[Yahoo-eng-team] [Bug 1541092] Re: squash migrations in preparation for mitaka

2016-02-07 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/276079
Committed: 
https://git.openstack.org/cgit/openstack/keystone/commit/?id=f5c64718a1c91fdce5c1da3b1043c14c5b0a97fd
Submitter: Jenkins
Branch:master

commit f5c64718a1c91fdce5c1da3b1043c14c5b0a97fd
Author: Steve Martinelli 
Date:   Thu Feb 4 02:24:12 2016 -0500

squash migrations - kilo

only support db schema upgrades from kilo onwards

a few notes for reviewers...

* 052 and 063 were not ported over since they negated each other
* 066 was not ported over since it just changed existing data
* 067 was not ported over since it this was clean up from 062
* removed the downgrade block from 067

Change-Id: I07539920eed15290b6036906e34805a0f175a07a
Closes-Bug: 1541092


** Changed in: keystone
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1541092

Title:
  squash migrations in preparation for mitaka

Status in OpenStack Identity (keystone):
  Fix Released

Bug description:
  squash everything that was included in kilo:

  rename 067_drop_redundant_mysql_index.py to 067_kilo.py and delete the
  others

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1541092/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1542612] Re: Add Network Port selection to instance launch

2016-02-07 Thread Itxaka Serrano
** Also affects: openstack-manuals
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1542612

Title:
  Add Network Port selection to instance launch

Status in OpenStack Dashboard (Horizon):
  New
Status in openstack-manuals:
  In Progress

Bug description:
  https://review.openstack.org/271248
  Dear bug triager. This bug was created since a commit was marked with 
DOCIMPACT.
  Your project "openstack/horizon" is set up so that we directly report the 
documentation bugs against it. If this needs changing, the docimpact-group 
option needs to be added for the project. You can ask the OpenStack infra team 
(#openstack-infra on freenode) for help if you need to.

  commit c0aab9adf38004df53973a6f35905f3d708a4791
  Author: Itxaka 
  Date:   Fri Jan 22 00:33:13 2016 +0100

  Add Network Port selection to instance launch
  
  Adds a new step to the launch instance wizard
  to select any available ports to attach on launch.
  Modifies the existing tests to take the new step
  and calls insto consideration.
  
  DocImpact: Add port info to user-guide/dashboard_launch_instances.html
  Change-Id: I97b24be0d75b69638aeb52bda7d0d0541a80663a
  Implements: blueprint allow-launching-ports

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1542612/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1484113] Re: network topology: Status untranslated

2016-02-07 Thread KATO Tomoyuki
** Changed in: openstack-i18n
   Importance: Undecided => Medium

** Changed in: openstack-i18n
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1484113

Title:
  network topology: Status untranslated

Status in OpenStack Dashboard (Horizon):
  Fix Released
Status in openstack i18n:
  Fix Released

Bug description:
  on network_topology, the status of an instance or a router is not
  being translated.

  The green/red light left hand side of status is hard wired to the word
  'ACTIVE' (if status == 'ACTIVE', then green light)

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1484113/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1440834] Re: Unit test tree does not match the structure of the code tree

2016-02-07 Thread Deepak
** Changed in: networking-cisco
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1440834

Title:
  Unit test tree does not match the structure of the code tree

Status in networking-brocade:
  Fix Released
Status in networking-cisco:
  Fix Released
Status in neutron:
  Fix Released
Status in neutron kilo series:
  Fix Released

Bug description:
  The structure of the unit test tree does not currently correspond to
  the structure of the code under test.  This makes it difficult for a
  developer to find the unit tests for a given module and complicates
  non-mechanical evaluation of coverage.

To manage notifications about this bug go to:
https://bugs.launchpad.net/networking-brocade/+bug/1440834/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1542972] [NEW] linux bridge device processing loop breaks on removals

2016-02-07 Thread Kevin Benton
Public bug reported:

The code to handle new interfaces makes a check to see if the interface
exists and then assumes it will exist for the rest of its operations.
This assumption does not hold true because a device can be removed at
any time (by Nova, the agents, whatever). So when a device is removed at
the wrong time it will cause an exception that will trigger all of the
ports to be rewired, which is an expensive operation and will cause the
status of the ports on the server side to go ACTIVE->BUILD->ACTIVE.

** Affects: neutron
 Importance: Undecided
 Assignee: Kevin Benton (kevinbenton)
 Status: New

** Changed in: neutron
 Assignee: (unassigned) => Kevin Benton (kevinbenton)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1542972

Title:
  linux bridge device processing loop breaks on removals

Status in neutron:
  New

Bug description:
  The code to handle new interfaces makes a check to see if the
  interface exists and then assumes it will exist for the rest of its
  operations. This assumption does not hold true because a device can be
  removed at any time (by Nova, the agents, whatever). So when a device
  is removed at the wrong time it will cause an exception that will
  trigger all of the ports to be rewired, which is an expensive
  operation and will cause the status of the ports on the server side to
  go ACTIVE->BUILD->ACTIVE.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1542972/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1542962] [NEW] DHCP agent RuntimeError when dnsmasq_config_file is not given

2016-02-07 Thread changzhi
Public bug reported:

DHCP agent RuntimeError when is not given

** Affects: neutron
 Importance: Undecided
 Assignee: changzhi (changzhi)
 Status: New

** Changed in: neutron
 Assignee: (unassigned) => changzhi (changzhi)

** Summary changed:

- DHCP agent RuntimeError when is not given
+ DHCP agent RuntimeError when dnsmasq_config_file is not given

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1542962

Title:
  DHCP agent RuntimeError when dnsmasq_config_file is not given

Status in neutron:
  New

Bug description:
  DHCP agent RuntimeError when is not given

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1542962/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1537608] Re: Branding: Padding around Nav Icons Needs Fixing

2016-02-07 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/271888
Committed: 
https://git.openstack.org/cgit/openstack/horizon/commit/?id=4b5886d2764ccc05ab9e41b94cda9cdf4f16e2fa
Submitter: Jenkins
Branch:master

commit 4b5886d2764ccc05ab9e41b94cda9cdf4f16e2fa
Author: Diana Whitten 
Date:   Sun Jan 24 21:10:56 2016 -0700

Branding: Nav icon spacing should use css

The padding around the Top Nav Bar's Dropdown Icons have been done
with actual text spaces, instead of relying on padding that is set
via css. This makes it very difficult to customize the padding
around these elements at a global level.

Some contextual classes have been added for ease of branding-level
customization.

Change-Id: I6768135351637db8a950a4b44366880817ce2df3
Closes-bug: #1537608


** Changed in: horizon
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1537608

Title:
  Branding: Padding around Nav Icons Needs Fixing

Status in OpenStack Dashboard (Horizon):
  Fix Released

Bug description:
  The padding around the Top Nav Bar's Dropdown Icons have been done
  with actual text spaces, instead of relying on padding that is set via
  css.  This makes it very difficult to customize the padding around
  these elements at a global level.

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1537608/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1542923] [NEW] Linuxbridge agent failed to start when bridge_mappings is given

2016-02-07 Thread Slawek Kaplonski
Public bug reported:

When I was working on fullstack tests for Linuxbridge agent I found that
when bridge_mappings is configured in LinuxBridge agent config file then
for calculating agent_id mac address of first bridge name from this
bridge_mappings is searched and it is failing. Due to that agent is not
starting properly and is hanging.

Agent's log is stuck on:

ig/cfg.py:2405
2016-02-06 23:48:53.003 6023 DEBUG oslo_service.service [-] 

 log_opt_values 
/home/ubuntu/neutron/.tox/dsvm-fullstack/local/lib/python2.7/site-packages/oslo_con
fig/cfg.py:2407
2016-02-06 23:48:53.004 6023 DEBUG neutron.agent.securitygroups_rpc 
[req-43811efb-7a62-4059-8c93-b75b8554e7f8 - - - - -] Init firewall settings 
(driver=None) init_firewall 
/home/ubuntu/neutron/neutron/agent/securitygroups_rpc.py:98
2016-02-06 23:48:53.005 6023 WARNING neutron.agent.securitygroups_rpc 
[req-43811efb-7a62-4059-8c93-b75b8554e7f8 - - - - -] Driver configuration 
doesn't match with enable_security_group

and then agent was not sending report about his state to neutron server.

** Affects: neutron
 Importance: Undecided
 Assignee: Slawek Kaplonski (slaweq)
 Status: New

** Changed in: neutron
 Assignee: (unassigned) => Slawek Kaplonski (slaweq)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1542923

Title:
  Linuxbridge agent failed to start when bridge_mappings is given

Status in neutron:
  New

Bug description:
  When I was working on fullstack tests for Linuxbridge agent I found
  that when bridge_mappings is configured in LinuxBridge agent config
  file then for calculating agent_id mac address of first bridge name
  from this bridge_mappings is searched and it is failing. Due to that
  agent is not starting properly and is hanging.

  Agent's log is stuck on:

  ig/cfg.py:2405
  2016-02-06 23:48:53.003 6023 DEBUG oslo_service.service [-] 

 log_opt_values 
/home/ubuntu/neutron/.tox/dsvm-fullstack/local/lib/python2.7/site-packages/oslo_con
  fig/cfg.py:2407
  2016-02-06 23:48:53.004 6023 DEBUG neutron.agent.securitygroups_rpc 
[req-43811efb-7a62-4059-8c93-b75b8554e7f8 - - - - -] Init firewall settings 
(driver=None) init_firewall 
/home/ubuntu/neutron/neutron/agent/securitygroups_rpc.py:98
  2016-02-06 23:48:53.005 6023 WARNING neutron.agent.securitygroups_rpc 
[req-43811efb-7a62-4059-8c93-b75b8554e7f8 - - - - -] Driver configuration 
doesn't match with enable_security_group

  and then agent was not sending report about his state to neutron
  server.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1542923/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1508442] Re: LOG.warn is deprecated

2016-02-07 Thread sumit
** Changed in: bilean
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1508442

Title:
  LOG.warn is deprecated

Status in anvil:
  In Progress
Status in Aodh:
  In Progress
Status in Astara:
  Fix Released
Status in Barbican:
  Fix Released
Status in bilean:
  Fix Released
Status in Blazar:
  In Progress
Status in Ceilometer:
  Fix Released
Status in cloud-init:
  In Progress
Status in cloudkitty:
  Fix Released
Status in congress:
  Fix Released
Status in Designate:
  Fix Released
Status in django-openstack-auth:
  Fix Released
Status in django-openstack-auth-kerberos:
  In Progress
Status in DragonFlow:
  Fix Released
Status in ec2-api:
  Fix Released
Status in Evoque:
  In Progress
Status in gce-api:
  In Progress
Status in Glance:
  In Progress
Status in glance_store:
  In Progress
Status in Gnocchi:
  In Progress
Status in heat:
  Fix Released
Status in heat-cfntools:
  In Progress
Status in OpenStack Identity (keystone):
  Fix Released
Status in KloudBuster:
  Fix Released
Status in kolla:
  Fix Released
Status in Magnum:
  Fix Released
Status in Manila:
  Fix Released
Status in Mistral:
  In Progress
Status in networking-arista:
  In Progress
Status in networking-calico:
  In Progress
Status in networking-cisco:
  In Progress
Status in networking-fujitsu:
  Fix Released
Status in networking-odl:
  In Progress
Status in networking-ofagent:
  In Progress
Status in networking-plumgrid:
  In Progress
Status in networking-powervm:
  In Progress
Status in networking-vsphere:
  In Progress
Status in neutron:
  In Progress
Status in OpenStack Compute (nova):
  In Progress
Status in nova-powervm:
  Fix Released
Status in nova-solver-scheduler:
  In Progress
Status in octavia:
  In Progress
Status in openstack-ansible:
  In Progress
Status in oslo.cache:
  Fix Released
Status in oslo.privsep:
  In Progress
Status in Packstack:
  Fix Released
Status in python-dracclient:
  In Progress
Status in python-magnumclient:
  Fix Released
Status in RACK:
  In Progress
Status in python-watcherclient:
  In Progress
Status in shaker:
  In Progress
Status in Solum:
  Fix Released
Status in tempest:
  In Progress
Status in tripleo:
  In Progress
Status in trove-dashboard:
  Fix Released
Status in watcher:
  Fix Released
Status in zaqar:
  In Progress

Bug description:
  LOG.warn is deprecated in Python 3 [1] . But it still used in a few
  places, non-deprecated LOG.warning should be used instead.

  Note: If we are using logger from oslo.log, warn is still valid [2],
  but I agree we can switch to LOG.warning.

  [1]https://docs.python.org/3/library/logging.html#logging.warning
  [2]https://github.com/openstack/oslo.log/blob/master/oslo_log/log.py#L85

To manage notifications about this bug go to:
https://bugs.launchpad.net/anvil/+bug/1508442/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1542892] [NEW] all test_extension_driver_port_security require port-security extension

2016-02-07 Thread Mathieu Losmede
Public bug reported:

2 tests are not checking if port-security extension is enable or not.
then fail if not enabled.

 
neutron.tests.api.admin.test_extension_driver_port_security_admin.PortSecurityAdminTests.test_create_port_security_false_on_shared_network
 
neutron.tests.api.test_extension_driver_port_security.PortSecTest.test_allow_address_pairs

below trace of failing test when port-security is not enabled but run
anyway :

Traceback (most recent call last):
  File "neutron/tests/api/test_extension_driver_port_security.py", line 147, in 
test_allow_address_pairs
port = self.create_port(network=network, port_security_enabled=False)
  File "neutron/tests/api/base.py", line 290, in create_port
**kwargs)
  File "neutron/tests/tempest/services/network/json/network_client.py", line 
148, in _create
resp, body = self.post(uri, post_data)
  File 
"/home/stack/hos-qa-jobs_net_api_hlm-001/neutron/.tox/api-constraints/local/lib/python2.7/site-packages/tempest_lib/common/rest_client.py",
 line 259, in post
return self.request('POST', url, extra_headers, headers, body)
  File 
"/home/stack/hos-qa-jobs_net_api_hlm-001/neutron/.tox/api-constraints/local/lib/python2.7/site-packages/tempest_lib/common/rest_client.py",
 line 639, in request
resp, resp_body)
  File 
"/home/stack/hos-qa-jobs_net_api_hlm-001/neutron/.tox/api-constraints/local/lib/python2.7/site-packages/tempest_lib/common/rest_client.py",
 line 697, in _error_checker
raise exceptions.BadRequest(resp_body, resp=resp)
tempest_lib.exceptions.BadRequest: Bad request
Details: {u'detail': u'', u'message': u"Unrecognized attribute(s) 
'port_security_enabled'", u'type': u'HTTPBadRequest'}

** Affects: neutron
 Importance: Undecided
 Status: New

** Summary changed:

- all test_extension_driver_port_security require extension port-security
+ all test_extension_driver_port_security require port-security extension

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1542892

Title:
  all test_extension_driver_port_security require port-security
  extension

Status in neutron:
  New

Bug description:
  2 tests are not checking if port-security extension is enable or not.
  then fail if not enabled.

   
neutron.tests.api.admin.test_extension_driver_port_security_admin.PortSecurityAdminTests.test_create_port_security_false_on_shared_network
   
neutron.tests.api.test_extension_driver_port_security.PortSecTest.test_allow_address_pairs

  below trace of failing test when port-security is not enabled but run
  anyway :

  Traceback (most recent call last):
File "neutron/tests/api/test_extension_driver_port_security.py", line 147, 
in test_allow_address_pairs
  port = self.create_port(network=network, port_security_enabled=False)
File "neutron/tests/api/base.py", line 290, in create_port
  **kwargs)
File "neutron/tests/tempest/services/network/json/network_client.py", line 
148, in _create
  resp, body = self.post(uri, post_data)
File 
"/home/stack/hos-qa-jobs_net_api_hlm-001/neutron/.tox/api-constraints/local/lib/python2.7/site-packages/tempest_lib/common/rest_client.py",
 line 259, in post
  return self.request('POST', url, extra_headers, headers, body)
File 
"/home/stack/hos-qa-jobs_net_api_hlm-001/neutron/.tox/api-constraints/local/lib/python2.7/site-packages/tempest_lib/common/rest_client.py",
 line 639, in request
  resp, resp_body)
File 
"/home/stack/hos-qa-jobs_net_api_hlm-001/neutron/.tox/api-constraints/local/lib/python2.7/site-packages/tempest_lib/common/rest_client.py",
 line 697, in _error_checker
  raise exceptions.BadRequest(resp_body, resp=resp)
  tempest_lib.exceptions.BadRequest: Bad request
  Details: {u'detail': u'', u'message': u"Unrecognized attribute(s) 
'port_security_enabled'", u'type': u'HTTPBadRequest'}

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1542892/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1540794] Re: deprecate signing config options

2016-02-07 Thread Steve Martinelli
** Changed in: keystone
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1540794

Title:
  deprecate signing config options

Status in OpenStack Identity (keystone):
  Fix Released

Bug description:
  PKI tokens have been deprecated, so should all the signing related
  config options:

  
https://github.com/openstack/keystone/blob/master/keystone/common/config.py#L347-L374

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1540794/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1542819] Re: The details of security group contains "null"

2016-02-07 Thread Nate Johnston
I don't think that I agree with you that there is no value in showing
every field, even ones where the value is 'null'.   It might be
meaningless to some users user, but it is more explicit.  Also, ensuring
that every field is represented in a predictable fashion means that the
API may be easier for other services to consume.

I would like to get more opinions on this; marking it as 'opinion' for
now until we get a consensus.

** Changed in: neutron
   Status: New => Opinion

** Tags added: sg-fw

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1542819

Title:
  The details of security group contains "null"

Status in neutron:
  Opinion

Bug description:
  When using security group, I found the some output of security group will be 
"null". This happens when the value is not specified.
  Under the same condition, "neutron security-group-rule-list" will report 
"any". However, "neutron security-group-rule-show" will report empty.

  The details can be found at [1].

  I think, if the value it not specified for a security group rule, we
  can hide it from the output of "neutron security-group-show". It is
  meaningless to show a "null" to user.


  [1]  http://paste.openstack.org/show/486190/

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1542819/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1538386] Re: DHCP agent report error when enable configuratuion dnsmasq_base_log_dir

2016-02-07 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/272885
Committed: 
https://git.openstack.org/cgit/openstack/neutron/commit/?id=8ae32a6681ad9187e1394b9c633a6eb43df40342
Submitter: Jenkins
Branch:master

commit 8ae32a6681ad9187e1394b9c633a6eb43df40342
Author: changzhi1990 
Date:   Wed Jan 27 11:22:34 2016 +0800

Fix bug when enable configuration named dnsmasq_base_log_dir

DHCP agent will report an error when enable configuration
named 'dnsmasq_base_log_dir'.

For example, if this configuration is set to '/tmp'.
The code checks dir '/tmp' if exists. This is wrong.
The right way is to check '/tmp + [network_id]' existence.

Change-Id: I0e060ca7c84f38bb0ccd55ac16da5446a3d015c5
Closes-Bug: #1538386


** Changed in: neutron
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1538386

Title:
  DHCP agent report error when enable configuratuion
  dnsmasq_base_log_dir

Status in neutron:
  Fix Released

Bug description:
  DHCP agent will report error when enable dnsmasq_base_log_dir in DHCP
  agent configuration file.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1538386/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1542855] [NEW] Glance generates a non-reproducible config file

2016-02-07 Thread Thomas Goirand
Public bug reported:

When generating glance-api.conf and glance-registry.conf, the workers
directive, even though commented, is populated with a value which
depends on the number of CPU (or core?) of the machine generating the
file. This means that the build of Glance isn't reproducible (ie:
building the package on 2 different machine will not produce byte for
byte identical packages).

If you didn't hear about the Debian reproducible build effort, please read 
these wiki entries:
https://wiki.debian.org/ReproducibleBuilds
https://wiki.debian.org/ReproducibleBuilds/About

and please consider removing non-deterministic bits when generating the
configuration files.

** Affects: glance
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Glance.
https://bugs.launchpad.net/bugs/1542855

Title:
  Glance generates a non-reproducible config file

Status in Glance:
  New

Bug description:
  When generating glance-api.conf and glance-registry.conf, the workers
  directive, even though commented, is populated with a value which
  depends on the number of CPU (or core?) of the machine generating the
  file. This means that the build of Glance isn't reproducible (ie:
  building the package on 2 different machine will not produce byte for
  byte identical packages).

  If you didn't hear about the Debian reproducible build effort, please read 
these wiki entries:
  https://wiki.debian.org/ReproducibleBuilds
  https://wiki.debian.org/ReproducibleBuilds/About

  and please consider removing non-deterministic bits when generating
  the configuration files.

To manage notifications about this bug go to:
https://bugs.launchpad.net/glance/+bug/1542855/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1542819] [NEW] The details of security group contains "null"

2016-02-07 Thread Hong Hui Xiao
Public bug reported:

When using security group, I found the some output of security group will be 
"null". This happens when the value is not specified.
Under the same condition, "neutron security-group-rule-list" will report "any". 
However, "neutron security-group-rule-show" will report empty.

The details can be found at [1].

I think, if the value it not specified for a security group rule, we can
hide it from the output of "neutron security-group-show". It is
meaningless to show a "null" to user.


[1]  http://paste.openstack.org/show/486190/

** Affects: neutron
 Importance: Undecided
 Assignee: Hong Hui Xiao (xiaohhui)
 Status: New

** Changed in: neutron
 Assignee: (unassigned) => Hong Hui Xiao (xiaohhui)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1542819

Title:
  The details of security group contains "null"

Status in neutron:
  New

Bug description:
  When using security group, I found the some output of security group will be 
"null". This happens when the value is not specified.
  Under the same condition, "neutron security-group-rule-list" will report 
"any". However, "neutron security-group-rule-show" will report empty.

  The details can be found at [1].

  I think, if the value it not specified for a security group rule, we
  can hide it from the output of "neutron security-group-show". It is
  meaningless to show a "null" to user.


  [1]  http://paste.openstack.org/show/486190/

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1542819/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1542815] [NEW] rbac-list response will report wrong object_type

2016-02-07 Thread Haim Daniel
Public bug reported:

This will happen when a new rbac table shall be introduced. The cause is the 
usage of the CommonDbMixin._union_model_query(). The current code flow joins  
SQL SELECT results from several rbac tables (per rbac object type). However, 
the resulting sqlalchemy union list from several  tables contains the db_model 
type of the first table plus the output rows from all the other tables, causing 
the REST response of 'rbac-list' to contain the wrong object type. 
E.g: rbac-list on the following db_schema:

networkrbacs table: {id=ID1, target_tenant=ID2, object_id=ID3, ...}
qospolicyrbacs table: empty

will result in REST response:
{"target_tenant": ID2, "object_type": "qos_policy", "object_id": ID3}

The issue hasn't appeared yeat, since there's only a single rbac type
(network) at the moment.

** Affects: neutron
 Importance: Undecided
 Assignee: Haim Daniel (hdaniel)
 Status: New

** Changed in: neutron
 Assignee: (unassigned) => Haim Daniel (hdaniel)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1542815

Title:
  rbac-list response will report  wrong object_type

Status in neutron:
  New

Bug description:
  This will happen when a new rbac table shall be introduced. The cause is the 
usage of the CommonDbMixin._union_model_query(). The current code flow joins  
SQL SELECT results from several rbac tables (per rbac object type). However, 
the resulting sqlalchemy union list from several  tables contains the db_model 
type of the first table plus the output rows from all the other tables, causing 
the REST response of 'rbac-list' to contain the wrong object type. 
  E.g: rbac-list on the following db_schema:

  networkrbacs table: {id=ID1, target_tenant=ID2, object_id=ID3, ...}
  qospolicyrbacs table: empty

  will result in REST response:
  {"target_tenant": ID2, "object_type": "qos_policy", "object_id": ID3}

  The issue hasn't appeared yeat, since there's only a single rbac type
  (network) at the moment.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1542815/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp