[Yahoo-eng-team] [Bug 1659730] [NEW] Invalid parameter name on interface

2017-01-26 Thread Steve Martinelli
Public bug reported:

Invalid parameter name on interface

There are several classes that inherit from the abstract method
AuthMethodHandler.authenticate. In some cases those classes are
not using matching parameter names.

This patch changes all classes such that the signatures match.
Prior to this there were four different signatures:

authenticate(self, context, auth_payload, auth_context)
authenticate(self, request, auth_info, auth_context)
authenticate(self, request, auth_payload, auth_context)
authenticate(self, request, auth_payload, user_context)

The new common signature should be:

authenticate(self, request, auth_payload, auth_context)

** Affects: keystone
 Importance: Medium
 Assignee: Eric Brown (ericwb)
 Status: Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1659730

Title:
  Invalid parameter name on interface

Status in OpenStack Identity (keystone):
  Fix Released

Bug description:
  Invalid parameter name on interface

  There are several classes that inherit from the abstract method
  AuthMethodHandler.authenticate. In some cases those classes are
  not using matching parameter names.

  This patch changes all classes such that the signatures match.
  Prior to this there were four different signatures:

  authenticate(self, context, auth_payload, auth_context)
  authenticate(self, request, auth_info, auth_context)
  authenticate(self, request, auth_payload, auth_context)
  authenticate(self, request, auth_payload, user_context)

  The new common signature should be:

  authenticate(self, request, auth_payload, auth_context)

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1659730/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1604924] Re: [RFE] add support for vhost-user reconnect to the ovs neutron agent

2017-01-26 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/344997
Committed: 
https://git.openstack.org/cgit/openstack/neutron/commit/?id=ca60a91cbd3668c469313a3bd6c0c99aeff30a74
Submitter: Jenkins
Branch:master

commit ca60a91cbd3668c469313a3bd6c0c99aeff30a74
Author: Sean Mooney 
Date:   Mon Jul 18 04:19:04 2016 +

adds support for vhost user reconnect.

- vhost-user reconnect is a new feature added
  in dpdk 16.07 and qemu 2.7.
- vhost-user reconnect allows VMs using vhost-user
  interfaces to reconnect to the vhost-user backend if
  the backend terminates either as a result of a graceful
  shutdown or a crash with out requiring the vm to reboot.
- vhost-user reconnect requires qemu to be the vhost-user server
  and ovs to be the client.
- dpdk prior to 16.07 only supports qemu client/ dpdk server mode.
- This change extends the ovs mech driver to select the correct qemu
  vhost user socket mode based on the available interface types
  reported by the agent.

Change-Id: Iec89eaa597311e086c5f6e8d67308d446b07ac33
Closes-Bug: #1604924
Depends-on: Ia5da5b3ef28d1b23b217adc5196199df47b54ed9


** Changed in: neutron
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1604924

Title:
  [RFE] add support for vhost-user reconnect to the ovs neutron agent

Status in neutron:
  Fix Released

Bug description:
  vhost-user reconnect is a new feature added in dpdk 16.07 and qemu 2.7

  vhost-user reconnect is a mechanism which allow a vhost-user frontend
  to reconnect to a vhost-user backend in the event the backend terminates.
  This enable a vm utilising a vhost-user interface to reconnect
  automatically to the backend e.g. a vswitch without requiring
  the vm to reboot.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1604924/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1659710] [NEW] Transition qos notification driver into qos driver

2017-01-26 Thread OpenStack Infra
Public bug reported:

https://review.openstack.org/396651
Dear bug triager. This bug was created since a commit was marked with DOCIMPACT.
Your project "openstack/neutron" is set up so that we directly report the 
documentation bugs against it. If this needs changing, the docimpact-group 
option needs to be added for the project. You can ask the OpenStack infra team 
(#openstack-infra on freenode) for help if you need to.

commit 38c1812015b6977f8212723d08cefb0926e6
Author: Miguel Angel Ajo 
Date:   Thu Nov 17 09:17:29 2016 -0500

Transition qos notification driver into qos driver

This will deprecate the notification_driver config setting,
and no config setting will be needed.

Also it lays down the foundation for a more decoupled interaction
with mechanism drivers.

Closes-Bug: #1657379
Related-Bug: #1627749
DocImpact

Change-Id: I2f166a43f0b980ad22617f8a3f7b4cc7f4786c48

** Affects: neutron
 Importance: Undecided
 Status: New


** Tags: doc neutron

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1659710

Title:
  Transition qos notification driver into qos driver

Status in neutron:
  New

Bug description:
  https://review.openstack.org/396651
  Dear bug triager. This bug was created since a commit was marked with 
DOCIMPACT.
  Your project "openstack/neutron" is set up so that we directly report the 
documentation bugs against it. If this needs changing, the docimpact-group 
option needs to be added for the project. You can ask the OpenStack infra team 
(#openstack-infra on freenode) for help if you need to.

  commit 38c1812015b6977f8212723d08cefb0926e6
  Author: Miguel Angel Ajo 
  Date:   Thu Nov 17 09:17:29 2016 -0500

  Transition qos notification driver into qos driver
  
  This will deprecate the notification_driver config setting,
  and no config setting will be needed.
  
  Also it lays down the foundation for a more decoupled interaction
  with mechanism drivers.
  
  Closes-Bug: #1657379
  Related-Bug: #1627749
  DocImpact
  
  Change-Id: I2f166a43f0b980ad22617f8a3f7b4cc7f4786c48

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1659710/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1657379] Re: Refactor the QoS "notification_drivers" into QoS drivers

2017-01-26 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/396651
Committed: 
https://git.openstack.org/cgit/openstack/neutron/commit/?id=38c1812015b6977f8212723d08cefb0926e6
Submitter: Jenkins
Branch:master

commit 38c1812015b6977f8212723d08cefb0926e6
Author: Miguel Angel Ajo 
Date:   Thu Nov 17 09:17:29 2016 -0500

Transition qos notification driver into qos driver

This will deprecate the notification_driver config setting,
and no config setting will be needed.

Also it lays down the foundation for a more decoupled interaction
with mechanism drivers.

Closes-Bug: #1657379
Related-Bug: #1627749
DocImpact

Change-Id: I2f166a43f0b980ad22617f8a3f7b4cc7f4786c48


** Changed in: neutron
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1657379

Title:
  Refactor the QoS "notification_drivers" into QoS drivers

Status in neutron:
  Fix Released

Bug description:
  
Beyond doing a decoupling refactor from the mechanism drivers and the core 
plugin this change will removes the need to define a notification_driver in the 
[qos] section of the neutron config file, being those drivers automatically 
exposed by the loaded mechanism drivers or the loaded core plugin.

This is also a preliminary step to make
  https://bugs.launchpad.net/neutron/+bug/1586056 ( Improved validation
  mechanism for QoS rules with port types) possible.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1657379/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1659215] Re: Should not allow assign floating IPs that are already assigned to another port

2017-01-26 Thread Miguel Lavalle
This is not a bug either in Nova. Please take a look at this  Tempest
API test:

https://github.com/openstack/tempest/blob/master/tempest/api/compute/floating_ips/test_floating_ips_actions.py#L109

and its failure as a consequence of the proposed Neutron fix:

https://github.com/openstack/tempest/blob/master/tempest/api/compute/floating_ips/test_floating_ips_actions.py#L109

** Changed in: nova
   Status: In Progress => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1659215

Title:
  Should not allow assign floating IPs that are already assigned to
  another port

Status in neutron:
  Invalid
Status in OpenStack Compute (nova):
  Invalid

Bug description:
  While associate floating ip to instance, we did not check the floating IP is 
already assigned to
  another port or not:
  
http://git.openstack.org/cgit/openstack/nova/tree/nova/network/neutronv2/api.py#n1684
  It is understandable to allow re-assign to the same port, but we should not 
re-assgin
  if it is already assigned to other ports.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1659215/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1659691] [NEW] neutron-vpnaas tempest job improvement

2017-01-26 Thread YAMAMOTO Takashi
Public bug reported:

gate-neutron-dsvm-tempest-vpnaas-ubuntu-xenial is completely broken.
(it doesn't even configure vpnaas)
it needs to be fixed and made voting.

i plan to fold gate-neutron-vpnaas-dsvm-api-ubuntu-xenial-nv into the above job
once it gets ready.

** Affects: neutron
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1659691

Title:
  neutron-vpnaas tempest job improvement

Status in neutron:
  New

Bug description:
  gate-neutron-dsvm-tempest-vpnaas-ubuntu-xenial is completely broken.
  (it doesn't even configure vpnaas)
  it needs to be fixed and made voting.

  i plan to fold gate-neutron-vpnaas-dsvm-api-ubuntu-xenial-nv into the above 
job
  once it gets ready.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1659691/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1659215] Re: Should not allow assign floating IPs that are already assigned to another port

2017-01-26 Thread Miguel Lavalle
This is not a bug, this is the expected behavior of the floating ip API
in Neutron. Please look at this Tempest test case failure that was
triggered by the proposed fix
(https://review.openstack.org/#/c/425563/):

http://logs.openstack.org/63/425563/1/check/gate-tempest-dsvm-neutron-
linuxbridge-ubuntu-
xenial/4601f1d/console.html#_2017-01-26_08_51_05_811634

The source of this test is the following:

https://github.com/openstack/tempest/blob/master/tempest/api/network/test_floating_ips.py#L65

We are clearly saying in this test case's code that we allow to change a
floating ip association without disassociating if before

** Changed in: neutron
   Status: In Progress => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1659215

Title:
  Should not allow assign floating IPs that are already assigned to
  another port

Status in neutron:
  Invalid
Status in OpenStack Compute (nova):
  In Progress

Bug description:
  While associate floating ip to instance, we did not check the floating IP is 
already assigned to
  another port or not:
  
http://git.openstack.org/cgit/openstack/nova/tree/nova/network/neutronv2/api.py#n1684
  It is understandable to allow re-assign to the same port, but we should not 
re-assgin
  if it is already assigned to other ports.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1659215/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1291157] Re: idp deletion should trigger token revocation

2017-01-26 Thread Anthony Washington
https://review.openstack.org/#/c/414720/29 -- Fixed issue.

** Changed in: keystone
   Status: Confirmed => Invalid

** Changed in: keystone
 Assignee: Anthony Washington (anthony-washington) => (unassigned)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1291157

Title:
  idp deletion should trigger token revocation

Status in OpenStack Identity (keystone):
  Invalid

Bug description:
  When a federation IdP is deleted, the tokens that were issued (and
  still active) and associated with the IdP should be deleted. To
  prevent unwarranted access. The fix should delete any tokens that are
  associated with the idp, upon deletion (and possibly update, too).

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1291157/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1659655] [NEW] test fails with a bogus message: 'WaitTimeout' object has no attribute 'seconds'

2017-01-26 Thread Thomas Morin
Public bug reported:

On some timeouts, the following is seen in test logs (e.g. [1]):

  Traceback (most recent call last):
File "neutron/tests/base.py", line 117, in func
  self.fail('Execution of this test timed out: %s' % e)
File 
"/opt/stack/new/neutron/.tox/dsvm-functional/local/lib/python2.7/site-packages/eventlet/timeout.py",
 line 108, in __str__
  if self.seconds is None:
  AttributeError: 'WaitTimeout' object has no attribute 'seconds'


This seems to be due to WaitTimeout inheriting from eventlet.timeout.Timeout 
but not using its constructor [2] which initiates self.seconds.

[1] 
http://logs.openstack.org/56/425756/1/check/gate-neutron-dsvm-functional-ubuntu-xenial/c6bb644/console.html#_2017-01-26_15_57_28_297978
[2] https://github.com/eventlet/eventlet/blob/master/eventlet/timeout.py#L51

** Affects: neutron
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1659655

Title:
  test fails with a bogus message: 'WaitTimeout' object has no attribute
  'seconds'

Status in neutron:
  New

Bug description:
  On some timeouts, the following is seen in test logs (e.g. [1]):

Traceback (most recent call last):
  File "neutron/tests/base.py", line 117, in func
self.fail('Execution of this test timed out: %s' % e)
  File 
"/opt/stack/new/neutron/.tox/dsvm-functional/local/lib/python2.7/site-packages/eventlet/timeout.py",
 line 108, in __str__
if self.seconds is None:
AttributeError: 'WaitTimeout' object has no attribute 'seconds'

  
  This seems to be due to WaitTimeout inheriting from eventlet.timeout.Timeout 
but not using its constructor [2] which initiates self.seconds.

  [1] 
http://logs.openstack.org/56/425756/1/check/gate-neutron-dsvm-functional-ubuntu-xenial/c6bb644/console.html#_2017-01-26_15_57_28_297978
  [2] https://github.com/eventlet/eventlet/blob/master/eventlet/timeout.py#L51

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1659655/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1659647] [NEW] The resource tracker clears the tracked_instances dictionary on every periodic job

2017-01-26 Thread Chris Dent
Public bug reported:

The resource tracker has a dict, named 'tracked_instances' which based
on the name is used to keep track of the instances that the resource
tracker is tracking.

However, on every run of the 'update_available_resource' method, the
'_update_usage_from_instances' method is called and in there the
tracked_instances dict is cleared. This means that the conditionals in
the '_update_usage_from_instance' (singular) method always indicate that
the current instance is considered new and the various update methods
for that instance will always be called.

In the case of the calls to the placement API, this means there are many
extra calls which could be avoided.

Removing the clear() call results in no unit or functional test
failures. A test run the gate will be tried.

** Affects: nova
 Importance: Undecided
 Status: New


** Tags: resource-tracker scheduler

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1659647

Title:
  The resource tracker clears the tracked_instances dictionary on every
  periodic job

Status in OpenStack Compute (nova):
  New

Bug description:
  The resource tracker has a dict, named 'tracked_instances' which based
  on the name is used to keep track of the instances that the resource
  tracker is tracking.

  However, on every run of the 'update_available_resource' method, the
  '_update_usage_from_instances' method is called and in there the
  tracked_instances dict is cleared. This means that the conditionals in
  the '_update_usage_from_instance' (singular) method always indicate
  that the current instance is considered new and the various update
  methods for that instance will always be called.

  In the case of the calls to the placement API, this means there are
  many extra calls which could be avoided.

  Removing the clear() call results in no unit or functional test
  failures. A test run the gate will be tried.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1659647/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1659416] Re: RFE: extend security group rules to support logging

2017-01-26 Thread Armando Migliaccio
** Changed in: neutron
   Importance: Undecided => Wishlist

** Changed in: neutron
   Status: New => Confirmed

** Changed in: neutron
   Status: Confirmed => Won't Fix

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1659416

Title:
  RFE: extend security group rules to support logging

Status in neutron:
  Won't Fix

Bug description:
  It is important for operators to have visibility for security rule
  enforcements, as described in [1]. A specific requirement is to be
  able to control logging behaviour at rule level.

  A typical use case is, when defining rules for a new application, or
  when an application has new clients, the user wants to observe/learn
  what are the active flows in "monitoring" phase, to avoid missing
  rules. During this phase, a "allow any" rule can be added to the
  security group for that application, and packets hitting that rule can
  be logged (with rate limiting).

  For this purpose, rule level logging enabling/disabling is required.
  Instead of a generic logging API, this RFE propose a simple extension
  to security rule resource, to add a "log" property. It will be each
  plugin's choice whether and how to support it. Take networking-ovn as
  an example, it will be straightforward to translate this into the
  "log" keyword in OVN ACL.

  [1] https://bugs.launchpad.net/neutron/+bug/1468366

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1659416/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1659648] [NEW] Instance hung on first start, but works after being killed and restarted

2017-01-26 Thread Jason Hobbs
Public bug reported:

Description
===
A instance did not come up properly the first time it was started and had to be 
manually killed and then restarted through the API to get it to work.


Steps To Reproduce
==
* I started an instance through the API
* I noticed I coudln't connect to its floating IP.
* I checked the nova compute node and the qemu-kvm process was running at 100% 
cpu, and its console log was empty.
* I tried to shut it down through virsh on the compute node, but it didn't 
respond to that.
* I had to kill it with kill .
* After that I started the instance again through the API and it came up 
properly and everything is working.

Expected Result
===
The instance starts correctly the first time.

Actual Result
=
I had to kill and restart the instance.

This doesn't happen everytime, seems to be some kind of race.

I'm at a bit of a loss as to how to debug this.


Environment
===
This is with mitaka running on xenial using libvirt+kvm hypervisor, openvswitch 
networking, and no attached volumes.

Package versions:
ii  nova-common  2:13.1.2-0ubuntu2   
all  OpenStack Compute - common files
ii  nova-compute 2:13.1.2-0ubuntu2   
all  OpenStack Compute - compute node base
ii  nova-compute-kvm 2:13.1.2-0ubuntu2   
all  OpenStack Compute - compute node (KVM)
ii  nova-compute-libvirt 2:13.1.2-0ubuntu2   
all  OpenStack Compute - compute node libvirt support
ii  python-nova  2:13.1.2-0ubuntu2   
all  OpenStack Compute Python libraries
ii  python-novaclient2:3.3.1-2ubuntu1
all  client library for OpenStack Compute API - Python 2.7
ii  libvirt-bin  1.3.1-1ubuntu10.6   
amd64programs for the libvirt library
ii  libvirt0:amd64   1.3.1-1ubuntu10.6   
amd64library for interfacing with different virtualization systems
ii  python-libvirt   1.3.1-1ubuntu1  
amd64libvirt Python bindings

Linux hayward-44 4.4.0-59-generic #80-Ubuntu SMP Fri Jan 6 17:47:47 UTC
2017 x86_64 x86_64 x86_64 GNU/Linux

** Affects: nova
 Importance: Undecided
 Status: New


** Tags: oil-guestos-fail

** Attachment added: "sosreport-hayward-44-20170126201325.tar.xz"
   
https://bugs.launchpad.net/bugs/1659648/+attachment/4809483/+files/sosreport-hayward-44-20170126201325.tar.xz

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1659648

Title:
  Instance hung on first start, but works after being killed and
  restarted

Status in OpenStack Compute (nova):
  New

Bug description:
  Description
  ===
  A instance did not come up properly the first time it was started and had to 
be manually killed and then restarted through the API to get it to work.

  
  Steps To Reproduce
  ==
  * I started an instance through the API
  * I noticed I coudln't connect to its floating IP.
  * I checked the nova compute node and the qemu-kvm process was running at 
100% cpu, and its console log was empty.
  * I tried to shut it down through virsh on the compute node, but it didn't 
respond to that.
  * I had to kill it with kill .
  * After that I started the instance again through the API and it came up 
properly and everything is working.

  Expected Result
  ===
  The instance starts correctly the first time.

  Actual Result
  =
  I had to kill and restart the instance.

  This doesn't happen everytime, seems to be some kind of race.

  I'm at a bit of a loss as to how to debug this.

  
  Environment
  ===
  This is with mitaka running on xenial using libvirt+kvm hypervisor, 
openvswitch networking, and no attached volumes.

  Package versions:
  ii  nova-common  2:13.1.2-0ubuntu2   
all  OpenStack Compute - common files
  ii  nova-compute 2:13.1.2-0ubuntu2   
all  OpenStack Compute - compute node base
  ii  nova-compute-kvm 2:13.1.2-0ubuntu2   
all  OpenStack Compute - compute node (KVM)
  ii  nova-compute-libvirt 2:13.1.2-0ubuntu2   
all  OpenStack Compute - compute node libvirt support
  ii  python-nova  2:13.1.2-0ubuntu2   
all  OpenStack Compute Python libraries
  ii  python-novaclient2:3.3.1-2ubuntu1
all  client library for OpenStack Compute API - Python 2.7
  ii  libvirt-bin  1.3.1-1ubuntu10.6 

[Yahoo-eng-team] [Bug 1657978] Re: Internal Server Error: KeyError: 'domain'

2017-01-26 Thread Steve Martinelli
Eric, per your comment in #7, i will mark this as fix released for
Mitaka and Newton and invalid for Ocata. see
https://review.openstack.org/#/q/I213876e30fc0521195848479278080bdac8387de,n,z
for details.

** Also affects: keystone/newton
   Importance: Undecided
   Status: New

** Also affects: keystone/mitaka
   Importance: Undecided
   Status: New

** Also affects: keystone/ocata
   Importance: Medium
 Assignee: Eric Brown (ericwb)
   Status: New

** Changed in: keystone/ocata
   Status: New => Invalid

** Changed in: keystone/newton
   Status: New => Fix Released

** Changed in: keystone/newton
   Importance: Undecided => Medium

** Changed in: keystone/mitaka
   Status: New => Fix Released

** Changed in: keystone/ocata
 Assignee: Eric Brown (ericwb) => (unassigned)

** Changed in: keystone/mitaka
   Importance: Undecided => Medium

** Changed in: keystone/ocata
   Importance: Medium => Undecided

** Changed in: keystone/newton
 Assignee: (unassigned) => Eric Brown (ericwb)

** Changed in: keystone/mitaka
 Assignee: (unassigned) => Eric Brown (ericwb)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1657978

Title:
  Internal Server Error: KeyError: 'domain'

Status in OpenStack Identity (keystone):
  Invalid
Status in OpenStack Identity (keystone) mitaka series:
  Fix Released
Status in OpenStack Identity (keystone) newton series:
  Fix Released
Status in OpenStack Identity (keystone) ocata series:
  Invalid

Bug description:
  I get the following message in Horizon when trying to authenticate a
  federated user with a misconfigured mapping (in Mitaka)

  {"error": {"message": "An unexpected error prevented the server from
  fulfilling your request: 'domain' (Disable insecure_debug mode to
  suppress these details.)", "code": 500, "title": "Internal Server
  Error"}}

  
  This is my mapping.json. Notice no domain is part of the "group" parameter 
(even though there is one at one level higher). 
  [
  {
  "local": [
  {
  "domain": {
  "name": "Default"
  }, 
  "group": {
  "name": "Federated Users"
  }, 
  "user": {
  "name": "{0}", 
  "email": "{1}"
  }, 
  "groups": "{2}"
  }
  ], 
  "remote": [
  {
  "type": "REMOTE_USER"
  }, 
  {
  "type": "MELLON_userEmail"
  }, 
  {
  "type": "MELLON_groups"
  }
  ]
  }
  ]

  
  This is the log output of the keyerror containing the assertion.

  http://paste.openstack.org/show/595730/

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1657978/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1657935] Re: intermittent failures in setup_physical_bridges

2017-01-26 Thread Armando Migliaccio
This is gone away.

** Changed in: neutron
   Status: Confirmed => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1657935

Title:
  intermittent failures in setup_physical_bridges

Status in neutron:
  Invalid

Bug description:
  http://logs.openstack.org/39/388939/18/check/gate-neutron-dsvm-
  functional-ubuntu-xenial/71d901a/testr_results.html.gz

  http://logs.openstack.org/50/402750/31/check/gate-neutron-dsvm-
  functional-ubuntu-xenial/6c1d7b4/testr_results.html.gz

  http://logs.openstack.org/04/395504/15/check/gate-neutron-dsvm-
  functional-ubuntu-xenial/dc17d0b/testr_results.html.gz

  http://logs.openstack.org/09/422309/1/check/gate-neutron-dsvm-
  functional-ubuntu-xenial/e0c8a6c/testr_results.html.gz

  http://logs.openstack.org/04/395504/13/check/gate-neutron-dsvm-
  functional-ubuntu-xenial/ea7661f/testr_results.html.gz

  http://logs.openstack.org/28/340228/30/check/gate-neutron-dsvm-
  functional-ubuntu-xenial/f229bb2/testr_results.html.gz

  http://logs.openstack.org/02/416302/13/check/gate-neutron-dsvm-
  functional-ubuntu-xenial/d4d757f/testr_results.html.gz

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1657935/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1630416] Re: Issues on admin create network modal

2017-01-26 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/383960
Committed: 
https://git.openstack.org/cgit/openstack/horizon/commit/?id=2f5a2585827a281f086c8a94e1da497e0821f701
Submitter: Jenkins
Branch:master

commit 2f5a2585827a281f086c8a94e1da497e0821f701
Author: Ying Zuo 
Date:   Fri Oct 7 13:40:27 2016 -0700

Fix issues on create network and create port modals

Only delete the error for required field when segmentation id is not
required for the network provider.

Set string values as the choices for admin state field.

Change-Id: Ie5d62960b85b9a1b9e0caf8fa51761d950cf430b
Closes-bug: #1630416


** Changed in: horizon
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1630416

Title:
  Issues on admin create network modal

Status in OpenStack Dashboard (Horizon):
  Fix Released

Bug description:
  Steps to reproduce:
  1. go to admin/system/networks panel
  2. click create network
  3. click the submit button without putting in any data

  You will notice these issues on the modal:

  1. Segmentation ID field should be validated if the input is a whole
  number even when it's not required for the network.

  2. The value in Admin State field is changed from "UP" to "True".
  (This can also be reproduced on the same field on create port modal
  from admin -> networks -> network details -> ports tab)

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1630416/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1659596] [NEW] Reuse already registered group in tempest config

2017-01-26 Thread Nishant Kumar
Public bug reported:

Instead of registering new groups in tempest plugin use the already
registered group since the tempest config which is being used in plugin
is the same as the upstream tempest.  Also registering the same group
twice would lead to duplicate opt error.

** Affects: keystone
 Importance: Undecided
 Assignee: Nishant Kumar (nishant-tech07)
 Status: New

** Changed in: keystone
 Assignee: (unassigned) => Nishant Kumar (nishant-tech07)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1659596

Title:
  Reuse already registered group in tempest config

Status in OpenStack Identity (keystone):
  New

Bug description:
  Instead of registering new groups in tempest plugin use the already
  registered group since the tempest config which is being used in
  plugin is the same as the upstream tempest.  Also registering the same
  group twice would lead to duplicate opt error.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1659596/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1652944] Re: Broken links

2017-01-26 Thread Alexandra Settle
** Changed in: openstack-manuals
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1652944

Title:
  Broken links

Status in neutron:
  Confirmed
Status in openstack-manuals:
  Fix Released

Bug description:
  The documentation of neutron (see referer below) contains links to
  pages that do not exist. This was found by a global check of pages on
  docs.openstack.org using scrapy.

  {"url": 
"http://docs.openstack.org/developer/neutron/devref/l2_agent_extensions";, 
"status": 404, "referer": 
"http://docs.openstack.org/developer/neutron/devref/quality_of_service.html"},
  {"url": 
"http://docs.openstack.org/newton/networking-guide/scenario_legacy_ovs.html";, 
"status": 404, "referer": 
"http://docs.openstack.org/developer/neutron/devref/layer3.html"},
  {"url": 
"http://docs.openstack.org/newton/networking-guide/deploy_scenario4b.html";, 
"status": 404, "referer": 
"http://docs.openstack.org/developer/neutron/devref/linuxbridge_agent.html"},
  {"url": 
"http://docs.openstack.org/newton/networking-guide/deploy_scenario1b.html";, 
"status": 404, "referer": 
"http://docs.openstack.org/developer/neutron/devref/linuxbridge_agent.html"},
  {"url": 
"http://docs.openstack.org/newton/networking-guide/deploy_scenario3b.html";, 
"status": 404, "referer": 
"http://docs.openstack.org/developer/neutron/devref/linuxbridge_agent.html"},
  {"url": 
"http://docs.openstack.org/newton/networking-guide/scenario_legacy_lb.html";, 
"status": 404, "referer": 
"http://docs.openstack.org/developer/neutron/devref/linuxbridge_agent.html"},
  {"url": 
"http://docs.openstack.org/newton/networking-guide/adv_config_ipv6.html";, 
"status": 404, "referer": 
"http://docs.openstack.org/releasenotes/neutron/liberty.html"},
  {"url": 
"http://docs.openstack.org/developer/neutron/devref/l2_agent_extensions";, 
"status": 404, "referer": 
"http://docs.openstack.org/developer/neutron/devref/quality_of_service.html"},
  {"url": 
"http://docs.openstack.org/newton/networking-guide/scenario_legacy_lb.html";, 
"status": 404, "referer": 
"http://docs.openstack.org/developer/neutron/devref/linuxbridge_agent.html"},
  {"url": 
"http://docs.openstack.org/newton/networking-guide/deploy_scenario4b.html";, 
"status": 404, "referer": 
"http://docs.openstack.org/developer/neutron/devref/linuxbridge_agent.html"},
  {"url": 
"http://docs.openstack.org/newton/networking-guide/deploy_scenario1b.html";, 
"status": 404, "referer": 
"http://docs.openstack.org/developer/neutron/devref/linuxbridge_agent.html"},
  {"url": 
"http://docs.openstack.org/newton/networking-guide/deploy_scenario3b.html";, 
"status": 404, "referer": 
"http://docs.openstack.org/developer/neutron/devref/linuxbridge_agent.html"},
  {"url": 
"http://docs.openstack.org/newton/networking-guide/scenario_legacy_ovs.html";, 
"status": 404, "referer": 
"http://docs.openstack.org/developer/neutron/devref/layer3.html"},
  {"url": 
"http://docs.openstack.org/newton/networking-guide/adv_config_ipv6.html";, 
"status": 404, "referer": 
"http://docs.openstack.org/releasenotes/neutron/liberty.html"},
  {"url": 
"http://docs.openstack.org/developer/openstack-ansible/install-guide-revised-draft/targethosts-networkconfig.html";,
 "status": 404, "referer": 
"http://docs.openstack.org/developer/openstack-ansible-os_neutron/newton/app-openvswitch.html"},
  {"url": 
"http://docs.openstack.org/developer/neutron-dynamic-routing/others/testing.rst";,
 "status": 404, "referer": 
"http://docs.openstack.org/developer/neutron-dynamic-routing/functionality/bgp-speaker.html"},
  {"url": 
"http://docs.openstack.org/developer/neutron-dynamic-routing/functionality/route-advertisement.rst";,
 "status": 404, "referer": 
"http://docs.openstack.org/developer/neutron-dynamic-routing/functionality/bgp-speaker.html"},
  {"url": 
"http://docs.openstack.org/developer/neutron-dynamic-routing/design/drivers.rst";,
 "status": 404, "referer": 
"http://docs.openstack.org/developer/neutron-dynamic-routing/functionality/bgp-speaker.html"},
  {"url": 
"http://docs.openstack.org/developer/neutron-dynamic-routing/functionality/dynamic-routing-agent.rst";,
 "status": 404, "referer": 
"http://docs.openstack.org/developer/neutron-dynamic-routing/functionality/bgp-speaker.html"},

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1652944/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1632538] Re: Using generate_service_certificate and undercloud_public_vip in undercloud.conf breaks nova

2017-01-26 Thread Launchpad Bug Tracker
This bug was fixed in the package python-rfc3986 -
0.2.2-0ubuntu0.16.10.1

---
python-rfc3986 (0.2.2-0ubuntu0.16.10.1) yakkety; urgency=medium

  * New upstream point release, resolving issue which causes valid
URLS to be rejected (LP: #1632538).

 -- James Page   Thu, 20 Oct 2016 09:55:32 +0100

** Changed in: python-rfc3986 (Ubuntu Yakkety)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1632538

Title:
  Using generate_service_certificate and undercloud_public_vip in
  undercloud.conf breaks nova

Status in OpenStack Compute (nova):
  Incomplete
Status in OpenStack Compute (nova) newton series:
  Incomplete
Status in tripleo:
  Invalid
Status in python-rfc3986 package in Ubuntu:
  Fix Released
Status in python-rfc3986 source package in Xenial:
  Fix Released
Status in python-rfc3986 source package in Yakkety:
  Fix Released
Status in python-rfc3986 source package in Zesty:
  Fix Released

Bug description:
  Enabling SSL on the Undercloud using generate_service_certificate
  results in all Nova services on the undercloud (api, cert, compute,
  conductor, scheduler), all failing with errors similar to the
  following:

  2016-10-11 22:28:27.327 66082 CRITICAL nova 
[req-b5f37af3-96fc-42e2-aaa6-52815aca07fe - - - - -] ConfigFileValueError: 
Value for option url is not valid: invalid URI: 
'https://rdo-ci-fx2-06-s5.v103.rdoci.lab.eng.rdu.redhat.com:13696'
  2016-10-11 22:28:27.327 66082 ERROR nova Traceback (most recent call last):
  2016-10-11 22:28:27.327 66082 ERROR nova   File "/usr/bin/nova-cert", line 
10, in 
  2016-10-11 22:28:27.327 66082 ERROR nova sys.exit(main())
  2016-10-11 22:28:27.327 66082 ERROR nova   File 
"/usr/lib/python2.7/site-packages/nova/cmd/cert.py", line 49, in main
  2016-10-11 22:28:27.327 66082 ERROR nova service.wait()
  2016-10-11 22:28:27.327 66082 ERROR nova   File 
"/usr/lib/python2.7/site-packages/nova/service.py", line 415, in wait
  2016-10-11 22:28:27.327 66082 ERROR nova _launcher.wait()
  2016-10-11 22:28:27.327 66082 ERROR nova   File 
"/usr/lib/python2.7/site-packages/oslo_service/service.py", line 328, in wait
  2016-10-11 22:28:27.327 66082 ERROR nova status, signo = 
self._wait_for_exit_or_signal()
  2016-10-11 22:28:27.327 66082 ERROR nova   File 
"/usr/lib/python2.7/site-packages/oslo_service/service.py", line 303, in 
_wait_for_exit_or_signal
  2016-10-11 22:28:27.327 66082 ERROR nova self.conf.log_opt_values(LOG, 
logging.DEBUG)
  2016-10-11 22:28:27.327 66082 ERROR nova   File 
"/usr/lib/python2.7/site-packages/oslo_config/cfg.py", line 2630, in 
log_opt_values
  2016-10-11 22:28:27.327 66082 ERROR nova _sanitize(opt, 
getattr(group_attr, opt_name)))
  2016-10-11 22:28:27.327 66082 ERROR nova   File 
"/usr/lib/python2.7/site-packages/oslo_config/cfg.py", line 3061, in __getattr__
  2016-10-11 22:28:27.327 66082 ERROR nova return self._conf._get(name, 
self._group)
  2016-10-11 22:28:27.327 66082 ERROR nova   File 
"/usr/lib/python2.7/site-packages/oslo_config/cfg.py", line 2672, in _get
  2016-10-11 22:28:27.327 66082 ERROR nova value = self._do_get(name, 
group, namespace)
  2016-10-11 22:28:27.327 66082 ERROR nova   File 
"/usr/lib/python2.7/site-packages/oslo_config/cfg.py", line 2715, in _do_get
  2016-10-11 22:28:27.327 66082 ERROR nova % (opt.name, str(ve)))
  2016-10-11 22:28:27.327 66082 ERROR nova ConfigFileValueError: Value for 
option url is not valid: invalid URI: 
'https://rdo-ci-fx2-06-s5.v103.rdoci.lab.eng.rdu.redhat.com:13696'
  2016-10-11 22:28:27.327 66082 ERROR nova 

  I believe the failure happens inside the [neutron] section of
  /etc/nova/nova.conf.

  This does not look related to the scheme (https) being used as the
  result of enabling SSL because doing a one-off test with the
  openstack-nova-conductor service after changing the schema to http
  results in the same startup failure.

  Another one-off test substituting an IP address instead of a FQDN
  inside of nova.conf with the openstack-nova-conductor service as
  before results in openstack-nova-conductor starting properly but
  eventually failing with a connection-related failure due to the one-
  off data used (an IP address of 1.2.3.4).

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1632538/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1593436] Re: Fix designate dns driver for SSL based endpoints

2017-01-26 Thread Alexandra Settle
This was a dev ref addition. CLosing.

** Changed in: openstack-manuals
   Status: Confirmed => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1593436

Title:
  Fix designate dns driver for SSL based endpoints

Status in neutron:
  Invalid
Status in openstack-manuals:
  Invalid

Bug description:
  https://review.openstack.org/326958
  Dear bug triager. This bug was created since a commit was marked with 
DOCIMPACT.
  Your project "openstack/neutron" is set up so that we directly report the 
documentation bugs against it. If this needs changing, the docimpact-group 
option needs to be added for the project. You can ask the OpenStack infra team 
(#openstack-infra on freenode) for help if you need to.

  commit 9cd95366a035b29001ce75515d291cf72d07d0c3
  Author: imran malik 
  Date:   Wed Jun 8 02:45:32 2016 -0700

  Fix designate dns driver for SSL based endpoints
  
  Allow setting options in designate section to specify if want
  to skip SSL cert check. This makes it possible to work with HTTPS
  based endpoints, the default behavior of keystoneclient is to always
  set verify=True however in current code, one cannot either provide
  a valid CA cert or skip the verification.
  
  DocImpact: Introduce two additional options for `[designate]` section
  in neutron.conf
  CONF.designate.insecure to allow insecure connections over SSL.
  CONF.designate.ca_cert for a valid cert when connecting over SSL
  
  Change-Id: Ic371cc11d783618c38ee40a18206b0c2a197bb3e
  Closes-Bug: #1588067

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1593436/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1567009] Re: Remove flavor seeding from the base migration

2017-01-26 Thread Alexandra Settle
** Tags removed: doc nova
** Tags added: install-guide ops-guide

** Also affects: horizon
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1567009

Title:
  Remove flavor seeding from the base migration

Status in OpenStack Dashboard (Horizon):
  New
Status in OpenStack Compute (nova):
  Invalid
Status in openstack-manuals:
  In Progress

Bug description:
  https://review.openstack.org/300127
  Dear bug triager. This bug was created since a commit was marked with 
DOCIMPACT.
  Your project "openstack/nova" is set up so that we directly report the 
documentation bugs against it. If this needs changing, the docimpact-group 
option needs to be added for the project. You can ask the OpenStack infra team 
(#openstack-infra on freenode) for help if you need to.

  commit 1a1a41bdbe0dc16ca594236925e77ce99f432b9d
  Author: Dan Smith 
  Date:   Thu Mar 31 10:57:14 2016 -0700

  Remove flavor seeding from the base migration
  
  In a time long ago and a land far far away, someone thought it was a
  good idea to populate the database with default flavors. That was
  probably reasonable at the time, but it no longer makes sense and
  in fact causes us some pain now.
  
  This patch removes those default flavors from the database. That means
  that new deploys will not have them, but doesn't actually rewrite
  history in any way.
  
  This will require changes to our docs, which largely assume the presence
  of these default flavors from time zero.
  
  DocImpact
  
  Depends-On: Ic275887e97221d9ce5ce6f12cdcfb5ac94e300b0
  Change-Id: I80b63ce1ebca01be61ac0f43d26a2992ecf16678

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1567009/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1632538] Re: Using generate_service_certificate and undercloud_public_vip in undercloud.conf breaks nova

2017-01-26 Thread Launchpad Bug Tracker
This bug was fixed in the package python-rfc3986 -
0.2.2-0ubuntu0.16.04.1

---
python-rfc3986 (0.2.2-0ubuntu0.16.04.1) xenial; urgency=medium

  * New upstream point release, resolving issue which causes valid
URLS to be rejected (LP: #1632538).

 -- James Page   Thu, 20 Oct 2016 09:55:32 +0100

** Changed in: python-rfc3986 (Ubuntu Xenial)
   Status: Fix Committed => Fix Released

** Changed in: python-rfc3986 (Ubuntu Xenial)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1632538

Title:
  Using generate_service_certificate and undercloud_public_vip in
  undercloud.conf breaks nova

Status in OpenStack Compute (nova):
  Incomplete
Status in OpenStack Compute (nova) newton series:
  Incomplete
Status in tripleo:
  Invalid
Status in python-rfc3986 package in Ubuntu:
  Fix Released
Status in python-rfc3986 source package in Xenial:
  Fix Released
Status in python-rfc3986 source package in Yakkety:
  Fix Committed
Status in python-rfc3986 source package in Zesty:
  Fix Released

Bug description:
  Enabling SSL on the Undercloud using generate_service_certificate
  results in all Nova services on the undercloud (api, cert, compute,
  conductor, scheduler), all failing with errors similar to the
  following:

  2016-10-11 22:28:27.327 66082 CRITICAL nova 
[req-b5f37af3-96fc-42e2-aaa6-52815aca07fe - - - - -] ConfigFileValueError: 
Value for option url is not valid: invalid URI: 
'https://rdo-ci-fx2-06-s5.v103.rdoci.lab.eng.rdu.redhat.com:13696'
  2016-10-11 22:28:27.327 66082 ERROR nova Traceback (most recent call last):
  2016-10-11 22:28:27.327 66082 ERROR nova   File "/usr/bin/nova-cert", line 
10, in 
  2016-10-11 22:28:27.327 66082 ERROR nova sys.exit(main())
  2016-10-11 22:28:27.327 66082 ERROR nova   File 
"/usr/lib/python2.7/site-packages/nova/cmd/cert.py", line 49, in main
  2016-10-11 22:28:27.327 66082 ERROR nova service.wait()
  2016-10-11 22:28:27.327 66082 ERROR nova   File 
"/usr/lib/python2.7/site-packages/nova/service.py", line 415, in wait
  2016-10-11 22:28:27.327 66082 ERROR nova _launcher.wait()
  2016-10-11 22:28:27.327 66082 ERROR nova   File 
"/usr/lib/python2.7/site-packages/oslo_service/service.py", line 328, in wait
  2016-10-11 22:28:27.327 66082 ERROR nova status, signo = 
self._wait_for_exit_or_signal()
  2016-10-11 22:28:27.327 66082 ERROR nova   File 
"/usr/lib/python2.7/site-packages/oslo_service/service.py", line 303, in 
_wait_for_exit_or_signal
  2016-10-11 22:28:27.327 66082 ERROR nova self.conf.log_opt_values(LOG, 
logging.DEBUG)
  2016-10-11 22:28:27.327 66082 ERROR nova   File 
"/usr/lib/python2.7/site-packages/oslo_config/cfg.py", line 2630, in 
log_opt_values
  2016-10-11 22:28:27.327 66082 ERROR nova _sanitize(opt, 
getattr(group_attr, opt_name)))
  2016-10-11 22:28:27.327 66082 ERROR nova   File 
"/usr/lib/python2.7/site-packages/oslo_config/cfg.py", line 3061, in __getattr__
  2016-10-11 22:28:27.327 66082 ERROR nova return self._conf._get(name, 
self._group)
  2016-10-11 22:28:27.327 66082 ERROR nova   File 
"/usr/lib/python2.7/site-packages/oslo_config/cfg.py", line 2672, in _get
  2016-10-11 22:28:27.327 66082 ERROR nova value = self._do_get(name, 
group, namespace)
  2016-10-11 22:28:27.327 66082 ERROR nova   File 
"/usr/lib/python2.7/site-packages/oslo_config/cfg.py", line 2715, in _do_get
  2016-10-11 22:28:27.327 66082 ERROR nova % (opt.name, str(ve)))
  2016-10-11 22:28:27.327 66082 ERROR nova ConfigFileValueError: Value for 
option url is not valid: invalid URI: 
'https://rdo-ci-fx2-06-s5.v103.rdoci.lab.eng.rdu.redhat.com:13696'
  2016-10-11 22:28:27.327 66082 ERROR nova 

  I believe the failure happens inside the [neutron] section of
  /etc/nova/nova.conf.

  This does not look related to the scheme (https) being used as the
  result of enabling SSL because doing a one-off test with the
  openstack-nova-conductor service after changing the schema to http
  results in the same startup failure.

  Another one-off test substituting an IP address instead of a FQDN
  inside of nova.conf with the openstack-nova-conductor service as
  before results in openstack-nova-conductor starting properly but
  eventually failing with a connection-related failure due to the one-
  off data used (an IP address of 1.2.3.4).

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1632538/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1498529] Re: VPNaaS: VPN connection shown "pending create" status after it created successfully

2017-01-26 Thread Miguel Angel Ajo
This seems horizon, please explain any reasoning to bump it back to
neutron. Cheers.

** Project changed: neutron => horizon

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1498529

Title:
  VPNaaS: VPN connection shown "pending create" status after it created
  successfully

Status in OpenStack Dashboard (Horizon):
  Expired

Bug description:
  It's a display issue.
  After create VPN connection on openstack dashboard, the vpn connection is 
shown as "pending create". No matter create done or not.

  walk around: manually refresh openstack dashboard webpage.

  Juno version

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1498529/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1641383] Re: Uploading OVA to Glance via Horizon Fails

2017-01-26 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/407847
Committed: 
https://git.openstack.org/cgit/openstack/horizon/commit/?id=3f1e0fad92ec6031e17b556609ca940c8a20a165
Submitter: Jenkins
Branch:master

commit 3f1e0fad92ec6031e17b556609ca940c8a20a165
Author: Jay Jahns 
Date:   Tue Dec 6 20:41:04 2016 -0800

Allow OVA upload for images

The OpenStack CLI allows the upload of OVA for images if the container 
format is
set to ova.  This patch allows a user to upload a OVA to Glance through the 
UI,
changing the container_format to ova and the disk_format to vmdk.

Change-Id: I1483b28ae4a1918a03798c4ef1bb94540fdb3386
Closes-Bug: #1641383


** Changed in: horizon
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1641383

Title:
  Uploading OVA to Glance via Horizon Fails

Status in OpenStack Dashboard (Horizon):
  Fix Released

Bug description:
  If a user wishes to upload an image to Glance that is an OVA file, the
  import fails because the disk_format gets marked as "bare" and the
  container_format is not taken into account.

  I've checked the dashboard for images and found this problem can be
  very easily fixed by checking if the user specified ova in the form
  and updating these 2 settings.

  dashboards/project/images/images/forms.py after line 63
  elif disk_format == 'ova':
  # The ova format requires glance to set the disk format to vmdk and
  # the container format to ova in order for glance to accept the image
  # and to allow successful launch of the image.  OVA does not support
  # a container format of bare.
  container_format = 'ova'
  disk_format = 'vmdk'

  Upon adding this change, OVAs can be added via the UI without error,
  and Glance can launch the OVA as expected.  This only impacts single-
  disk OVA.

  Can someone verify this for me so we know on our side this is the
  correct action?  I'm not totally familiar with contributing to the
  project, so I'm working on that internally as well.

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1641383/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1629446] Re: federated login fails after user is removed from group

2017-01-26 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/421616
Committed: 
https://git.openstack.org/cgit/openstack/keystone/commit/?id=9e1e2c2156f365078085db54dfbbfff50e2c2b84
Submitter: Jenkins
Branch:master

commit 9e1e2c2156f365078085db54dfbbfff50e2c2b84
Author: Eric Brown 
Date:   Tue Jan 17 17:42:52 2017 -0800

Catch potential SyntaxError in federation mapping

When using the 'groups' keyword in a federation mapping, the value
passed in the assertion map be a simple string with a space. For
example, "ALL USERS". This results in ast.literal_eval() raising
a SyntaxError and not ValueError, which bubbles up to the API as
an uncaught 500 Internal Server Error.

Change-Id: I61f93a6c54b62ba8719d2603f93dc18c33b581ce
Closes-Bug: #1629446


** Changed in: keystone
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1629446

Title:
  federated login fails after user is removed from group

Status in OpenStack Identity (keystone):
  Fix Released
Status in OpenStack Identity (keystone) mitaka series:
  New
Status in OpenStack Identity (keystone) newton series:
  New

Bug description:
  A user part of a group in auth0 tries to login in using the mapping
  below just fine

  [
  {
  "local": [
  {
  "user": {
  "name": "{1}::{0}"
  }
  },
  {
  "domain": {
  "id": "default"
  },
  "groups": "{1}"
  }
  ],
  "remote": [
  {
  "type": "HTTP_OIDC_CLAIM_EMAIL"
  },
  {
  "type": "HTTP_OIDC_CLAIM_GROUPS"
  }
  ]
  }
  ]

  
  Once the user is removed from the group in auth0 and tries to login :

  Expected Result:
  Failed to log on to horizon as federation user using OpenID Connect protocol 
and got 401 code:

  {"error": {"message": "The request you have made requires
  authentication.", "code": 401, "title": "Unauthorized"}}

  Actual Result:
  Got 500 instead of 401

  {"error": {"message": "An unexpected error prevented the server from
  fulfilling your request.", "code": 500, "title": "Internal Server
  Error"}}

  error in keystone-all.logs:

  2016-09-30 19:32:25.549 23311 ERROR keystone.common.wsgi 
[req-f5f27f59-788b-494b-9719-bcdbb6b628c0 - - - - -] unexpected EOF while 
parsing (, line 0)
  2016-09-30 19:32:25.549 23311 ERROR keystone.common.wsgi Traceback (most 
recent call last):
  2016-09-30 19:32:25.549 23311 ERROR keystone.common.wsgi   File 
"/opt/openstack/current/keystone/local/lib/python2.7/site-packages/keystone/common/wsgi.py",
 line 249, in __call__
  2016-09-30 19:32:25.549 23311 ERROR keystone.common.wsgi result = 
method(context, **params)
  2016-09-30 19:32:25.549 23311 ERROR keystone.common.wsgi   File 
"/opt/openstack/current/keystone/local/lib/python2.7/site-packages/keystone/federation/controllers.py",
 line 329, in federated_idp_specific_sso_auth
  2016-09-30 19:32:25.549 23311 ERROR keystone.common.wsgi res = 
self.federated_authentication(context, idp_id, protocol_id)
  2016-09-30 19:32:25.549 23311 ERROR keystone.common.wsgi   File 
"/opt/openstack/current/keystone/local/lib/python2.7/site-packages/keystone/federation/controllers.py",
 line 302, in federated_authentication
  2016-09-30 19:32:25.549 23311 ERROR keystone.common.wsgi return 
self.authenticate_for_token(context, auth=auth)
  2016-09-30 19:32:25.549 23311 ERROR keystone.common.wsgi   File 
"/opt/openstack/current/keystone/local/lib/python2.7/site-packages/keystone/auth/controllers.py",
 line 396, in authenticate_for_token
  2016-09-30 19:32:25.549 23311 ERROR keystone.common.wsgi 
self.authenticate(context, auth_info, auth_context)
  2016-09-30 19:32:25.549 23311 ERROR keystone.common.wsgi   File 
"/opt/openstack/current/keystone/local/lib/python2.7/site-packages/keystone/auth/controllers.py",
 line 520, in authenticate
  2016-09-30 19:32:25.549 23311 ERROR keystone.common.wsgi auth_context)
  2016-09-30 19:32:25.549 23311 ERROR keystone.common.wsgi   File 
"/opt/openstack/current/keystone/local/lib/python2.7/site-packages/keystone/auth/plugins/mapped.py",
 line 65, in authenticate
  2016-09-30 19:32:25.549 23311 ERROR keystone.common.wsgi 
self.identity_api)
  2016-09-30 19:32:25.549 23311 ERROR keystone.common.wsgi   File 
"/opt/openstack/current/keystone/local/lib/python2.7/site-packages/keystone/auth/plugins/mapped.py",
 line 141, in handle_unscoped_token
  2016-09-30 19:32:25.549 23311 ERROR keystone.common.wsgi federation_api, 
identity_api)
  2016-09-30 19:32:25.549 23311 ERROR keystone.common.wsgi   File 
"/opt/openstack/current/keystone/local/lib/python2.7/site-packages/keystone/auth/plugins/mapped.py",
 line 

[Yahoo-eng-team] [Bug 1658078] Re: AttributeError: 'NoneType' object has no attribute 'support_requests'

2017-01-26 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/423608
Committed: 
https://git.openstack.org/cgit/openstack/nova/commit/?id=8d11cba5edcb71b530ea9af3afa697870bcfac3a
Submitter: Jenkins
Branch:master

commit 8d11cba5edcb71b530ea9af3afa697870bcfac3a
Author: Moshe Levi 
Date:   Sat Jan 21 11:27:36 2017 +0200

PCI: Check pci_requests object is empty before passing to support_requests

This commit checks that InstancePCIRequests is empty before
passing it to the pci_stats.support_requests.
This prevents doing the support request check for host_state
which don't have pci_stats like ironic host.

Closes-Bug: #1658078

Change-Id: Ie6d870729883e2bbdc3278c52e88d147613712f6


** Changed in: nova
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1658078

Title:
  AttributeError: 'NoneType' object has no attribute 'support_requests'

Status in OpenStack Compute (nova):
  Fix Released

Bug description:
  When the compute is ironic driver  and the shceduler is configured with 
  pci passthrough filter the vm get to an error state and we can see the 
following error in the scheduler

  2017-01-19 06:00:35.887 105364 ERROR oslo_messaging.rpc.server 
[req-d627c45c-a5cf-47bc-a8d1-fe4669516380 admin admin] Exception during message 
handling
  2017-01-19 06:00:35.887 105364 ERROR oslo_messaging.rpc.server Traceback 
(most recent call last):
  2017-01-19 06:00:35.887 105364 ERROR oslo_messaging.rpc.server   File 
"/usr/local/lib/python2.7/dist-packages/oslo_messaging/rpc/server.py", line 
155, in _process_incoming
  2017-01-19 06:00:35.887 105364 ERROR oslo_messaging.rpc.server res = 
self.dispatcher.dispatch(message)
  2017-01-19 06:00:35.887 105364 ERROR oslo_messaging.rpc.server   File 
"/usr/local/lib/python2.7/dist-packages/oslo_messaging/rpc/dispatcher.py", line 
222, in dispatch
  2017-01-19 06:00:35.887 105364 ERROR oslo_messaging.rpc.server return 
self._do_dispatch(endpoint, method, ctxt, args)
  2017-01-19 06:00:35.887 105364 ERROR oslo_messaging.rpc.server   File 
"/usr/local/lib/python2.7/dist-packages/oslo_messaging/rpc/dispatcher.py", line 
192, in _do_dispatch
  2017-01-19 06:00:35.887 105364 ERROR oslo_messaging.rpc.server result = 
func(ctxt, **new_args)
  2017-01-19 06:00:35.887 105364 ERROR oslo_messaging.rpc.server   File 
"/usr/local/lib/python2.7/dist-packages/oslo_messaging/rpc/server.py", line 
218, in inner
  2017-01-19 06:00:35.887 105364 ERROR oslo_messaging.rpc.server return 
func(*args, **kwargs)
  2017-01-19 06:00:35.887 105364 ERROR oslo_messaging.rpc.server   File 
"/opt/stack/nova/nova/scheduler/manager.py", line 84, in select_destinations
  2017-01-19 06:00:35.887 105364 ERROR oslo_messaging.rpc.server dests = 
self.driver.select_destinations(ctxt, spec_obj)
  2017-01-19 06:00:35.887 105364 ERROR oslo_messaging.rpc.server   File 
"/opt/stack/nova/nova/scheduler/filter_scheduler.py", line 51, in 
select_destinations
  2017-01-19 06:00:35.887 105364 ERROR oslo_messaging.rpc.server 
selected_hosts = self._schedule(context, spec_obj)
  2017-01-19 06:00:35.887 105364 ERROR oslo_messaging.rpc.server   File 
"/opt/stack/nova/nova/scheduler/filter_scheduler.py", line 103, in _schedule
  2017-01-19 06:00:35.887 105364 ERROR oslo_messaging.rpc.server spec_obj, 
index=num)
  2017-01-19 06:00:35.887 105364 ERROR oslo_messaging.rpc.server   File 
"/opt/stack/nova/nova/scheduler/host_manager.py", line 572, in 
get_filtered_hosts
  2017-01-19 06:00:35.887 105364 ERROR oslo_messaging.rpc.server hosts, 
spec_obj, index)
  2017-01-19 06:00:35.887 105364 ERROR oslo_messaging.rpc.server   File 
"/opt/stack/nova/nova/filters.py", line 89, in get_filtered_objects
  2017-01-19 06:00:35.887 105364 ERROR oslo_messaging.rpc.server list_objs 
= list(objs)
  2017-01-19 06:00:35.887 105364 ERROR oslo_messaging.rpc.server   File 
"/opt/stack/nova/nova/filters.py", line 44, in filter_all
  2017-01-19 06:00:35.887 105364 ERROR oslo_messaging.rpc.server if 
self._filter_one(obj, spec_obj):
  2017-01-19 06:00:35.887 105364 ERROR oslo_messaging.rpc.server   File 
"/opt/stack/nova/nova/scheduler/filters/__init__.py", line 26, in _filter_one
  2017-01-19 06:00:35.887 105364 ERROR oslo_messaging.rpc.server return 
self.host_passes(obj, filter_properties)
  2017-01-19 06:00:35.887 105364 ERROR oslo_messaging.rpc.server   File 
"/opt/stack/nova/nova/scheduler/filters/pci_passthrough_filter.py", line 48, in 
host_passes
  2017-01-19 06:00:35.887 105364 ERROR oslo_messaging.rpc.server if not 
host_state.pci_stats.support_requests(pci_requests.requests):
  2017-01-19 06:00:35.887 105364 ERROR oslo_messaging.rpc.server 
AttributeError: 'NoneType' object has no attribute 'support_requests'

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1658078/+subscriptio

[Yahoo-eng-team] [Bug 1659146] Re: Broken neutron dsvm functional gate

2017-01-26 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/424906
Committed: 
https://git.openstack.org/cgit/openstack/neutron/commit/?id=f8a224a63fbb350454cbc31dd20fea0111eb814f
Submitter: Jenkins
Branch:master

commit f8a224a63fbb350454cbc31dd20fea0111eb814f
Author: Dirk Mueller 
Date:   Wed Jan 25 00:54:26 2017 +0100

Adjust psutil usage for psutil > 2

psutil 2.x and above has a lot of API changes as described in:

https://github.com/giampaolo/psutil/blob/master/HISTORY.rst

Change-Id: I1380f488390c83a44d91b84218f1b1ba826d03a0
Closes-Bug: 1659146


** Changed in: neutron
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1659146

Title:
  Broken neutron dsvm functional gate

Status in neutron:
  Fix Released

Bug description:
  Neutron dsvm functional gate is broken. There are functional test failures:
  1. 
neutron.tests.functional.test_server.TestRPCServer.test_restart_rpc_on_sighup_multiple_workers
 Trace: http://paste.openstack.org/show/596323/
  2. 
neutron.tests.functional.test_server.TestWsgiServer.test_restart_wsgi_on_sighup_multiple_workers
 Trace: http://paste.openstack.org/show/596324/

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1659146/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1659499] [NEW] API Access View Credentials form is semantically incorrect

2017-01-26 Thread Rob Cresswell
Public bug reported:

There are some simple improvements we can make to UX/a11y on the View
Credentials form on the API Access panel, like correctly labelling
inputs.

** Affects: horizon
 Importance: Low
 Assignee: Rob Cresswell (robcresswell)
 Status: New

** Changed in: horizon
Milestone: None => ocata-rc1

** Changed in: horizon
 Assignee: (unassigned) => Rob Cresswell (robcresswell)

** Changed in: horizon
   Importance: Undecided => Wishlist

** Changed in: horizon
   Importance: Wishlist => Low

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1659499

Title:
  API Access View Credentials form is semantically incorrect

Status in OpenStack Dashboard (Horizon):
  New

Bug description:
  There are some simple improvements we can make to UX/a11y on the View
  Credentials form on the API Access panel, like correctly labelling
  inputs.

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1659499/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1642687] Re: Missing domain for federated users

2017-01-26 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/423708
Committed: 
https://git.openstack.org/cgit/openstack/keystone/commit/?id=c19f2431524be224b4c027b2a56398d7c3e5e18b
Submitter: Jenkins
Branch:master

commit c19f2431524be224b4c027b2a56398d7c3e5e18b
Author: Ronald De Rose 
Date:   Sat Jan 21 21:10:56 2017 +

Set the domain for federated users

This patch updates the domain for federated users to be the domain of
the Identity Provider (IdP).

Closes-Bug: #1642687
Partially-Implements: bp support-federated-attr
Depends-On: If8c8ad39c4c55a2d800bf4432411db59799e84e6
Change-Id: Iccfad6f39dc339ca054bedf3c6882c3701dcf0ec


** Changed in: keystone
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1642687

Title:
  Missing domain for federated users

Status in OpenStack Identity (keystone):
  Fix Released

Bug description:
  When creating federated users, as part of shadowing users, the user's
  domain_id is not set. An Identity Provider (IdP) should be mapped to a
  domain and users from that IdP should be created within that domain.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1642687/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp