're using an oslo.config tarball from
  http://tarballs.openstack.org/oslo.config/

  Once oslo.config-1.2.0 has been published to pypi, we should switch
  to:

oslo.config=1.2.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ceilometer/+bug/1182861/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1153645] Re: Deleting a role should revoke any tokens associated with it

2013-10-02 Thread Thierry Carrez
** Changed in: keystone
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1153645

Title:
  Deleting a role should revoke any tokens associated with it

Status in OpenStack Identity (Keystone):
  Fix Released

Bug description:
  When we delete a role, we delete all the grants associated with it.
  Since this is a bit like an enforced revoking of user/groups grants,
  we should invalidate any tokens:

  - for users that have had any grant using this role
  - for users of any group that has had a grant using this role

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1153645/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1172164] Re: Ldap server down error in logs

2013-10-02 Thread Thierry Carrez
** Changed in: keystone
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1172164

Title:
  Ldap server down error in logs

Status in OpenStack Identity (Keystone):
  Fix Released

Bug description:
  We are experiencing some errors in authentication and looking into the
  logs we discover ldap server down messages from time to time in the
  keystone log.

  DEBUG Trace in keystone.log

  2013-04-09 06:44:03 ERROR [root]
  {'desc': Can't contact LDAP server}
  Traceback (most recent call last):
  File /usr/lib/python2.6/site-packages/keystone/common/wsgi.py, line 204, in 
_call_
  File /usr/lib/python2.6/site-packages/keystone/service.py, line 317, in 
authenticate
  File /usr/lib/python2.6/site-packages/keystone/common/manager.py, line 47, 
in _wrapper
  File 
/usr/lib/python2.6/site-packages/keystone/identity/backends/ldap/core.py, 
line 99, in authenticate
  File 
/usr/lib/python2.6/site-packages/keystone/identity/backends/ldap/core.py, 
line 175, in get_tenants_for_user
  File 
/usr/lib/python2.6/site-packages/keystone/identity/backends/ldap/core.py, 
line 137, in get_user
  File 
/usr/lib/python2.6/site-packages/keystone/identity/backends/ldap/core.py, 
line 132, in _get_user
  File 
/usr/lib/python2.6/site-packages/keystone/identity/backends/ldap/core.py, 
line 374, in get
  File /usr/lib/python2.6/site-packages/keystone/common/ldap/core.py, line 
245, in get
  File /usr/lib/python2.6/site-packages/keystone/common/ldap/core.py, line 
208, in _ldap_get
  File /usr/lib/python2.6/site-packages/keystone/common/ldap/core.py, line 
134, in get_connection
  File /usr/lib/python2.6/site-packages/keystone/common/ldap/core.py, line 
354, in simple_bind_s
  File /usr/lib64/python2.6/site-packages/ldap/ldapobject.py, line 206, in 
simple_bind_s
  File /usr/lib64/python2.6/site-packages/ldap/ldapobject.py, line 200, in 
simple_bind
  File /usr/lib64/python2.6/site-packages/ldap/ldapobject.py, line 96, in 
_ldap_call
  SERVER_DOWN:
  {'desc': Can't contact LDAP server}

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1172164/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1201251] Re: issues of updating user via keystone rest api

2013-10-02 Thread Thierry Carrez
** Changed in: keystone
   Status: Fix Committed = Fix Released

** Changed in: keystone
Milestone: None = havana-rc1

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1201251

Title:
  issues of updating user via keystone rest api

Status in OpenStack Identity (Keystone):
  Fix Released

Bug description:
  We found two problems related to updating user via keystone.

  (1) Via, the instruction of updating user on,
  http://docs.openstack.org/api/openstack-identity-
  service/2.0/content/POST_updateUser_v2.0_users__userId__.html

  It is required POST action to update the existing user email, name, or
  description.

  Via my verification, POST to update existing user caused
  {
  error: {
  message: The resource could not be found.,
  code: 404,
  title: Not Found
  }
  }

  The detailed for this test is,
  [root@lijunj ~]# curl -i 
http://localhost:35357/v3/users/fee07a4ebc014744b31564835b715aa1 -X POST -H 
Content-Type: application/json -H Accept: application/json -H 
X-Auth-Token: ADMIN --data '
   {
   user: {
   id: fee07a4ebc014744b31564835b715aa1,
   description: v3 keystone user test,
   email: none@,
   enabled: true
   }
   }'
  HTTP/1.1 404 Not Found
  Vary: X-Auth-Token
  Content-Type: application/json
  Content-Length: 93
  Date: Mon, 15 Jul 2013 02:23:44 GMT

  {error: {message: The resource could not be found., code: 404,
  title: Not Found}}

  I ensure the id fee07a4ebc014744b31564835b715aa1 user which is exisitng 
already in environment. Below is the output of listing 
v3/users/fee07a4ebc014744b31564835b715aa1
  --List user
  [root@lijunj ~]#  curl -i 
http://localhost:35357/v3/users/fee07a4ebc014744b31564835b715aa1 -X GET -H 
Content-Type: application/json -H Accept: application/json -H 
X-Auth-Token: ADMIN
  HTTP/1.1 200 OK
  Vary: X-Auth-Token
  Content-Type: application/json
  Content-Length: 349
  Date: Mon, 15 Jul 2013 02:24:51 GMT

  {user: {aa: 12, name: test, bb: 23, debug-
  wrongattribute: 12345, cc: 45, enabled: true, links:
  {self:
  http://localhost:5000/v3/users/fee07a4ebc014744b31564835b715aa1},
  id: fee07a4ebc014744b31564835b715aa1, email:
  lijun...@cn.ibm.com, debug_wrongattribute: 12345, domain_id:
  default, tenantId: }}

  The user fee07a4ebc014744b31564835b715aa1 was created for testing.

  We may discuss this document correction-ability. And, POST can not be
  used for updating user, but PUT action can.

  (2) Document in http://docs.openstack.org/ does mention, updating user
  can not support to refresh a user tenant id/ project id. And keystone
  user-update command is designed not to allow to have any parameter to
  refresh tenant-id / project-id of a user. But REST API keeps silent
  for any clients attempt to change a existing user tenant id or project
  id. From my test verification, in spite of changing successfully
  tenant/project id for a existing user, the user still belongs to the
  original tenant / project. That means, updating tenant / project id
  for a user is invalid.

  --Create user
  curl -i http://localhost:35357/v2.0/users/ -X POST -H Content-Type: 
application/json -H X-Auth-Token: ADMIN --data '
  {
  user: {
  name: li-03,
  description: v2.0 keystone user test,
  email: none@,
  tenantId: ccaf7621482a41ce91d3ee824ff7c959,
  password: passw0rd,
  enabled: true
  }
  }'
  Response:
  {user: {description: v2.0 keystone user test, name: li-03, 
enabled: true, email: none@, id: 00027b03821f4b7590a1a94f865a61ff, 
tenantId: ccaf7621482a41ce91d3ee824ff7c959}}

  -- List the tenant users.
  curl -i 
http://localhost:35357/v2.0/tenants/ccaf7621482a41ce91d3ee824ff7c959/users -X 
GET -H Content-Type: application/json -H X-Auth-Token: ADMIN

  {users: [{name: sceagent, id: 07d544b772ce4ab18592d165cea9b8da, 
tenantId:
  //The content is not important. li-03 is in tenant 
ccaf7621482a41ce91d3ee824ff7c959 already.
   {name: li-03, description: v2.0 keystone user test, enabled: true, 
email: none@, id: 00027b03821f4b7590a1a94f865a61ff, tenantId: 
ccaf7621482a41ce91d3ee824ff7c959}]}

  --Update user. Used anther tenant id inside, and rest api does not throw 
exception.
  curl -i http://localhost:35357/v2.0/users/00027b03821f4b7590a1a94f865a61ff -X 
PUT -H Content-Type: application/json -H X-Auth-Token: ADMIN --data '
  {
  user: {
  name: li-03,
  description: v2.0 keystone user test 01,
  email: none@,
  tenantId: e0cdb35aa15d45f998c308eb78407513,
  password: passw0rd,
  enabled: true
  }
  }'

  Response:
  {user: {description: v2.0 keystone user test 01, name: li-03, 
extra: {tenantId: e0cdb35aa15d45f998c308eb78407513, description: v2.0 
keystone user test 01, email: none@}, enabled: true, email: none@, 
id: 00027b03821f4b7590a1a94f865a61ff, 

[Yahoo-eng-team] [Bug 1233357] Re: tox config can pull in broken sphinx

2013-10-02 Thread Thierry Carrez
** Changed in: keystone
   Status: Fix Committed = Fix Released

** Changed in: keystone
Milestone: None = havana-rc1

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1233357

Title:
  tox config can pull in broken sphinx

Status in OpenStack Identity (Keystone):
  Fix Released

Bug description:
  The latest version of tox supplies the --pre option to pip which
  'helpfully' preserves the old behavior of downloading unrequested pre-
  release versions of things. We wanted to upgrade tox and pip precisely
  to get the behavior where we want to explicitly ask for pre-release
  software.

  A fix is to override the install command in the tox.ini file so that
  we're explicit in what we want pip to do.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1233357/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1233359] Re: Exclude tests dir from coverage reports

2013-10-02 Thread Thierry Carrez
** Changed in: keystone
   Status: Fix Committed = Fix Released

** Changed in: keystone
Milestone: None = havana-rc1

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1233359

Title:
  Exclude tests dir from coverage reports

Status in OpenStack Identity (Keystone):
  Fix Released

Bug description:
  After moving the tests dir into the package, the code itself is
  getting found by the coverage reports. Of course, coverage reports on
  test code is silly, so exclude those dirs.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1233359/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1233224] Re: Running individual tests in the test suite is failing

2013-10-02 Thread Thierry Carrez
** Changed in: keystone
   Status: Fix Committed = Fix Released

** Changed in: keystone
Milestone: None = havana-rc1

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1233224

Title:
  Running individual tests in the test suite is failing

Status in OpenStack Identity (Keystone):
  Fix Released

Bug description:
  Change I0fd0be98: sync oslo policy
  (https://review.openstack.org/#/c/48111/) was merged over the weekend
  and broke test functionality for me.  Our base TestCase tries to set
  the policy_file option before it is declared.

  Really there are two reasons for this:

1. Not all of the necessary state is setup before the test run
2. Some of the tests depend on things that are unrelated to the 
functionality under test (e.g.  why would XML serialization test be broken by 
changes to the keystone command-line options?)

  
  When I run:

$ ./run_tests.sh test_serializer.py

  I get lots of these:

_StringException: Traceback (most recent call last):
  File /opt/stack/keystone/keystone/tests/core.py, line 259, in setUp
self.opt(policy_file=etcdir('policy.json'))
  File /opt/stack/keystone/keystone/tests/core.py, line 296, in opt
CONF.set_override(k, v)
  File 
/opt/stack/keystone/.venv/local/lib/python2.7/site-packages/oslo/config/cfg.py,
 line 1579, in __inner
result = f(self, *args, **kwargs)
  File 
/opt/stack/keystone/.venv/local/lib/python2.7/site-packages/oslo/config/cfg.py,
 line 1825, in set_override
opt_info = self._get_opt_info(name, group)
  File 
/opt/stack/keystone/.venv/local/lib/python2.7/site-packages/oslo/config/cfg.py,
 line 2095, in _get_opt_info
raise NoSuchOptError(opt_name, group)
NoSuchOptError: no such option: policy_file

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1233224/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1223524] Re: Inactive oauth extension creates dependency on httplib2

2013-10-02 Thread Thierry Carrez
** Changed in: keystone
   Status: Fix Committed = Fix Released

** Changed in: keystone
Milestone: None = havana-rc1

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1223524

Title:
  Inactive oauth extension creates dependency on httplib2

Status in OpenStack Identity (Keystone):
  Fix Released

Bug description:
  The dependency resoution in Keystone requires that an object be
  explicitly instantiated prior to use.  Extensions fall into this
  category.  They are referenced in keystone/serivce.py such as:

  from keystone.contrib import endpoint_filter
  from keystone.contrib import oauth1

  These components pull in other dependencies.  In the case of oauth, it
  is httplib2.

  We can  extend this method

  
https://github.com/openstack/keystone/blob/master/keystone/common/wsgi.py#L536-L563

  here

  
https://github.com/openstack/keystone/blob/master/keystone/contrib/oauth1/routers.py#L21

  And activate the Manager upon creating of the routes, which indicates
  they will actually be used in the deployment.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1223524/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1220359] Re: High numbers of revocation events cause excessive cache churn

2013-10-02 Thread Thierry Carrez
** Changed in: keystone
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1220359

Title:
  High numbers of revocation events cause excessive cache churn

Status in OpenStack Identity (Keystone):
  Fix Released

Bug description:
  Due to the explicit refresh on the revocation list cache, when a
  revocation event occurs there is an added extra load to the Keystone
  processes.  This should be changed to an invalidate of cache to ensure
  that we do not have to regenerate the revocation_list except on actual
  demand.  This reduces overall lock contention when using memcache /
  redis / external storage as the cache layer.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1220359/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1214176] Re: Fix copyright headers to be compliant with Foundation policies

2013-10-02 Thread Thierry Carrez
** Changed in: keystone
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1214176

Title:
  Fix copyright headers to be compliant with Foundation policies

Status in Ceilometer:
  Fix Committed
Status in devstack - openstack dev environments:
  In Progress
Status in OpenStack Hacking Guidelines:
  In Progress
Status in Orchestration API (Heat):
  Fix Committed
Status in OpenStack Dashboard (Horizon):
  Fix Committed
Status in Ironic (Bare Metal Provisioning):
  Fix Committed
Status in OpenStack Identity (Keystone):
  Fix Released
Status in OpenStack Neutron (virtual network service):
  Fix Committed
Status in OpenStack Compute (Nova):
  In Progress
Status in Python client library for Ceilometer:
  Fix Committed
Status in Python client library for Cinder:
  In Progress
Status in Python client library for Glance:
  In Progress
Status in Python client library for heat:
  Fix Released
Status in Python client library for Keystone:
  In Progress
Status in Trove client binding:
  Fix Committed
Status in OpenStack Object Storage (Swift):
  In Progress
Status in Tempest:
  In Progress
Status in Trove - Database as a Service:
  Fix Committed

Bug description:
  Correct the copyright headers to be consistent with the policies
  outlined by the OpenStack Foundation at http://www.openstack.org/brand
  /openstack-trademark-policy/

  Remove references to OpenStack LLC, replace with OpenStack Foundation

To manage notifications about this bug go to:
https://bugs.launchpad.net/ceilometer/+bug/1214176/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1223036] Re: creating project in invalid domain raises SQL exception

2013-10-02 Thread Thierry Carrez
** Changed in: keystone
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1223036

Title:
  creating project in invalid domain raises SQL exception

Status in OpenStack Identity (Keystone):
  Fix Released

Bug description:
  V3 API

  export KEYSTONE_TOKEN=`keystone token-get | awk '/ id / { print $4}'`

  
  curl -H X-Auth-Token:$KEYSTONE_TOKEN -d  
'{project:{domain_id:invalid-domain, name:projectY}}' -H 
Content-Type: application/json   http://localhost:35357/v3/projects


  {error: {message: Conflict occurred attempting to store project.
  (1452, 'Cannot add or update a child row: a foreign key constraint
  fails (`keystone`.`project`, CONSTRAINT `project_ibfk_1` FOREIGN KEY
  (`domain_id`) REFERENCES `domain` (`id`))'), code: 409, title:
  Conflict}}(.venv)[ayoung@ayoung530 keystone

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1223036/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1220937] Re: with_venv.sh should enclose command args

2013-10-02 Thread Thierry Carrez
** Changed in: keystone
   Status: Fix Committed = Fix Released

** Changed in: keystone
Milestone: None = havana-rc1

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1220937

Title:
  with_venv.sh should enclose command args

Status in OpenStack Image Registry and Delivery Service (Glance):
  In Progress
Status in Orchestration API (Heat):
  Fix Committed
Status in OpenStack Dashboard (Horizon):
  Fix Committed
Status in OpenStack Identity (Keystone):
  Fix Released
Status in OpenStack Neutron (virtual network service):
  Fix Committed
Status in Trove - Database as a Service:
  Fix Released

Bug description:
  $ tools/with_venv.sh neutron --os-username admin 1 net-show net 1
  Unknown command [u'1', u'net-show', u'net', u'1']

  after enclose command in with_venv.sh
  $ tools/with_venv.sh neutron --os-username admin 1 net-show net 1
  You must provide a password via either --os-password or env[OS_PASSWORD]

To manage notifications about this bug go to:
https://bugs.launchpad.net/glance/+bug/1220937/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1224320] Re: Tests for revocation should be forward-ported to master

2013-10-02 Thread Thierry Carrez
** Changed in: keystone
   Status: Fix Committed = Fix Released

** Changed in: keystone
Milestone: None = havana-rc1

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1224320

Title:
  Tests for revocation should be forward-ported to master

Status in OpenStack Identity (Keystone):
  Fix Released

Bug description:
  The fix for [OSSA 2013-025] PKI tokens are never revoked using
  memcache token backend (CVE-2013-4294) on bug 1202952 included new
  tests to check for the revocation behavior. Even if the vulnerability
  does not affect Havana/master, those tests should be forward-ported.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1224320/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1226374] Re: misused assertTrue in unit tests

2013-10-02 Thread Thierry Carrez
** Changed in: keystone
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1226374

Title:
   misused assertTrue in unit tests

Status in OpenStack Image Registry and Delivery Service (Glance):
  In Progress
Status in Orchestration API (Heat):
  Fix Committed
Status in Ironic (Bare Metal Provisioning):
  Fix Committed
Status in OpenStack Identity (Keystone):
  Fix Released
Status in Oslo - a Library of Common OpenStack Code:
  Fix Released
Status in Python client library for Keystone:
  Fix Committed
Status in OpenStack Object Storage (Swift):
  Fix Committed
Status in Tempest:
  Fix Committed

Bug description:
  1)signature for  assertTure:
  def failUnless(self, expr, msg=None):
  Fail the test unless the expression is true.
  if not expr: raise self.failureException, msg
   
  assert_ = assertTrue = failUnless

  2) signature for assertEqual:
  def failUnlessEqual(self, first, second, msg=None):
  Fail if the two objects are unequal as determined by the '=='
 operator.
  
  if not first == second:
  raise self.failureException, \
(msg or '%r != %r' % (first, second))
...
assertEqual = assertEquals = failUnlessEqual

  assertTrue used to evaluate  one expression
  assertEqual used to compare two  expressions

  If passed two expressions to assertTrue  , it always evaluate first
  expression . That 's not expected .

To manage notifications about this bug go to:
https://bugs.launchpad.net/glance/+bug/1226374/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1222574] Re: Test for list_users in test_backend is not safe

2013-10-02 Thread Thierry Carrez
** Changed in: keystone
   Status: Fix Committed = Fix Released

** Changed in: keystone
Milestone: None = havana-rc1

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1222574

Title:
  Test for list_users in test_backend is not safe

Status in OpenStack Identity (Keystone):
  Fix Released

Bug description:
  The test for list_users in test_backend is written as:

  def test_list_users(self):
  users = self.identity_api.list_users()
  for test_user in default_fixtures.USERS:
  self.assertTrue(x for x in users if x['id'] == test_user['id'])

  This is not safe.  You can show this by, for instance, setting users =
  [] instead of the correct result from self.identity_api.list_users()
  and no asset is raised

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1222574/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1233362] Re: d2to1 triggers setuptools upgrade bug on old pip versions

2013-10-02 Thread Thierry Carrez
** Changed in: keystone
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1233362

Title:
  d2to1 triggers setuptools upgrade bug on old pip versions

Status in OpenStack Identity (Keystone):
  Fix Released

Bug description:
  pbr used to be based on d2to1, and we included it in our
  setup_requires. Then setuptools and distribute re-merged, and a set of
  depends in d2to1 cause the transient setuptools upgrade issue to
  surface if the user is running old distribute AND an old version of
  pip, potentially breaking the system.

  To fix it, we removed use of d2to1 from pbr, but we're still
  referencing it in a few places around OpenStack. We need to remove
  them.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1233362/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1181155] Re: Dashboard doesn't list floating IP associated with VM instance

2013-10-02 Thread Akihiro Motoki
If we improve the issue reported, it should be fixed in nova not horizon, 
though I think it is still acceptable.
I will mark this bug as Won't fix.

** Changed in: horizon
   Status: Incomplete = Won't Fix

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1181155

Title:
  Dashboard doesn't list floating IP associated with VM instance

Status in OpenStack Dashboard (Horizon):
  Won't Fix
Status in Ubuntu:
  Confirmed

Bug description:
  I upgraded my existing setup from folsom to grizzly. Then I was able
  to successfully associate floating IP to VM instances form dashboard.
  But dashboard then doesn't list associated floating IP. It is very
  difficult for user to remember what floating IP is associated with
  each instance (as our quota per user is really large, it is impossible
  to remember unless you note down somewhere).

  So for time being, till this is fixed, pl atleast suggest some
  workaround as our user base for this setup is high so impact here is
  also high.

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1181155/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1229475] Re: terminate_instance(): RuntimeError: Second simultaneous read on fileno 16 detected

2013-10-02 Thread Russell Bryant
Marking Incomplete for Nova, because I don't think we have found the
root cause yet, so it still may be nova's fault.

** Changed in: nova
Milestone: havana-rc1 = None

** Changed in: nova
   Status: Invalid = Incomplete

** Tags added: havana-rc-potential

** Changed in: python-neutronclient
   Importance: Undecided = High

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1229475

Title:
  terminate_instance(): RuntimeError: Second simultaneous read on fileno
  16 detected

Status in OpenStack Compute (Nova):
  Incomplete
Status in Python client library for Neutron:
  In Progress

Bug description:
  http://logs.openstack.org/59/47659/6/check/gate-tempest-devstack-vm-
  neutron/fc83d44/logs/screen-n-cpu.txt.gz#_2013-09-23_18_25_06_484


  2013-09-23 18:25:06.484 ERROR nova.openstack.common.rpc.amqp 
[req-3a80ff5a-817b-4eb8-be67-7f180bef8a6e demo demo] Exception during message 
handling
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp Traceback 
(most recent call last):
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp   File 
/opt/stack/new/nova/nova/openstack/common/rpc/amqp.py, line 461, in 
_process_data
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp **args)
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp   File 
/opt/stack/new/nova/nova/openstack/common/rpc/dispatcher.py, line 172, in 
dispatch
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp result 
= getattr(proxyobj, method)(ctxt, **kwargs)
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp   File 
/opt/stack/new/nova/nova/compute/manager.py, line 354, in decorated_function
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp return 
function(self, context, *args, **kwargs)
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp   File 
/opt/stack/new/nova/nova/exception.py, line 90, in wrapped
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp payload)
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp   File 
/opt/stack/new/nova/nova/exception.py, line 73, in wrapped
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp return 
f(self, context, *args, **kw)
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp   File 
/opt/stack/new/nova/nova/compute/manager.py, line 244, in decorated_function
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp pass
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp   File 
/opt/stack/new/nova/nova/compute/manager.py, line 230, in decorated_function
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp return 
function(self, context, *args, **kwargs)
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp   File 
/opt/stack/new/nova/nova/compute/manager.py, line 295, in decorated_function
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp 
function(self, context, *args, **kwargs)
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp   File 
/opt/stack/new/nova/nova/compute/manager.py, line 272, in decorated_function
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp e, 
sys.exc_info())
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp   File 
/opt/stack/new/nova/nova/compute/manager.py, line 259, in decorated_function
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp return 
function(self, context, *args, **kwargs)
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp   File 
/opt/stack/new/nova/nova/compute/manager.py, line 1793, in terminate_instance
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp 
do_terminate_instance(instance, bdms)
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp   File 
/opt/stack/new/nova/nova/openstack/common/lockutils.py, line 246, in inner
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp return 
f(*args, **kwargs)
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp   File 
/opt/stack/new/nova/nova/compute/manager.py, line 1785, in 
do_terminate_instance
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp 
reservations=reservations)
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp   File 
/opt/stack/new/nova/nova/hooks.py, line 105, in inner
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp rv = 
f(*args, **kwargs)
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp   File 
/opt/stack/new/nova/nova/compute/manager.py, line 1758, in _delete_instance
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp 
user_id=user_id)
  2013-09-23 18:25:06.484 3476 TRACE nova.openstack.common.rpc.amqp   

[Yahoo-eng-team] [Bug 1223161] Re: FAIL: tempest.thirdparty.boto.test_ec2_instance_run.InstanceRunTest.test_run_stop_terminate_instance -- Malformed request body: Cannot understand JSON

2013-10-02 Thread Russell Bryant
*** This bug is a duplicate of bug 1229475 ***
https://bugs.launchpad.net/bugs/1229475

Yes, I think this is a side effect of bug 1229475.  While investigating
that bug, I saw these types of failures, where neutronclient was getting
data from rabbitmq, due to it using a bogus fd that was in use by the
rpc code at the time.

** This bug has been marked a duplicate of bug 1229475
   terminate_instance(): RuntimeError: Second simultaneous read on fileno 16 
detected

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1223161

Title:
  FAIL:
  
tempest.thirdparty.boto.test_ec2_instance_run.InstanceRunTest.test_run_stop_terminate_instance
  --  Malformed request body: Cannot understand JSON

Status in OpenStack Neutron (virtual network service):
  New
Status in OpenStack Compute (Nova):
  Confirmed
Status in Tempest:
  Confirmed

Bug description:
  See http://logs.openstack.org/98/44098/11/check/gate-tempest-devstack-
  vm-neutron/68c9a41/console.html

  2013-09-10 03:26:06.136 | 
==
  2013-09-10 03:26:06.136 | FAIL: 
tempest.thirdparty.boto.test_ec2_instance_run.InstanceRunTest.test_run_stop_terminate_instance[gate,smoke]
  2013-09-10 03:26:06.137 | 
tempest.thirdparty.boto.test_ec2_instance_run.InstanceRunTest.test_run_stop_terminate_instance[gate,smoke]
  2013-09-10 03:26:06.137 | 
--
  2013-09-10 03:26:06.137 | _StringException: Empty attachments:
  2013-09-10 03:26:06.137 |   stderr
  2013-09-10 03:26:06.138 |   stdout
  2013-09-10 03:26:06.138 | 
  2013-09-10 03:26:06.138 | pythonlogging:'': {{{
  2013-09-10 03:26:06.139 | 2013-09-10 03:18:40,673 state: pending
  2013-09-10 03:26:06.139 | 2013-09-10 03:18:47,211 State transition pending 
== error 6 second
  2013-09-10 03:26:06.139 | }}}
  2013-09-10 03:26:06.140 | 
  2013-09-10 03:26:06.140 | Traceback (most recent call last):
  2013-09-10 03:26:06.140 |   File 
tempest/thirdparty/boto/test_ec2_instance_run.py, line 150, in 
test_run_stop_terminate_instance
  2013-09-10 03:26:06.140 | self.assertInstanceStateWait(instance, 
running)
  2013-09-10 03:26:06.141 |   File tempest/thirdparty/boto/test.py, line 356, 
in assertInstanceStateWait
  2013-09-10 03:26:06.141 | state = self.waitInstanceState(lfunction, 
wait_for)
  2013-09-10 03:26:06.141 |   File tempest/thirdparty/boto/test.py, line 341, 
in waitInstanceState
  2013-09-10 03:26:06.142 | self.valid_instance_state)
  2013-09-10 03:26:06.142 |   File tempest/thirdparty/boto/test.py, line 332, 
in state_wait_gone
  2013-09-10 03:26:06.142 | self.assertIn(state, valid_set | self.gone_set)
  2013-09-10 03:26:06.142 |   File 
/usr/local/lib/python2.7/dist-packages/testtools/testcase.py, line 328, in 
assertIn
  2013-09-10 03:26:06.143 | self.assertThat(haystack, Contains(needle))
  2013-09-10 03:26:06.143 |   File 
/usr/local/lib/python2.7/dist-packages/testtools/testcase.py, line 417, in 
assertThat
  2013-09-10 03:26:06.143 | raise MismatchError(matchee, matcher, mismatch, 
verbose)
  2013-09-10 03:26:06.144 | MismatchError: u'error' not in set(['paused', 
'terminated', 'running', 'stopped', 'pending', '_GONE', 'stopping', 
'shutting-down'])

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1223161/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1233264] Re: stable branch patches failing in check queue due to missing 'find_resourceid_by_name_or_id'

2013-10-02 Thread Mark McClain
** Also affects: python-neutronclient
   Importance: Undecided
   Status: New

** Changed in: neutron
   Status: In Progress = Invalid

** Changed in: python-neutronclient
   Status: New = Fix Released

** Changed in: python-neutronclient
   Importance: Undecided = High

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1233264

Title:
  stable branch patches failing in check queue due to missing
  'find_resourceid_by_name_or_id'

Status in OpenStack Neutron (virtual network service):
  Invalid
Status in Python client library for Neutron:
  Fix Released

Bug description:
  Patches on the stable branches (at least stable/grizzly) are failing
  in Jenkins because this change removed the
  'find_resourceid_by_name_or_id' method from the quantumclient:

  https://github.com/openstack/python-
  neutronclient/commit/cbb83121c09f95b00720f494ab5f424612ac207d

  Here is a test report failure:

  http://logs.openstack.org/00/48300/1/check/gate-nova-
  python27/e47c623/console.html

  It's a static method which looks like it just needs to be proxied from
  python-neutronclient.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1233264/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1182679] Re: tempest.thirdparty.boto tests fail with TearDownException

2013-10-02 Thread Joe Gordon
There are too many reasons why a test can fail TearDown, cases that are
covered by more specific bugs.  Marking this as invalid

** No longer affects: nova

** Changed in: neutron
   Status: New = Invalid

** Changed in: tempest
   Status: Incomplete = Invalid

** Summary changed:

- tempest.thirdparty.boto tests fail with TearDownException
+ tempest.thirdparty.boto tests fail with TearDownException  -- Invalid bug 
report

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1182679

Title:
  tempest.thirdparty.boto tests fail with TearDownException  -- Invalid
  bug report

Status in OpenStack Neutron (virtual network service):
  Invalid
Status in Tempest:
  Invalid

Bug description:
  Excerpt of log:

  ==
  ERROR: test suite for class 
'tempest.thirdparty.boto.test_ec2_instance_run.InstanceRunTest'
  --
  Traceback (most recent call last):
File /usr/lib/python2.7/dist-packages/nose/suite.py, line 227, in run 
  self.tearDown()
File /usr/lib/python2.7/dist-packages/nose/suite.py, line 350, in tearDown
  self.teardownContext(ancestor)
File /usr/lib/python2.7/dist-packages/nose/suite.py, line 366, in 
teardownContext
  try_run(context, names)
File /usr/lib/python2.7/dist-packages/nose/util.py, line 478, in try_run
  return func()
File /opt/stack/new/tempest/tempest/thirdparty/boto/test.py, line 263, in 
tearDownClass
  raise exceptions.TearDownException(num=fail_count)
  TearDownException: %(num)d cleanUp operation failed
  Details: 2 cleanUp operation failed

  Full log:

  http://logs.openstack.org/29469/3/check/gate-tempest-devstack-vm-
  quantum/24106/console.html

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1182679/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1213241] Re: Pickled data in Glance database enables remote code execution

2013-10-02 Thread Thierry Carrez
** Changed in: glance
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Glance.
https://bugs.launchpad.net/bugs/1213241

Title:
  Pickled data in Glance database enables remote code execution

Status in OpenStack Image Registry and Delivery Service (Glance):
  Fix Released

Bug description:
  Glance uses pickled python objects for the storage of image location
  metadata in its SQL database backend [1]. In the event that the
  database server running beneath Glance is compromised, the usage of
  pickle will allow an attacker to execute untrusted code remotely and
  further compromise the cloud [2] [3].

  [1] 
https://github.com/openstack/glance/blob/master/glance/db/sqlalchemy/models.py#L157
  [2] See warning at the top of the pickle module doc: 
http://docs.python.org/2/library/pickle.html
  [3] http://blog.nelhage.com/2011/03/exploiting-pickle/

To manage notifications about this bug go to:
https://bugs.launchpad.net/glance/+bug/1213241/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1233228] Re: Last translations refresh before RC1

2013-10-02 Thread Thierry Carrez
** Changed in: glance
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1233228

Title:
  Last translations refresh before RC1

Status in Ceilometer:
  Fix Committed
Status in OpenStack Image Registry and Delivery Service (Glance):
  Fix Released
Status in OpenStack Identity (Keystone):
  Fix Released

Bug description:
  Before issuing RC1 we need to refresh translations.
  Those are automatically proposed and can be found at 
https://review.openstack.org/#/q/topic:transifex/translations,n,z

To manage notifications about this bug go to:
https://bugs.launchpad.net/ceilometer/+bug/1233228/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1182861] Re: Switch to oslo.config 1.2.0 final

2013-10-02 Thread Thierry Carrez
** Changed in: glance
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1182861

Title:
  Switch to oslo.config 1.2.0 final

Status in Ceilometer:
  Fix Committed
Status in OpenStack Image Registry and Delivery Service (Glance):
  Fix Released
Status in Orchestration API (Heat):
  Fix Committed
Status in OpenStack Identity (Keystone):
  Fix Released
Status in OpenStack Message Queuing Service (Marconi):
  Fix Committed
Status in OpenStack Neutron (virtual network service):
  Fix Committed
Status in OpenStack Compute (Nova):
  Fix Committed
Status in Oslo - a Library of Common OpenStack Code:
  Fix Released
Status in Python client library for Keystone:
  Fix Committed
Status in Trove - Database as a Service:
  Fix Committed

Bug description:
  These commits:

  https://review.openstack.org/#/q/I7826087147e0713edaaea85a72283998295e2281,n,z

  mean we're using an oslo.config tarball from
  http://tarballs.openstack.org/oslo.config/

  Once oslo.config-1.2.0 has been published to pypi, we should switch
  to:

oslo.config=1.2.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ceilometer/+bug/1182861/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1221366] Re: Glance api v2 added features but still at 2.1

2013-10-02 Thread Thierry Carrez
** Changed in: glance
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Glance.
https://bugs.launchpad.net/bugs/1221366

Title:
  Glance api v2 added features but still at 2.1

Status in OpenStack Image Registry and Delivery Service (Glance):
  Fix Released

Bug description:
  Just need to update the version middleware to report the correct
  latest minor version. This will also be important for the docs we add.

To manage notifications about this bug go to:
https://bugs.launchpad.net/glance/+bug/1221366/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1231497] Re: v2 member-create call allows adding an empty tenantId as member

2013-10-02 Thread Thierry Carrez
** Changed in: glance
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Glance.
https://bugs.launchpad.net/bugs/1231497

Title:
  v2 member-create call allows adding an empty tenantId as member

Status in OpenStack Image Registry and Delivery Service (Glance):
  Fix Released

Bug description:
  This happens with API calls only, the python-glanceclient does not
  allow it.

  Note the request payload in this request:

   curl -i -X POST -H X-Auth-Token: $AUTH_TOKEN \
 -H 'Content-Type: application/json' \
 -d '{ member:  }' \
 http://$GLANCE/v2/images/$IMG/members

  Response:
  HTTP/1.1 200 OK
  Content-Length: 198
  Content-Type: application/json; charset=UTF-8
  X-Openstack-Request-Id: req-54621fca-efc0-4800-a2d0-f25a4ee4671d
  Date: Thu, 26 Sep 2013 14:43:25 GMT

  {status: pending, created_at: 2013-09-26T14:43:25Z,
  updated_at: 2013-09-26T14:43:25Z, image_id: 4551c8ab-ab07-4d4b-
  88f0-97be88f1c09b, member_id: , schema: /v2/schemas/member}

  demo! curl -X GET -H X-Auth-Token: $AUTH_TOKEN   -H 'Content-Type: 
application/json'   http://$GLANCE/v2/images/$IMG/members | python -m json.tool
% Total% Received % Xferd  Average Speed   TimeTime Time  
Current
   Dload  Upload   Total   SpentLeft  Speed
  100   478  100   4780 0  16296  0 --:--:-- --:--:-- --:--:-- 17071
  {
  members: [
  {
  created_at: 2013-09-26T14:43:25Z,
  image_id: 4551c8ab-ab07-4d4b-88f0-97be88f1c09b,
  member_id: ,
  schema: /v2/schemas/member,
  status: pending,
  updated_at: 2013-09-26T14:43:25Z
  },
  {
  created_at: 2013-09-20T21:16:21Z,
  image_id: 4551c8ab-ab07-4d4b-88f0-97be88f1c09b,
  member_id: 8989447062e04a818baf9e073fd04fa7,
  schema: /v2/schemas/member,
  status: pending,
  updated_at: 2013-09-20T21:16:21Z
  }
  ],
  schema: /v2/schemas/members
  }

  Problem is that because of the structure of the delete call, you can't delete 
such an image member:
  DELETE http://$GLANCE/v2/images/$IMG/members/$CONSUMER

  Workaround is that this doesn't match any tenant IDs, so it has no
  effect, it just takes up space.

To manage notifications about this bug go to:
https://bugs.launchpad.net/glance/+bug/1231497/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1229042] Re: glance qpid notifier can hang under heavy load

2013-10-02 Thread Thierry Carrez
** Changed in: glance
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Glance.
https://bugs.launchpad.net/bugs/1229042

Title:
  glance qpid notifier can hang under heavy load

Status in OpenStack Image Registry and Delivery Service (Glance):
  Fix Released

Bug description:
  Glance qpid notifier can hang under heavy image creation load.

  The issue happens because of  two issse:

  - The qpid notifier instance  can be called by multiple green thread 
concurrently, one thread may recreate the connection object, while other thread 
working.
  The connection object should be local variable instead of object variable, in 
order to avoid unwanted modification, or replacement. 

  The second issue the python-qpid uses PipeWaiter  with a
  select.select. The select is not monkey patched to the be green thread
  friendly, is can causes  hang issue.

  All other AMQP user openstack competent monkey patches the thread and select 
modules, but glance not.
  Usually good practice to make  everything what is possible green 
thread/eventlet safe and make the application more preemptive.

  cinder, neutron makes everything evenetlet friend,  nova  excludes the 'os' 
module.
  I would recommend to make everything greenlet friendly.

To manage notifications about this bug go to:
https://bugs.launchpad.net/glance/+bug/1229042/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1220744] Re: no size check when using http to create an image

2013-10-02 Thread Thierry Carrez
** Changed in: glance
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Glance.
https://bugs.launchpad.net/bugs/1220744

Title:
  no size check when using http to create an image

Status in OpenStack Image Registry and Delivery Service (Glance):
  Fix Released
Status in Python client library for Glance:
  New

Bug description:
  if I create an image from file and use --size which is smaller than
  the image on file we would fail with the below error:

  root@opens- ~(keystone_admin)]# glance image-create --name rhevm_image 
--disk-format qcow2 --container-format bare --file 
/tmp/39f89a6a-7fbb-43c0-a5ea-19b271f51829 --size 1
  Request returned failure status.
  400 Bad Request
  Supplied size (1) and size generated from uploaded image (1440612352) did not 
match. Setting image status to 'killed'.
  (HTTP 400)

  but if I create an image from http and use a smaller size the image is
  created:

  [root@opens-XXX ~(keystone_admin)]# glance image-create --name human
  --disk-format qcow2 --container-format bare --location http://XXX
  --human-readable --size 1

  +--+--+
  | Property | Value|
  +--+--+
  | checksum | None |
  | container_format | bare |
  | created_at   | 2013-09-04T14:18:05  |
  | deleted  | False|
  | deleted_at   | None |
  | disk_format  | qcow2|
  | id   | 55d45384-6b4b-40c6-b399-639b03c06c3b |
  | is_public| False|
  | min_disk | 0|
  | min_ram  | 0|
  | name | human|
  | owner| ad326a6c11a742c6bfdf4ad63be0c889 |
  | protected| False|
  | size | 1B   |
  | status   | active   |
  | updated_at   | 2013-09-04T14:18:05  |
  +--+--+

  
  [root@opens- ~(keystone_admin)]# glance image-list
  
+--+-+-+--+++
  | ID   | Name| Disk Format | 
Container Format | Size   | Status |
  
+--+-+-+--+++
  | 55d45384-6b4b-40c6-b399-639b03c06c3b | human   | qcow2   | bare 
| 1  | active |
  
|+--+-+-+--+++

  if size is too small we should not allow the create of the image from
  http as well

To manage notifications about this bug go to:
https://bugs.launchpad.net/glance/+bug/1220744/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1224449] Re: Property protections not enforced in order

2013-10-02 Thread Thierry Carrez
** Changed in: glance
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Glance.
https://bugs.launchpad.net/bugs/1224449

Title:
  Property protections not enforced in order

Status in OpenStack Image Registry and Delivery Service (Glance):
  Fix Released

Bug description:
  Property protections need to be enforced in the order specified by the
  configuration file.  i.e. [^x_owner.*] should be enforced before [.*]
  given the example config.

  This is currently not the case as the rules in property_utils.py is a
  dict.

To manage notifications about this bug go to:
https://bugs.launchpad.net/glance/+bug/1224449/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1215396] Re: emit warning while running flake8 without virtual env

2013-10-02 Thread Thierry Carrez
** Changed in: glance
   Status: Fix Committed = Fix Released

** Changed in: glance
Milestone: None = havana-rc1

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Glance.
https://bugs.launchpad.net/bugs/1215396

Title:
  emit warning while running flake8 without virtual env

Status in OpenStack Image Registry and Delivery Service (Glance):
  Fix Released

Bug description:
  run_tests.sh -N -p
  it will call the flake8 installed on your host to detect PEP8, and
  the flake8 plugin OpenStack hacking may not installed on your
  host, so this command may not detect the OpenStack Style Commandment
  supplied by hacking(e.g H202).

  run_tests.sh -p
  it will call the flake8 from virtual env, flake8 plugin OpenStack
  hacking installed in virtual env will be triggered.

  The result from run_tests.sh -p should be trusted, and jenkins uses
  virtual env to run flake8 too.

  When -N is enabled, emit warning to remind user.

To manage notifications about this bug go to:
https://bugs.launchpad.net/glance/+bug/1215396/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1223861] Re: Typo in protected property message

2013-10-02 Thread Thierry Carrez
** Changed in: glance
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Glance.
https://bugs.launchpad.net/bugs/1223861

Title:
  Typo in protected property message

Status in OpenStack Image Registry and Delivery Service (Glance):
  Fix Released

Bug description:
  Encountered a malfored property protection rule %s:%s.

  s/malfored/malformed/

To manage notifications about this bug go to:
https://bugs.launchpad.net/glance/+bug/1223861/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1217838] Re: Glance V2 image create does not throw exception when the image is deleted during upload

2013-10-02 Thread Thierry Carrez
** Changed in: glance
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Glance.
https://bugs.launchpad.net/bugs/1217838

Title:
  Glance V2 image create does not throw exception when the image is
  deleted during upload

Status in OpenStack Image Registry and Delivery Service (Glance):
  Fix Released

Bug description:
  Steps to reproduce the bug:

  1. Create a image using glance V2 api.
  2. delete the image before the create call returns.
  3. Verify that the image record is marked as deleted.
  4. The create call returns with a success response.

  This is not the behaviour in V1, where it responds with a 412.

To manage notifications about this bug go to:
https://bugs.launchpad.net/glance/+bug/1217838/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1229351] Re: v2 image sharing doc incorrect

2013-10-02 Thread Thierry Carrez
** Changed in: glance
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Glance.
https://bugs.launchpad.net/bugs/1229351

Title:
  v2 image sharing doc incorrect

Status in OpenStack Image Registry and Delivery Service (Glance):
  Fix Released

Bug description:
  The new api calls section:
  (1) POST to /v2/.../members: the request body is incorrect
  (2) GET /v2/images/{imageId}/members/{memberId} was never implemented

To manage notifications about this bug go to:
https://bugs.launchpad.net/glance/+bug/1229351/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1229366] Re: incorrect response code from v2 delete image member call

2013-10-02 Thread Thierry Carrez
** Changed in: glance
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Glance.
https://bugs.launchpad.net/bugs/1229366

Title:
  incorrect response code from v2 delete image member call

Status in OpenStack Image Registry and Delivery Service (Glance):
  Fix Released

Bug description:
  Currently on success, DELETE /v2/image/{imageId}/members/{memberId}
  returns 200 with no response body.

  According to the Glance API contract, a 200 means you should expect a
  response body.  Success with no response body should be 204.

To manage notifications about this bug go to:
https://bugs.launchpad.net/glance/+bug/1229366/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1223167] Re: Tests should call get_api instead of importing the module directly

2013-10-02 Thread Thierry Carrez
** Changed in: glance
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Glance.
https://bugs.launchpad.net/bugs/1223167

Title:
  Tests should call get_api instead of importing the module directly

Status in OpenStack Image Registry and Delivery Service (Glance):
  Fix Released

Bug description:
  The test_registry , test_simple and test_sqlalchemy tests import the modules 
directly instead of calling get_api of db/__init__.py
  With the introduction of db_pool, they should use the get_api method.
  Also, test_db_api.py, does not set the use_tpool option back to False, which 
results in failures of tests.

To manage notifications about this bug go to:
https://bugs.launchpad.net/glance/+bug/1223167/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1226701] Re: Many typos of v1 image metadata in glanceapi.rst

2013-10-02 Thread Thierry Carrez
** Changed in: glance
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Glance.
https://bugs.launchpad.net/bugs/1226701

Title:
  Many typos of v1 image metadata in glanceapi.rst

Status in OpenStack Image Registry and Delivery Service (Glance):
  Fix Released

Bug description:
  There are lots of typos of v1 image metadata in glanceapi.rst. Such as
  x-image-meta-min-disk should be x-image-meta-min_disk.

To manage notifications about this bug go to:
https://bugs.launchpad.net/glance/+bug/1226701/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1218712] Re: Registry API v1 couldn't work with multiple-location when image metadata encrypting enabled

2013-10-02 Thread Thierry Carrez
** Changed in: glance
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Glance.
https://bugs.launchpad.net/bugs/1218712

Title:
  Registry API v1 couldn't work with multiple-location when image
  metadata encrypting enabled

Status in OpenStack Image Registry and Delivery Service (Glance):
  Fix Released

Bug description:
  Registry API v1 client and service side missing necessary
  en/decrypting code to handle image's multiple locations property when
  metadata encrypting option enabled. This will cause image locations
  metadata be mistakenly saved to database, and glance failing when it
  be load back.

To manage notifications about this bug go to:
https://bugs.launchpad.net/glance/+bug/1218712/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1213880] Re: glance upload to rbd creates zero length image

2013-10-02 Thread Thierry Carrez
** Changed in: glance
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Glance.
https://bugs.launchpad.net/bugs/1213880

Title:
  glance upload to rbd creates zero length image

Status in OpenStack Image Registry and Delivery Service (Glance):
  Fix Released

Bug description:
  If using upload() from V2 Glance API to write data to an RBD image the
  following problem occurs:

  A length of zero can be used which means an image of size 0 is created
  thus resulting in the following exception:

  2013-08-19 12:09:36.044 31475 ERROR glance.api.v2.image_data 
[e9a89f79-d9ed-40b7-a1a0-157f6eb2b3d1 5cdd3419b10e4459a12593282f483331 
9f93fd6845f04c6c9b51dcc9e24008a1] Failed to upload image data due to internal 
error
  2013-08-19 12:09:36.044 31475 TRACE glance.api.v2.image_data Traceback (most 
recent call last):
  2013-08-19 12:09:36.044 31475 TRACE glance.api.v2.image_data   File 
/opt/stack/glance/glance/api/v2/image_data.py, line 53, in upload
  2013-08-19 12:09:36.044 31475 TRACE glance.api.v2.image_data 
image.set_data(data, size)
  2013-08-19 12:09:36.044 31475 TRACE glance.api.v2.image_data   File 
/opt/stack/glance/glance/domain/proxy.py, line 126, in set_data
  2013-08-19 12:09:36.044 31475 TRACE glance.api.v2.image_data 
self.base.set_data(data, size)
  2013-08-19 12:09:36.044 31475 TRACE glance.api.v2.image_data   File 
/opt/stack/glance/glance/notifier/__init__.py, line 201, in set_data
  2013-08-19 12:09:36.044 31475 TRACE glance.api.v2.image_data 
self.image.set_data(data, size)
  2013-08-19 12:09:36.044 31475 TRACE glance.api.v2.image_data   File 
/opt/stack/glance/glance/domain/proxy.py, line 126, in set_data
  2013-08-19 12:09:36.044 31475 TRACE glance.api.v2.image_data 
self.base.set_data(data, size)
  2013-08-19 12:09:36.044 31475 TRACE glance.api.v2.image_data   File 
/opt/stack/glance/glance/store/__init__.py, line 647, in set_data
  2013-08-19 12:09:36.044 31475 TRACE glance.api.v2.image_data 
self.image.image_id, utils.CooperativeReader(data), size)
  2013-08-19 12:09:36.044 31475 TRACE glance.api.v2.image_data   File 
/opt/stack/glance/glance/store/__init__.py, line 363, in add_to_backend
  2013-08-19 12:09:36.044 31475 TRACE glance.api.v2.image_data return 
store_add_to_backend(image_id, data, size, store)
  2013-08-19 12:09:36.044 31475 TRACE glance.api.v2.image_data   File 
/opt/stack/glance/glance/store/__init__.py, line 341, in store_add_to_backend
  2013-08-19 12:09:36.044 31475 TRACE glance.api.v2.image_data (location, 
size, checksum, metadata) = store.add(image_id, data, size)
  2013-08-19 12:09:36.044 31475 TRACE glance.api.v2.image_data   File 
/opt/stack/glance/glance/store/rbd.py, line 287, in add
  2013-08-19 12:09:36.044 31475 TRACE glance.api.v2.image_data offset += 
image.write(chunk, offset)
  2013-08-19 12:09:36.044 31475 TRACE glance.api.v2.image_data   File 
/usr/lib/python2.7/dist-packages/rbd.py, line 648, in write
  2013-08-19 12:09:36.044 31475 TRACE glance.api.v2.image_data raise 
make_ex(ret, error writing to %s % (self.name,))
  2013-08-19 12:09:36.044 31475 TRACE glance.api.v2.image_data InvalidArgument: 
error writing to 4c3712f8-e6ef-4b39-aaf0-975f046252f4

To manage notifications about this bug go to:
https://bugs.launchpad.net/glance/+bug/1213880/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1202098] Re: glance-api failed to startup caused by UnicodeEncodeError in non-English environment

2013-10-02 Thread Thierry Carrez
** Changed in: glance
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Glance.
https://bugs.launchpad.net/bugs/1202098

Title:
  glance-api failed to startup caused by UnicodeEncodeError in non-
  English environment

Status in OpenStack Image Registry and Delivery Service (Glance):
  Fix Released

Bug description:
  root@ubuntu:~/devstack# screen -x stack
  There are screens on:
  4195.stack(2013年07月17日 08时11分11秒)(Dead ???)
  3733.stack(2013年07月17日 08时11分11秒)(Dead ???)
  Remove dead screens with 'screen -wipe'.
  There is no screen to be attached matching stack.

  root@ubuntu:~/devstack# cat /var/log/glance/api.log
  2013-07-17 11:26:10.880 14137 ERROR glance.store.sheepdog [-] 
储存配置错误:Unexpected error while running command.
  Command: collie
  Exit code: 127
  Stdout: ''
  Stderr: '/bin/sh: 1: collie: not found\n'
  2013-07-17 11:26:10.881 14137 CRITICAL glance [-] 'ascii' codec can't encode 
characters in position 0-7: ordinal not in range(128)
  2013-07-17 14:08:33.500 14993 DEBUG glance.store [-] Attempting to import 
store glance.store.filesystem.Store _get_store_class 
/opt/stack/glance/glance/store/__init__.py:143
  2013-07-17 14:08:33.501 14993 DEBUG glance.store [-] Registering store class 
'glance.store.filesystem.Store' with schemes ('file', 'filesystem') 
create_stores /opt/stack/glance/glance/store/__init__.py:173
  2013-07-17 14:08:33.507 14993 DEBUG glance.store.base [-] Late loading 
location class glance.store.filesystem.StoreLocation get_store_location_class 
/opt/stack/glance/glance/store/base.py:68
  2013-07-17 14:08:33.507 14993 DEBUG glance.store.location [-] Registering 
scheme file with {'store_class': class 'glance.store.filesystem.Store', 
'location_class': class 'glance.store.filesystem.StoreLocation'} 
register_scheme_map /opt/stack/glance/glance/store/location.py:85
  2013-07-17 14:08:33.507 14993 DEBUG glance.store.location [-] Registering 
scheme filesystem with {'store_class': class 'glance.store.filesystem.Store', 
'location_class': class 'glance.store.filesystem.StoreLocation'} 
register_scheme_map /opt/stack/glance/glance/store/location.py:85
  2013-07-17 14:08:33.507 14993 DEBUG glance.store [-] Attempting to import 
store glance.store.http.Store _get_store_class 
/opt/stack/glance/glance/store/__init__.py:143
  2013-07-17 14:08:33.508 14993 DEBUG glance.store [-] Registering store class 
'glance.store.http.Store' with schemes ('http', 'https') create_stores 
/opt/stack/glance/glance/store/__init__.py:173
  2013-07-17 14:08:33.508 14993 DEBUG glance.store.base [-] Late loading 
location class glance.store.http.StoreLocation get_store_location_class 
/opt/stack/glance/glance/store/base.py:68
  2013-07-17 14:08:33.508 14993 DEBUG glance.store.location [-] Registering 
scheme http with {'store_class': class 'glance.store.http.Store', 
'location_class': class 'glance.store.http.StoreLocation'} 
register_scheme_map /opt/stack/glance/glance/store/location.py:85
  2013-07-17 14:08:33.509 14993 DEBUG glance.store.location [-] Registering 
scheme https with {'store_class': class 'glance.store.http.Store', 
'location_class': class 'glance.store.http.StoreLocation'} 
register_scheme_map /opt/stack/glance/glance/store/location.py:85
  2013-07-17 14:08:33.509 14993 DEBUG glance.store [-] Attempting to import 
store glance.store.rbd.Store _get_store_class 
/opt/stack/glance/glance/store/__init__.py:143
  2013-07-17 14:08:33.510 14993 DEBUG glance.store [-] Registering store class 
'glance.store.rbd.Store' with schemes ('rbd',) create_stores 
/opt/stack/glance/glance/store/__init__.py:173
  2013-07-17 14:08:33.514 14993 DEBUG glance.store.base [-] Late loading 
location class glance.store.rbd.StoreLocation get_store_location_class 
/opt/stack/glance/glance/store/base.py:68
  2013-07-17 14:08:33.514 14993 DEBUG glance.store.location [-] Registering 
scheme rbd with {'store_class': class 'glance.store.rbd.Store', 
'location_class': class 'glance.store.rbd.StoreLocation'} register_scheme_map 
/opt/stack/glance/glance/store/location.py:85
  2013-07-17 14:08:33.515 14993 DEBUG glance.store [-] Attempting to import 
store glance.store.s3.Store _get_store_class 
/opt/stack/glance/glance/store/__init__.py:143
  2013-07-17 14:08:33.515 14993 DEBUG glance.store [-] Registering store class 
'glance.store.s3.Store' with schemes ('s3', 's3+http', 's3+https') 
create_stores /opt/stack/glance/glance/store/__init__.py:173
  2013-07-17 14:08:33.516 14993 DEBUG glance.store.base [-] Late loading 
location class glance.store.s3.StoreLocation get_store_location_class 
/opt/stack/glance/glance/store/base.py:68
  2013-07-17 14:08:33.516 14993 DEBUG glance.store.location [-] Registering 
scheme s3 with {'store_class': class 'glance.store.s3.Store', 
'location_class': class 'glance.store.s3.StoreLocation'} register_scheme_map 
/opt/stack/glance/glance/store/location.py:85
  

[Yahoo-eng-team] [Bug 1207266] Re: glance allows membership access and modify for deleted image

2013-10-02 Thread Thierry Carrez
** Changed in: glance
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Glance.
https://bugs.launchpad.net/bugs/1207266

Title:
  glance allows membership access and modify for deleted image

Status in OpenStack Image Registry and Delivery Service (Glance):
  Fix Released

Bug description:
  Currently if I delete an image, I am subsequently still allowed to
  access and modify members on that image (since it still exists but in
  a 'deleted' state). This should not be allowed.

To manage notifications about this bug go to:
https://bugs.launchpad.net/glance/+bug/1207266/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1214830] Re: add missing index for 'owner' column on images table

2013-10-02 Thread Thierry Carrez
** Changed in: glance
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Glance.
https://bugs.launchpad.net/bugs/1214830

Title:
  add missing index for 'owner' column on images table

Status in OpenStack Image Registry and Delivery Service (Glance):
  Fix Released

Bug description:
  The image-list query involves fetching of images by images.owner.
  Because there is an index missing on the owner column, a full table
  scan is done while filtering for images.

To manage notifications about this bug go to:
https://bugs.launchpad.net/glance/+bug/1214830/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1218903] Re: glance-api can't start in non-English env

2013-10-02 Thread Thierry Carrez
** Changed in: glance
   Status: Fix Committed = Fix Released

** Changed in: glance
Milestone: None = havana-rc1

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Glance.
https://bugs.launchpad.net/bugs/1218903

Title:
  glance-api can't start in non-English env

Status in OpenStack Image Registry and Delivery Service (Glance):
  Fix Released

Bug description:
  In non-English env, the start of glance-api will fail with below
  error:

  2013-08-30 04:31:40.830 22137 DEBUG glance.store.base [-] [(')一構ソチ‐ Store 
sheepdog could not be configured correctly. Reason: [(')十十一構ソチ‐ Error in store 
configuration: Unexpected error while running command.
  Command: collie
  Exit code: 127
  Stdout: ''
  Stderr: '/bin/sh: collie: 
\xe3\x82\xb3\xe3\x83\x9e\xe3\x83\xb3\xe3\x83\x89\xe3\x81\x8c\xe8\xa6\x8b\xe3\x81\xa4\xe3\x81\x8b\xe3\x82\x8a\xe3\x81\xbe\xe3\x81\x9b\xe3\x82\x93\n']]
 _exception_to_str /usr/lib/python2.6/site-packages/glance/store/base.py:41
  2013-08-30 04:31:40.831 22137 CRITICAL glance [-] 'ascii' codec can't decode 
byte 0xe5 in position 4: ordinal not in range(128)
  2013-08-30 04:31:40.831 22137 TRACE glance Traceback (most recent call last):
  2013-08-30 04:31:40.831 22137 TRACE glance   File /usr/bin/glance-api, line 
10, in module
  2013-08-30 04:31:40.831 22137 TRACE glance sys.exit(main())
  2013-08-30 04:31:40.831 22137 TRACE glance   File 
/usr/lib/python2.6/site-packages/glance/cmd/api.py, line 57, in main
  2013-08-30 04:31:40.831 22137 TRACE glance glance.store.create_stores()
  2013-08-30 04:31:40.831 22137 TRACE glance   File 
/usr/lib/python2.6/site-packages/glance/store/__init__.py, line 165, in 
create_stores
  2013-08-30 04:31:40.831 22137 TRACE glance store_instance = store_cls()
  2013-08-30 04:31:40.831 22137 TRACE glance   File 
/usr/lib/python2.6/site-packages/glance/store/base.py, line 65, in __init__
  2013-08-30 04:31:40.831 22137 TRACE glance Disabling add method.) % 
_exception_to_str(e))
  2013-08-30 04:31:40.831 22137 TRACE glance UnicodeDecodeError: 'ascii' codec 
can't decode byte 0xe5 in position 4: ordinal not in range(128)
  2013-08-30 04:31:40.831 22137 TRACE glance

  Seems it's injected by patch  https://review.openstack.org/#/c/37421

To manage notifications about this bug go to:
https://bugs.launchpad.net/glance/+bug/1218903/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1204359] Re: Duplicate options registered in glance/registry/client/v1/api.py

2013-10-02 Thread Thierry Carrez
** Changed in: glance
   Status: Fix Committed = Fix Released

** Changed in: glance
Milestone: None = havana-rc1

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Glance.
https://bugs.launchpad.net/bugs/1204359

Title:
  Duplicate options registered in glance/registry/client/v1/api.py

Status in OpenStack Image Registry and Delivery Service (Glance):
  Fix Released

Bug description:
  The same set of options are registered in
  glance/registry/client/v2/api.py

  The module glance/registry/client/v1/api.py should use import_opt to
  import options from glance/registry/client/v2/api.py

To manage notifications about this bug go to:
https://bugs.launchpad.net/glance/+bug/1204359/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1190666] Re: Add swift_store_ssl_compression param

2013-10-02 Thread Thierry Carrez
** Changed in: glance
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Glance.
https://bugs.launchpad.net/bugs/1190666

Title:
  Add swift_store_ssl_compression param

Status in OpenStack Image Registry and Delivery Service (Glance):
  Fix Released

Bug description:
  Swift client now allows disabling ssl compression when making requests
  over https. Add a new param to allow us to use this.

To manage notifications about this bug go to:
https://bugs.launchpad.net/glance/+bug/1190666/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1228256] Re: Glance cache cleaner wrongly deletes cache for non invalid images

2013-10-02 Thread Thierry Carrez
** Changed in: glance
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Glance.
https://bugs.launchpad.net/bugs/1228256

Title:
  Glance cache cleaner wrongly deletes cache for non invalid images

Status in OpenStack Image Registry and Delivery Service (Glance):
  Fix Released

Bug description:
  The cache cleaner is currently cleaning invalid images like so:

  def clean(self, stall_time=None):
  
  Delete any image files in the invalid directory and any
  files in the incomplete directory that are older than a
  configurable amount of time.
  
  self.delete_invalid_files()

  if stall_time is None:
  stall_time = CONF.image_cache_stall_time

  now = time.time()
  older_than = now - stall_time
  self.delete_stalled_files(older_than)


  
  def delete_stalled_files(self, older_than):
  
  Removes any incomplete cache entries older than a
  supplied modified time.

  :param older_than: Files written to on or before this timestemp
 will be deleted.
  
  for path in self.get_cache_files(self.incomplete_dir):
  os.unlink(path)
  LOG.info(_(Removed stalled cache file %s), path)

  
  Although the older_than time is passed its not used anywhere, as a result 
if you run this through a cron, valid images in process for download/getting 
cached will be deleted from /incomplete since the cleaner does not check for 
time at all.

  Glance api log will complain when this happens in the middle of the
  fetch:

  Fetch finished, moving '/var/lib/glance/image-
  cache/incomplete/b9b38c90-cf64-4fa9-9e73-73da77e40074' to
  '/var/lib/glance/image-cache/b9b38c90-cf64-4fa9-9e73-73da77e40074'
  commit

  ERROR glance.image_cache [...] Exception encountered while tee'ing
  image 'b9b38c90-cf64-4fa9-9e73-73da77e40074' into cache: [Errno 2] No
  such file or directory. Continuing with response.

To manage notifications about this bug go to:
https://bugs.launchpad.net/glance/+bug/1228256/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1233228] Re: Last translations refresh before RC1

2013-10-02 Thread Thierry Carrez
** Changed in: ceilometer
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1233228

Title:
  Last translations refresh before RC1

Status in Ceilometer:
  Fix Released
Status in OpenStack Image Registry and Delivery Service (Glance):
  Fix Released
Status in OpenStack Identity (Keystone):
  Fix Released

Bug description:
  Before issuing RC1 we need to refresh translations.
  Those are automatically proposed and can be found at 
https://review.openstack.org/#/q/topic:transifex/translations,n,z

To manage notifications about this bug go to:
https://bugs.launchpad.net/ceilometer/+bug/1233228/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1225099] Re: Encoding hard-coded in gettextutils.Message

2013-10-02 Thread Thierry Carrez
** Changed in: ceilometer
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1225099

Title:
  Encoding hard-coded in gettextutils.Message

Status in Ceilometer:
  Fix Released
Status in Cinder:
  Fix Committed
Status in Orchestration API (Heat):
  Fix Committed
Status in OpenStack Neutron (virtual network service):
  In Progress
Status in OpenStack Compute (Nova):
  In Progress
Status in Oslo - a Library of Common OpenStack Code:
  Fix Released

Bug description:
  The __str__ method in openstack.common.gettextutils.Message is hard-
  coded to encode to utf-8 which creates problems when other logic goes
  to decode the string using the default encoding, e.g. when formatting
  log messages.  Message objects with double-byte translations fail to
  log because of this.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ceilometer/+bug/1225099/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1217429] Re: Wrong instance_type_id field

2013-10-02 Thread Thierry Carrez
** Changed in: ceilometer
   Status: Fix Committed = Fix Released

** Changed in: ceilometer
Milestone: None = havana-rc1

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1217429

Title:
  Wrong instance_type_id field

Status in Ceilometer:
  Fix Released
Status in OpenStack Compute (Nova):
  Fix Committed

Bug description:
  Reproduce the bug:

  ** Config

  $ nova image-list
  
+--+-+++
  | ID   | Name| 
Status | Server |
  
+--+-+++
  | c91a4dcc-09f3-47c3-8532-8fa93014267c | cirros-0.3.1-x86_64-uec | 
ACTIVE ||
  | 65089976-7382-4177-932f-b32503c86c78 | cirros-0.3.1-x86_64-uec-kernel  | 
ACTIVE ||
  | 81ffc23d-9efd-4f32-ac62-dfef9b969241 | cirros-0.3.1-x86_64-uec-ramdisk | 
ACTIVE ||
  
+--+-+++

  $ nova flavor-list
  
++---+---+--+---+--+---+-+---+
  | ID | Name  | Memory_MB | Disk | Ephemeral | Swap | VCPUs | RXTX_Factor 
| Is_Public |
  
++---+---+--+---+--+---+-+---+
  | 1  | m1.tiny   | 512   | 1| 0 |  | 1 | 1.0 
| True  |
  | 2  | m1.small  | 2048  | 20   | 0 |  | 1 | 1.0 
| True  |
  | 3  | m1.medium | 4096  | 40   | 0 |  | 2 | 1.0 
| True  |
  | 4  | m1.large  | 8192  | 80   | 0 |  | 4 | 1.0 
| True  |
  | 42 | m1.nano   | 64| 0| 0 |  | 1 | 1.0 
| True  |
  | 5  | m1.xlarge | 16384 | 160  | 0 |  | 8 | 1.0 
| True  |
  | 84 | m1.micro  | 128   | 0| 0 |  | 1 | 1.0 
| True  |
  
++---+---+--+---+--+---+-+---+

  ** Now boot a VM with flavor 42 (m1.nano):

  $ nova boot server1 --image c91a4dcc-09f3-47c3-8532-8fa93014267c --flavor 42
  $ nova show server1
  
+--++
  | Property | Value
  |
  
+--++
  | status   | ACTIVE   
  |
  | updated  | 2013-08-27T15:16:10Z 
  |
  | OS-EXT-STS:task_state| None 
  |
  | OS-EXT-SRV-ATTR:host | controller   
  |
  | key_name | None 
  |
  | image| cirros-0.3.1-x86_64-uec 
(c91a4dcc-09f3-47c3-8532-8fa93014267c) |
  | private network  | 10.0.0.2 
  |
  | hostId   | 
ca0d3c4ec83e031c6117a85e15db2977136d5541494f542f35b49c5a   |
  | OS-EXT-STS:vm_state  | active   
  |
  | OS-EXT-SRV-ATTR:instance_name| instance-0003
  |
  | OS-SRV-USG:launched_at   | 2013-08-27T15:16:10.00   
  |
  | OS-EXT-SRV-ATTR:hypervisor_hostname  | controller   
  |
  | flavor   | m1.nano (42) 
  |
  | id   | 8c20e949-d340-48cc-81cb-a35d1dbef315 
  |
  | security_groups  | [{u'name': u'default'}]  
  |
  | OS-SRV-USG:terminated_at | None 
  |
  | user_id  | 65604ab0988447738de47bb4f8ff734b 
  |
  | name | server1  
  |
  | created  | 2013-08-27T15:15:49Z 
  |
  | tenant_id| 0a9a398a230b445a8968682c72f01d72 
  |
  | OS-DCF:diskConfig| MANUAL   
 

[Yahoo-eng-team] [Bug 1222737] Re: Neutron send 'network' notification without id

2013-10-02 Thread Thierry Carrez
** Changed in: ceilometer
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1222737

Title:
  Neutron send 'network' notification without id

Status in Ceilometer:
  Fix Released
Status in OpenStack Neutron (virtual network service):
  Invalid

Bug description:
  2013-09-09 09:19:21.765 2362 INFO ceilometer.network.notifications [-] 
network notification {u'_context_roles': [u'admin'], u'priority': u'INFO', 
u'_context_read_deleted': u'no', u'event_type': u'network.create.start', 
u'timestamp': u'2013-09-09 09:19:01.895216', u'_context_tenant_id': 
u'dd91e0d407164ffca03818278c0b4ad7', u'payload': {u'network': {u'tenant_id': 
u'273b10bdfb4148f5a41d28477f8b4137', u'name': u'private', u'admin_state_up': 
True}}, u'_unique_id': u'7fb2a2d8a3b2453c85d2331db872b24c', 
u'_context_is_admin': True, u'_context_project_id': 
u'dd91e0d407164ffca03818278c0b4ad7', u'_context_timestamp': u'2013-09-09 
09:19:01.778051', u'_context_user_id': u'a832259047f74538abd0b10cec85cba2', 
u'publisher_id': u'network.devstack-precise-hpcloud-az2-234994', u'message_id': 
u'e0aa1030-4b21-4731-a4a4-bb8337b2f2b5'}
  2013-09-09 09:19:21.765 2362 AUDIT ceilometer.pipeline [-] Flush pipeline 
meter_pipeline
  2013-09-09 09:19:21.765 2362 AUDIT ceilometer.pipeline [-] Flush pipeline 
cpu_pipeline
  2013-09-09 09:19:21.765 2362 ERROR stevedore.extension [-] error calling 
'network': 'id'
  2013-09-09 09:19:21.765 2362 ERROR stevedore.extension [-] 'id'
  2013-09-09 09:19:21.765 2362 TRACE stevedore.extension Traceback (most recent 
call last):
  2013-09-09 09:19:21.765 2362 TRACE stevedore.extension   File 
/usr/local/lib/python2.7/dist-packages/stevedore/extension.py, line 145, in 
_invoke_one_plugin
  2013-09-09 09:19:21.765 2362 TRACE stevedore.extension 
response_callback(func(e, *args, **kwds))
  2013-09-09 09:19:21.765 2362 TRACE stevedore.extension   File 
/opt/stack/new/ceilometer/ceilometer/collector/service.py, line 258, in 
_process_notification_for_ext
  2013-09-09 09:19:21.765 2362 TRACE stevedore.extension 
p(list(ext.obj.to_samples(notification)))
  2013-09-09 09:19:21.765 2362 TRACE stevedore.extension   File 
/opt/stack/new/ceilometer/ceilometer/network/notifications.py, line 86, in 
process_notification
  2013-09-09 09:19:21.765 2362 TRACE stevedore.extension 
resource_id=message['payload']['id'],
  2013-09-09 09:19:21.765 2362 TRACE stevedore.extension KeyError: 'id'
  2013-09-09 09:19:21.765 2362 TRACE stevedore.extension 

  from http://logs.openstack.org/37/39237/7/check/gate-tempest-devstack-
  vm-neutron/42d7fba/logs/screen-ceilometer-collector.txt.gz

To manage notifications about this bug go to:
https://bugs.launchpad.net/ceilometer/+bug/1222737/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1182861] Re: Switch to oslo.config 1.2.0 final

2013-10-02 Thread Thierry Carrez
** Changed in: ceilometer
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1182861

Title:
  Switch to oslo.config 1.2.0 final

Status in Ceilometer:
  Fix Released
Status in OpenStack Image Registry and Delivery Service (Glance):
  Fix Released
Status in Orchestration API (Heat):
  Fix Committed
Status in OpenStack Identity (Keystone):
  Fix Released
Status in OpenStack Message Queuing Service (Marconi):
  Fix Committed
Status in OpenStack Neutron (virtual network service):
  Fix Committed
Status in OpenStack Compute (Nova):
  Fix Committed
Status in Oslo - a Library of Common OpenStack Code:
  Fix Released
Status in Python client library for Keystone:
  Fix Committed
Status in Trove - Database as a Service:
  Fix Committed

Bug description:
  These commits:

  https://review.openstack.org/#/q/I7826087147e0713edaaea85a72283998295e2281,n,z

  mean we're using an oslo.config tarball from
  http://tarballs.openstack.org/oslo.config/

  Once oslo.config-1.2.0 has been published to pypi, we should switch
  to:

oslo.config=1.2.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ceilometer/+bug/1182861/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1226943] Re: Need Use built-in print() function instead of print statement

2013-10-02 Thread Thierry Carrez
** Changed in: ceilometer
   Status: Fix Committed = Fix Released

** Changed in: ceilometer
Milestone: None = havana-rc1

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1226943

Title:
  Need Use built-in  print() function  instead of print  statement

Status in Ceilometer:
  Fix Released
Status in Cinder:
  Fix Committed
Status in OpenStack Image Registry and Delivery Service (Glance):
  In Progress
Status in Orchestration API (Heat):
  Fix Committed
Status in OpenStack Identity (Keystone):
  In Progress
Status in OpenStack Neutron (virtual network service):
  Fix Committed
Status in OpenStack Compute (Nova):
  Confirmed
Status in Tempest:
  Fix Committed

Bug description:
  In python 3 print statement is not supported, so we should  use only print() 
functions.
  built-in function was introduce in  python 2.6
  http://www.python.org/dev/peps/pep-3105/

  Note :This function is not normally available as a built-in since the name 
print is recognized as the print statement. 
  To disable the statement and use the print() function, use this future 
statement at the top of your module:
  from __future__ import print_function

  http://docs.python.org/2/library/functions.html#print

To manage notifications about this bug go to:
https://bugs.launchpad.net/ceilometer/+bug/1226943/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1214176] RC1

2013-10-02 Thread Thierry Carrez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

 affects ceilometer
 status fixreleased
 milestone havana-rc1
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQIcBAEBCAAGBQJSTHC4AAoJEFB6+JAlsQQjdAkQAJEnraDMfHKJwTwaUpNMjGAj
qnCFxHyvyQpELEmvghChnBBrlqC459QbwVbFks98tmzOm44WHNBmu/tNMjCjohQB
HwoTC/4tiUcueGP4bfleOTs0ivDsw5VJyaWRhy92mt5X71Mw7bFf4dkbcxFVpUaG
DshQTupbNWncuL+Hoj1lrPX+BMZlpm0Vo5pAtcpgeEwU7dMGHx5tYYsG6gMUXGsh
BWPvKpxcX9u20F9+smDvGs0gT6BYN//EZkkImwG2Z71/CL39tuUcysu37G8n16Wl
7uPLa4dVtSqbM0puuDD+EumFwayQj4QXdJCl4hksJBQGe6WdfOSjZt0a3fa3xz0b
1YfN1d2kHfuTMjWIbNnM1as90qupqNOWKjw5zCrr1V22lADenux6KA1jsHMNKePi
FHKs+xja+U3F8iKx9Mr/UuMXzsFlrZmqpTHmejcgDmdIsbpluv3Epz/vVdlBbxTg
m3QlbBIQ1y3/RCyZ42PIsVLVm3UG4cwcOf5hbVdEgRhI7xwJd8DaqIKurknYnmz7
gVvNMaPfjCSTMsgWVTEK+26cxblE2YG0MZHhSm+7t8/pB8DXj5FKgCBLwgPu6zIK
4Upxz2qRP/0pk62nA6I/jZ2Q2+MOs0S39XgGG4tdVdSMGf5PjuUpvXiuh29w/Ah5
0wLlAotY/eOTTbmiRP8F
=0Twe
-END PGP SIGNATURE-


** Changed in: ceilometer
   Status: Fix Committed = Fix Released

** Changed in: ceilometer
Milestone: None = havana-rc1

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1214176

Title:
  Fix copyright headers to be compliant with Foundation policies

Status in Ceilometer:
  Fix Released
Status in devstack - openstack dev environments:
  In Progress
Status in OpenStack Hacking Guidelines:
  In Progress
Status in Orchestration API (Heat):
  Fix Committed
Status in OpenStack Dashboard (Horizon):
  Fix Committed
Status in Ironic (Bare Metal Provisioning):
  Fix Committed
Status in OpenStack Identity (Keystone):
  Fix Released
Status in OpenStack Neutron (virtual network service):
  Fix Committed
Status in OpenStack Compute (Nova):
  In Progress
Status in Python client library for Ceilometer:
  Fix Committed
Status in Python client library for Cinder:
  Fix Committed
Status in Python client library for Glance:
  In Progress
Status in Python client library for heat:
  Fix Released
Status in Python client library for Keystone:
  In Progress
Status in Trove client binding:
  Fix Committed
Status in OpenStack Object Storage (Swift):
  In Progress
Status in Tempest:
  In Progress
Status in Trove - Database as a Service:
  Fix Committed

Bug description:
  Correct the copyright headers to be consistent with the policies
  outlined by the OpenStack Foundation at http://www.openstack.org/brand
  /openstack-trademark-policy/

  Remove references to OpenStack LLC, replace with OpenStack Foundation

To manage notifications about this bug go to:
https://bugs.launchpad.net/ceilometer/+bug/1214176/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1224001] Re: test_network_basic_ops fails waiting for network to become available

2013-10-02 Thread Matthew Treinish
** Changed in: swift
   Status: New = Invalid

** Changed in: tempest
   Status: New = Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1224001

Title:
  test_network_basic_ops fails waiting for network to become available

Status in OpenStack Neutron (virtual network service):
  In Progress
Status in OpenStack Object Storage (Swift):
  Invalid
Status in Tempest:
  Invalid

Bug description:
  See http://logs.openstack.org/25/43125/4/gate/gate-tempest-devstack-
  vm-neutron/40f3725/console.html

  2013-09-11 16:20:48.981 | 
==
  2013-09-11 16:20:48.982 | FAIL: 
tempest.scenario.test_network_basic_ops.TestNetworkBasicOps.test_network_basic_ops[gate,smoke]
  2013-09-11 16:20:48.982 | 
tempest.scenario.test_network_basic_ops.TestNetworkBasicOps.test_network_basic_ops[gate,smoke]
  2013-09-11 16:20:48.982 | 
--
  2013-09-11 16:20:48.982 | _StringException: Empty attachments:
  2013-09-11 16:20:48.982 |   stderr
  2013-09-11 16:20:48.982 |   stdout
  2013-09-11 16:20:48.982 | 
  2013-09-11 16:20:48.983 | pythonlogging:'': {{{
  2013-09-11 16:20:48.983 | 2013-09-11 16:05:44,209 Starting new HTTP 
connection (1): 127.0.0.1
  2013-09-11 16:20:48.983 | 2013-09-11 16:05:44,309 Starting new HTTP 
connection (1): 127.0.0.1
  2013-09-11 16:20:48.983 | 2013-09-11 16:05:52,724 Tenant networks not 
configured to be reachable.
  2013-09-11 16:20:48.983 | }}}
  2013-09-11 16:20:48.983 | 
  2013-09-11 16:20:48.983 | Traceback (most recent call last):
  2013-09-11 16:20:48.984 |   File 
tempest/scenario/test_network_basic_ops.py, line 262, in 
test_network_basic_ops
  2013-09-11 16:20:48.984 | self._check_public_network_connectivity()
  2013-09-11 16:20:48.984 |   File 
tempest/scenario/test_network_basic_ops.py, line 251, in 
_check_public_network_connectivity
  2013-09-11 16:20:48.984 | self._check_vm_connectivity(ip_address, 
ssh_login, private_key)
  2013-09-11 16:20:48.984 |   File tempest/scenario/manager.py, line 579, in 
_check_vm_connectivity
  2013-09-11 16:20:48.984 | timeout=self.config.compute.ssh_timeout),
  2013-09-11 16:20:48.984 |   File tempest/scenario/manager.py, line 569, in 
_is_reachable_via_ssh
  2013-09-11 16:20:48.985 | return ssh_client.test_connection_auth()
  2013-09-11 16:20:48.985 |   File tempest/common/ssh.py, line 148, in 
test_connection_auth
  2013-09-11 16:20:48.985 | connection = self._get_ssh_connection()
  2013-09-11 16:20:48.985 |   File tempest/common/ssh.py, line 76, in 
_get_ssh_connection
  2013-09-11 16:20:48.985 | password=self.password)
  2013-09-11 16:20:48.985 | SSHTimeout: Connection to the 172.24.4.229 via SSH 
timed out.
  2013-09-11 16:20:48.986 | User: cirros, Password: None

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1224001/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1232748] Re: [Postgres] DB error: (OperationalError) could not translate host name localhost to address

2013-10-02 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/49409
Committed: 
http://github.com/openstack-dev/devstack/commit/96ba6ec1bf0b7cc54f9968e4cc3aa80b8f2c368e
Submitter: Jenkins
Branch:master

commit 96ba6ec1bf0b7cc54f9968e4cc3aa80b8f2c368e
Author: Matt Riedemann mrie...@us.ibm.com
Date:   Wed Oct 2 11:08:56 2013 -0700

Change DATABASE_HOST default to 127.0.0.1

Attempt to fix what is suspected to be a DNS resolution issue with
postgresql check job.

Closes-Bug: #1232748

Change-Id: Ic82e54b2af038e6c21d4f026f3da10f34c3c185c


** Changed in: devstack
   Status: In Progress = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1232748

Title:
  [Postgres] DB error: (OperationalError) could not translate host name
  localhost to address

Status in devstack - openstack dev environments:
  Fix Released
Status in OpenStack Identity (Keystone):
  New
Status in OpenStack Compute (Nova):
  Confirmed
Status in OpenStack Core Infrastructure:
  New

Bug description:
  http://logs.openstack.org/81/48581/2/check/check-tempest-devstack-vm-
  postgres-
  full/ef4ce76/logs/screen-n-api.txt.gz#_2013-09-28_09_53_39_077 caused
  the  failure of
  tempest.api.compute.admin.test_flavors.FlavorsAdminTestXML.test_create_flavor.

To manage notifications about this bug go to:
https://bugs.launchpad.net/devstack/+bug/1232748/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1234455] Re: Tenant delete does not clean up the networks or VMs

2013-10-02 Thread Mark McClain
This is a known issue with all services in OpenStack.  Due to the loose
coupling between services there's no way to know a tenant has been
removed.  This is a cross project issue and would need a blueprint and
design discussion in the keystone project.

** Changed in: neutron
   Status: New = Won't Fix

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1234455

Title:
  Tenant delete does not clean up the networks or VMs

Status in OpenStack Neutron (virtual network service):
  Won't Fix

Bug description:
  If a tenant has networks and VM instances created under it. 
  If tenant-delete is issued, it should either be rejected as there are objects 
under it or those objects should be automatically cleaned.

  Neither of that takes place.

  To reproduce this bug: 
  - Create a tenant (keystone tenant-create )
  - create a network for this tenant (neutron net-create)
  - Instantiate a VM for this tenant ( nova boot)

  - Now delete the tenant (keystone tenant-delete) 
This operation succeeds. However now you are left with a situation where 
you do not have a tenant, but, networks and VM belonging to it remain active. 

  This whole thing can be created from Horizon as well. The worst part
  about doing from Horizon is that you do dot see tenant and networks on
  horizon after the tenant is deleted.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1234455/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1220797] Re: can update image size to smaller number even though cannot create it like that in the first place

2013-10-02 Thread Fei Long Wang
Admin is allowed to change the image size.

** Changed in: glance
   Status: New = Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Glance.
https://bugs.launchpad.net/bugs/1220797

Title:
  can update image size to smaller number even though cannot create it
  like that in the first place

Status in OpenStack Image Registry and Delivery Service (Glance):
  Invalid

Bug description:
  if you try to create an image from file using the --size and giving a smaller 
size the source image we would fail
  but we can use glance image-update to change the file after we create it. 
  so wither we do not need the size check to begin with or both should fail. 

  create image from a file (since this is the only time we currently
  check the size)

  glance image-create --name image_size_file --disk-format qcow2
  --container-format bare --file /tmp/39f89a6a-7fbb-43c0-a5ea-
  19b271f51829

  [root@opens-vdsb ~(keystone_admin)]# glance image-list 
  
+--+--+-+--+++
  | ID   | Name | Disk Format | 
Container Format | Size   | Status |
  
+--+--+-+--+++
  | 23bf4915-9f83-4eb5-a7c2-702de4d825e7 | image_size_file  | qcow2   | 
bare | 1440612352 | active |

  [root@opens- ~(keystone_admin)]# glance image-update 
23bf4915-9f83-4eb5-a7c2-702de4d825e7 --size 1
  +--+--+
  | Property | Value|
  +--+--+
  | checksum | 18b7d574b7a1f0093fefc5484d9fb68d |
  | container_format | bare |
  | created_at   | 2013-09-04T15:47:55  |
  | deleted  | False|
  | deleted_at   | None |
  | disk_format  | qcow2|
  | id   | 23bf4915-9f83-4eb5-a7c2-702de4d825e7 |
  | is_public| False|
  | min_disk | 0|
  | min_ram  | 0|
  | name | image_size_file  |
  | owner| ad326a6c11a742c6bfdf4ad63be0c889 |
  | protected| False|
  | size | 1|
  | status   | active   |
  | updated_at   | 2013-09-04T15:49:26  |
  +--+--+

  
  [root@opens-vdsb ~(keystone_admin)]# glance image-list 
  
+--+--+-+--+++
  | ID   | Name | Disk Format | 
Container Format | Size   | Status |
  
+--+--+-+--+++
  | 23bf4915-9f83-4eb5-a7c2-702de4d825e7 | image_size_file  | qcow2   | 
bare | 1  | active |

To manage notifications about this bug go to:
https://bugs.launchpad.net/glance/+bug/1220797/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp