[Yahoo-eng-team] [Bug 1253497] Re: Replace uuidutils.generate_uuid() with str(uuid.uuid4())

2017-07-10 Thread Spencer Yu
** Also affects: karbor
   Importance: Undecided
   Status: New

** Changed in: karbor
 Assignee: (unassigned) => Spencer Yu (yushb)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1253497

Title:
  Replace uuidutils.generate_uuid() with str(uuid.uuid4())

Status in Barbican:
  Fix Released
Status in BillingStack:
  Invalid
Status in Blazar:
  Fix Committed
Status in Cinder:
  Invalid
Status in Designate:
  Fix Released
Status in Glance:
  Fix Released
Status in heat:
  Fix Released
Status in OpenStack Dashboard (Horizon):
  Invalid
Status in Ironic:
  Fix Released
Status in Karbor:
  New
Status in Manila:
  Fix Released
Status in Murano:
  Fix Released
Status in neutron:
  Invalid
Status in OpenStack Compute (nova):
  Invalid
Status in oslo-incubator:
  Fix Released
Status in Sahara:
  Fix Released
Status in staccato:
  Invalid
Status in taskflow:
  Invalid
Status in OpenStack DBaaS (Trove):
  Fix Released
Status in tuskar:
  Fix Released

Bug description:
  http://lists.openstack.org/pipermail/openstack-
  dev/2013-November/018980.html

  
  > Hi all,
  >
  > We had a discussion of the modules that are incubated in Oslo.
  >
  > https://etherpad.openstack.org/p/icehouse-oslo-status
  >
  > One of the conclusions we came to was to deprecate/remove uuidutils in
  > this cycle.
  >
  > The first step into this change should be to remove generate_uuid() from
  > uuidutils.
  >
  > The reason is that 1) generating the UUID string seems trivial enough to
  > not need a function and 2) string representation of uuid4 is not what we
  > want in all projects.
  >
  > To address this, a patch is now on gerrit.
  > https://review.openstack.org/#/c/56152/
  >
  > Each project should directly use the standard uuid module or implement its
  > own helper function to generate uuids if this patch gets in.
  >
  > Any thoughts on this change? Thanks.
  >

  Unfortunately it looks like that change went through before I caught up on
  email. Shouldn't we have removed its use in the downstream projects (at
  least integrated projects) before removing it from Oslo?

  Doug

To manage notifications about this bug go to:
https://bugs.launchpad.net/barbican/+bug/1253497/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1703511] [NEW] Attach/detach volume should not showed in instance actions when cinder disabled

2017-07-10 Thread Min Sun
Public bug reported:

At Instances index view, Attach volume/ Detach volume are showed on drop
list of an instance even cinder not enabled.

** Affects: horizon
 Importance: Undecided
 Assignee: Min Sun (minsu)
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1703511

Title:
  Attach/detach volume should not showed in instance actions when cinder
  disabled

Status in OpenStack Dashboard (Horizon):
  New

Bug description:
  At Instances index view, Attach volume/ Detach volume are showed on
  drop list of an instance even cinder not enabled.

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1703511/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1703510] [NEW] ML2-Linuxbridge not keep routes on physical interface

2017-07-10 Thread Aihua Edward Li
Public bug reported:

When using ML2-Linuxbridge flat network, the bridge is dynamically created when 
the first VM using the flat network is provisioned. The bridge is dynamically 
deleted when the last VM using the flat network is deleted.
During the switch over, all configuration on the physical interface is moved 
from the physical device to the bridge device.
In today's ML2-Linux bridge implementation, only the ip address and the gateway 
are retained. There is no consideration to move the routes associated with the 
physical interface and they are lost.
In the case when openstack components communicate with openstack controller, 
the connectivity would be lost after the first VM is provisioned.

To reproduce the issue, add arbitrary route on the underflying physical 
interface, e.g., eth0, 
1. "route add -net 10.75.0.0/16 gw 20.20.20.1" prior to start ML2-Linux-bridge 
agent. 
2. Start ML2-Linuxbridge agent, and provision a new VM to use flat network.
3. do a route show "ip route list" and observe the 10.75.0.0 routes disapppears.

This happens from kilo code to master branch.

The relevant code on master branch is

neutron/plugins/ml2/drivers/linuxbridge/agent/linuxbridge_neutron_agent.py

def update_interface_ip_details(self, destination, source):
# Returns True if there were IPs or a gateway moved
updated = False
for ip_version in (constants.IP_VERSION_4, constants.IP_VERSION_6):
ips, gateway = self.get_interface_details(source, ip_version)
if ips or gateway:
self._update_interface_ip_details(destination, source, ips,
  gateway)
updated = True

return updated

only ips and gateway are considered, routes associated with the
interafce is not considered at all.

** Affects: neutron
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1703510

Title:
  ML2-Linuxbridge not keep routes on physical interface

Status in neutron:
  New

Bug description:
  When using ML2-Linuxbridge flat network, the bridge is dynamically created 
when the first VM using the flat network is provisioned. The bridge is 
dynamically deleted when the last VM using the flat network is deleted.
  During the switch over, all configuration on the physical interface is moved 
from the physical device to the bridge device.
  In today's ML2-Linux bridge implementation, only the ip address and the 
gateway are retained. There is no consideration to move the routes associated 
with the physical interface and they are lost.
  In the case when openstack components communicate with openstack controller, 
the connectivity would be lost after the first VM is provisioned.

  To reproduce the issue, add arbitrary route on the underflying physical 
interface, e.g., eth0, 
  1. "route add -net 10.75.0.0/16 gw 20.20.20.1" prior to start 
ML2-Linux-bridge agent. 
  2. Start ML2-Linuxbridge agent, and provision a new VM to use flat network.
  3. do a route show "ip route list" and observe the 10.75.0.0 routes 
disapppears.

  This happens from kilo code to master branch.

  The relevant code on master branch is

  neutron/plugins/ml2/drivers/linuxbridge/agent/linuxbridge_neutron_agent.py

  def update_interface_ip_details(self, destination, source):
  # Returns True if there were IPs or a gateway moved
  updated = False
  for ip_version in (constants.IP_VERSION_4, constants.IP_VERSION_6):
  ips, gateway = self.get_interface_details(source, ip_version)
  if ips or gateway:
  self._update_interface_ip_details(destination, source, ips,
gateway)
  updated = True

  return updated

  only ips and gateway are considered, routes associated with the
  interafce is not considered at all.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1703510/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1700454] Re: "Quota exceeded for instances" in fwaas tempest tests

2017-07-10 Thread YAMAMOTO Takashi
i haven't seen it recently. i guess it has been fixed in the meantime.

** Changed in: neutron
   Status: New => Invalid

** Changed in: networking-midonet
   Status: In Progress => Invalid

** Changed in: networking-midonet
   Importance: Critical => Undecided

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1700454

Title:
  "Quota exceeded for instances" in fwaas tempest tests

Status in networking-midonet:
  Invalid
Status in neutron:
  Invalid

Bug description:
  eg. http://logs.openstack.org/87/199387/83/check/gate-tempest-dsvm-
  networking-midonet-ml2-full-
  centos-7-nv/b221d8d/logs/testr_results.html.gz

  Traceback (most recent call last):
File 
"/opt/stack/new/neutron-fwaas/neutron_fwaas/tests/tempest_plugin/tests/scenario/test_fwaas.py",
 line 366, in test_firewall_disable_rule
  allow=self._disable_rule)
File 
"/opt/stack/new/neutron-fwaas/neutron_fwaas/tests/tempest_plugin/tests/scenario/test_fwaas.py",
 line 305, in _test_firewall_basic
  self._create_topology()
File 
"/opt/stack/new/neutron-fwaas/neutron_fwaas/tests/tempest_plugin/tests/scenario/test_fwaas.py",
 line 267, in _create_topology
  security_group=security_group)
File 
"/opt/stack/new/neutron-fwaas/neutron_fwaas/tests/tempest_plugin/tests/scenario/test_fwaas.py",
 line 59, in _create_server
  **kwargs)
File 
"/opt/stack/new/neutron-fwaas/neutron_fwaas/tests/tempest_plugin/tests/scenario/manager.py",
 line 208, in create_server
  image_id=image_id, **kwargs)
File "tempest/common/compute.py", line 168, in create_test_server
  **kwargs)
File "tempest/lib/services/compute/servers_client.py", line 89, in 
create_server
  resp, body = self.post('servers', post_body)
File "tempest/lib/common/rest_client.py", line 270, in post
  return self.request('POST', url, extra_headers, headers, body, chunked)
File "tempest/lib/services/compute/base_compute_client.py", line 48, in 
request
  method, url, extra_headers, headers, body, chunked)
File "tempest/lib/common/rest_client.py", line 659, in request
  self._error_checker(resp, resp_body)
File "tempest/lib/common/rest_client.py", line 760, in _error_checker
  raise exceptions.Forbidden(resp_body, resp=resp)
  tempest.lib.exceptions.Forbidden: Forbidden
  Details: {u'message': u'Quota exceeded for instances: Requested 1, but 
already used 10 of 10 instances', u'code': 403}

To manage notifications about this bug go to:
https://bugs.launchpad.net/networking-midonet/+bug/1700454/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1670627] Re: quota is always in-use after delete the ERROR instances

2017-07-10 Thread Matt Riedemann
Should be fixed in Ocata 15.0.1.

** Changed in: nova/ocata
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1670627

Title:
  quota is always in-use after delete the ERROR instances

Status in OpenStack Compute (nova):
  Fix Released
Status in OpenStack Compute (nova) ocata series:
  Fix Released

Bug description:
  1. stop nova-compute 
  2. boot an instance 
  3. the instance is in ERROR
  4. delete the instance
  5. repeat 1-4 for several times(actually, I create the instance by heat, heat 
will retry to create the instance 5 times by default and will delete the error 
instance before every retrying)
  6. I can't boot instance after nova-compute back, the reason is "Quota 
exceeded for instances: Requested 1, but already used 10 of 10 instances"
  7. but in fact, there is no instance return by cmd nova-list
  8. I find that the quota is still in-use, see table 'quota_usages':

  mysql> select *from quota_usages;
  
+-+-+++--+---++--+---+-+--+
  | created_at  | updated_at  | deleted_at | id | project_id
   | resource  | in_use | reserved | until_refresh | deleted | 
user_id  |
  
+-+-+++--+---++--+---+-+--+
  | 2017-03-07 06:26:08 | 2017-03-07 08:48:09 | NULL   |  1 | 
2b623ba1dddc476cbb7728a944d539c5 | instances | 10 |0 |  
NULL |   0 | 8d57d7a267b54992b382a6607ecd700a |
  | 2017-03-07 06:26:08 | 2017-03-07 08:48:09 | NULL   |  2 | 
2b623ba1dddc476cbb7728a944d539c5 | ram   |   5120 |0 |  
NULL |   0 | 8d57d7a267b54992b382a6607ecd700a |
  | 2017-03-07 06:26:08 | 2017-03-07 08:48:09 | NULL   |  3 | 
2b623ba1dddc476cbb7728a944d539c5 | cores | 10 |0 |  
NULL |   0 | 8d57d7a267b54992b382a6607ecd700a |
  | 2017-03-07 09:17:37 | 2017-03-07 09:35:14 | NULL   |  4 | 
12bdc74d666d4f7687c0172a003f190d | instances | 13 |0 |  
NULL |   0 | 98887477e65e43f383f8a9ec732a3eae |
  | 2017-03-07 09:17:37 | 2017-03-07 09:35:14 | NULL   |  5 | 
12bdc74d666d4f7687c0172a003f190d | ram   |   6656 |0 |  
NULL |   0 | 98887477e65e43f383f8a9ec732a3eae |
  | 2017-03-07 09:17:37 | 2017-03-07 09:35:14 | NULL   |  6 | 
12bdc74d666d4f7687c0172a003f190d | cores | 13 |0 |  
NULL |   0 | 98887477e65e43f383f8a9ec732a3eae |
  
+-+-+++--+---++--+---+-+--+

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1670627/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1703488] [NEW] Database not delete PCI info after device is removed from host and nova.conf

2017-07-10 Thread Eddie Yen
Public bug reported:

Hi, this is my 1st time write this report at Launchpad.

===Description===
I'm using Mitaka installed by Fuel 9.2, and I meet a issue that the info didn't 
remove at pci_devices table in Nova Database after I removed one of the device 
from compute node and nova.conf


===How did I reproduce?===

1. Plug two different model PCI devices and add two PCI devices
information into nova.conf in target compute node and each control node
by following format:


2. Restart nova-api, nova-scheduler, and nova-compute.

Compute node only shows the last device I add.

But if I do some actions on instance with the flavor contained PCI
passthrough info, it will be normal.

And database info is correct.


3. Remove one of the PCI device info from nova.conf (included target compute 
and controllers), restart services, shutdown the compute node and unplug the 
device.

(Note: The card ID of what I remove is 1002:68c8)

Power on the compute code and check nova-compute log, the report is
correct.

===Expected result===
The info of removed device should be deleted or stayed at "DELETED" status in 
Nova DB.

===Actual result===
The info of removed device still exist and stayed at "AVAILABLE" status in Nova 
DB.


===Log and configs===
[1] Format of pci_alias and pci_passthrough_whitelist in nova.conf
http://paste.openstack.org/show/614973/

[2] Nova-compute log after added info and restart service
http://paste.openstack.org/show/z015rYGXaxYhVoafKdbx/

[3] Nova-compute log after doing few actions on instance contained with PCI
http://paste.openstack.org/show/614658/

[4] Pci_devices table info in Nova DB after add devices
http://paste.openstack.org/show/8JS0i6BMitjeBVRJTkRo/

[5] Nova-compute log after remove one of the device and restart service
http://paste.openstack.org/show/qUCOX09jyeMydoYHc8Oz/

[6] Pci_devices table info in Nova DB after remove one of the device
http://paste.openstack.org/show/SnJ8AzJYD6wCo7jslIc2/

** Affects: nova
 Importance: Undecided
 Status: New


** Tags: db pci

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1703488

Title:
  Database not delete PCI info after device is removed from host and
  nova.conf

Status in OpenStack Compute (nova):
  New

Bug description:
  Hi, this is my 1st time write this report at Launchpad.

  ===Description===
  I'm using Mitaka installed by Fuel 9.2, and I meet a issue that the info 
didn't remove at pci_devices table in Nova Database after I removed one of the 
device from compute node and nova.conf

  
  ===How did I reproduce?===

  1. Plug two different model PCI devices and add two PCI devices
  information into nova.conf in target compute node and each control
  node by following format:

  
  2. Restart nova-api, nova-scheduler, and nova-compute.

  Compute node only shows the last device I add.

  But if I do some actions on instance with the flavor contained PCI
  passthrough info, it will be normal.

  And database info is correct.

  
  3. Remove one of the PCI device info from nova.conf (included target compute 
and controllers), restart services, shutdown the compute node and unplug the 
device.

  (Note: The card ID of what I remove is 1002:68c8)

  Power on the compute code and check nova-compute log, the report is
  correct.

  ===Expected result===
  The info of removed device should be deleted or stayed at "DELETED" status in 
Nova DB.

  ===Actual result===
  The info of removed device still exist and stayed at "AVAILABLE" status in 
Nova DB.

  
  ===Log and configs===
  [1] Format of pci_alias and pci_passthrough_whitelist in nova.conf
  http://paste.openstack.org/show/614973/

  [2] Nova-compute log after added info and restart service
  http://paste.openstack.org/show/z015rYGXaxYhVoafKdbx/

  [3] Nova-compute log after doing few actions on instance contained with PCI
  http://paste.openstack.org/show/614658/

  [4] Pci_devices table info in Nova DB after add devices
  http://paste.openstack.org/show/8JS0i6BMitjeBVRJTkRo/

  [5] Nova-compute log after remove one of the device and restart service
  http://paste.openstack.org/show/qUCOX09jyeMydoYHc8Oz/

  [6] Pci_devices table info in Nova DB after remove one of the device
  http://paste.openstack.org/show/SnJ8AzJYD6wCo7jslIc2/

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1703488/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1703486] [NEW] instance catalogue residual after excute resize-revert

2017-07-10 Thread tangxing
Public bug reported:

images_type configuration is rbd,but the instance catalogue is not
shared.After exceute resize revert, the instance catalogue will
residual in destination node.This will affect live-migration later.When
the imagebacken is RBd, we think this is shared storage, but in actual
environment,the instance catalogue can be not in shared storage.

** Affects: nova
 Importance: Undecided
 Status: New

** Changed in: nova
Milestone: None => pike-1

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1703486

Title:
  instance catalogue residual after excute resize-revert

Status in OpenStack Compute (nova):
  New

Bug description:
  images_type configuration is rbd,but the instance catalogue is not
  shared.After exceute resize revert, the instance catalogue will
  residual in destination node.This will affect live-migration
  later.When the imagebacken is RBd, we think this is shared storage,
  but in actual environment,the instance catalogue can be not in shared
  storage.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1703486/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1486127] Re: No API reference of RBAC API

2017-07-10 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/479134
Committed: 
https://git.openstack.org/cgit/openstack/neutron-lib/commit/?id=ee0fc48f7c76a61ea02eb42b5f7f368d576601ea
Submitter: Jenkins
Branch:master

commit ee0fc48f7c76a61ea02eb42b5f7f368d576601ea
Author: Felipe Monteiro 
Date:   Fri Jun 30 05:14:20 2017 +0100

api-ref: RBAC policies api reference

This patch adds RBAC policies API reference for the RBAC
policies extension.

Change-Id: I036a8108071b4b1db32c96ebb1b48da453e268b1
Closes-Bug: #1486127


** Changed in: neutron
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1486127

Title:
  No API reference of RBAC API

Status in neutron:
  Fix Released

Bug description:
  https://review.openstack.org/205482
  commit 22c84927d133158c9de429ba1b9dbcd1d077d773
  Author: Ramanjaneya 
  Date:   Fri Jul 24 15:51:53 2015 +0530

  Support RBAC neutron-client changes.
  
  This patch adds the command line support for RBAC work.
  
  DocImpact
  APIImpact
  Partially-Implements: blueprint rbac-networks
  Co-Authored-By: dongfeng 
  
  Change-Id: I00c6b84b3f7d810f137ce05c0cd936dc194d9708

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1486127/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1703467] [NEW] assert_admin is checking default policy rule not admin_required

2017-07-10 Thread Matthew Edmonds
Public bug reported:

https://github.com/openstack/keystone/commit/40c118d6ba94b15d6f66da618e1d368a0f876340
broke all places calling assert_admin. Previously, assert_admin checked
the "admin_required" rule. With that change, assert_admin now checks the
"identity:admin_required" rule. That rule is not defined, so what
actually gets checked is the default rule. We must fix this before
shipping Pike to avoid breaking backward compatibility.

** Affects: keystone
 Importance: Undecided
 Assignee: Matthew Edmonds (edmondsw)
 Status: New

** Changed in: keystone
 Assignee: (unassigned) => Matthew Edmonds (edmondsw)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1703467

Title:
  assert_admin is checking default policy rule not admin_required

Status in OpenStack Identity (keystone):
  New

Bug description:
  
https://github.com/openstack/keystone/commit/40c118d6ba94b15d6f66da618e1d368a0f876340
  broke all places calling assert_admin. Previously, assert_admin
  checked the "admin_required" rule. With that change, assert_admin now
  checks the "identity:admin_required" rule. That rule is not defined,
  so what actually gets checked is the default rule. We must fix this
  before shipping Pike to avoid breaking backward compatibility.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1703467/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1698517] Re: DVR FIP namespace missing default route after upgrade

2017-07-10 Thread Kevin Benton
** Changed in: neutron
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1698517

Title:
  DVR FIP namespace missing default route after upgrade

Status in neutron:
  Fix Released

Bug description:
  After upgrading from a code without
  https://review.openstack.org/#/q/Ida165d1ecf5c07af31dac11d9daed33ccaaf5605,n,z
  to code with it, the FIP namespace default route gets removed but the
  rule based route does not get added so traffic destined to the
  addresses outside of the external network does not work.

  The grenade job likely missed this because the test nodes have
  addresses directly on the external network so the default route isn't
  used.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1698517/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1703457] Re: RFE: More intuitive usage of --min and --max arguments in openstack server create

2017-07-10 Thread Matt Riedemann
*** This bug is a duplicate of bug 1458122 ***
https://bugs.launchpad.net/bugs/1458122

This is a duplicate of bug 1458122.

** This bug has been marked a duplicate of bug 1458122
   nova shouldn't error if we can't schedule all of max_count instances at boot 
time

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1703457

Title:
  RFE: More intuitive usage of --min and --max arguments in openstack
  server create

Status in OpenStack Compute (nova):
  New

Bug description:
  Currently the --min argument passed to openstack server create is only
  used to check the Quota but once the Quota check passes, if the --max
  number of instances can't be scheduled all instances go into ERROR
  state. However, when --min and --max are passed, it would be great if
  nova schedules as many instances as possible upto --max and only fails
  when even the --min number of instances can't be scheduled.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1703457/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1703457] [NEW] RFE: More intuitive usage of --min and --max arguments in openstack server create

2017-07-10 Thread Sai Sindhur Malleni
*** This bug is a duplicate of bug 1458122 ***
https://bugs.launchpad.net/bugs/1458122

Public bug reported:

Currently the --min argument passed to openstack server create is only
used to check the Quota but once the Quota check passes, if the --max
number of instances can't be scheduled all instances go into ERROR
state. However, when --min and --max are passed, it would be great if
nova schedules as many instances as possible upto --max and only fails
when even the --min number of instances can't be scheduled.

** Affects: nova
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1703457

Title:
  RFE: More intuitive usage of --min and --max arguments in openstack
  server create

Status in OpenStack Compute (nova):
  New

Bug description:
  Currently the --min argument passed to openstack server create is only
  used to check the Quota but once the Quota check passes, if the --max
  number of instances can't be scheduled all instances go into ERROR
  state. However, when --min and --max are passed, it would be great if
  nova schedules as many instances as possible upto --max and only fails
  when even the --min number of instances can't be scheduled.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1703457/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1483853] Re: Cannot set the VXLAN UDP destination port to 4789 using Linux Bridge

2017-07-10 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/468911
Committed: 
https://git.openstack.org/cgit/openstack/neutron/commit/?id=d7c4428525dac6cbde005f51bcd44b12ebc3bc0a
Submitter: Jenkins
Branch:master

commit d7c4428525dac6cbde005f51bcd44b12ebc3bc0a
Author: Gyorgy Szombathelyi 
Date:   Mon May 29 16:21:15 2017 +0200

Allow to set UDP ports for VXLAN in Linuxbridge agent

Introduce vxlan.{udp_srcport_min, udp_srcport_max and udp_dstport}
for setting the port range used for VXLAN communication.

Change-Id: I9788090eee7aee9b533ac1dad2de95b29cbe
Closes-Bug: #1483853
DocImpact:  vxlan.{udp_srcport_min, udp_srcport_max and udp_dstport}
can be used to set UDP port numbers used for VXLAN in LinuxBridge
agent.


** Changed in: neutron
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1483853

Title:
  Cannot set the VXLAN UDP destination port to 4789 using Linux Bridge

Status in neutron:
  Fix Released

Bug description:
  I'm running stable/Juno with VXLAN and Linux Bridge.

  Linux default VxLAN UDP port is 8472.

  IANA assigned port is 4789.

  I tried to add the following in /etc/neutron/plugins/ml2/ml2_conf.ini
  file, but it still use port 8472 afterwards.

  [agent]
  vxlan_udp_port=4789

  ##

  Comments from Kevin Benton:

  Looking at the code, it doesn't look like vxlan_udp_port applies to
  Linux Bridge. Please file a bug and we should be able to get a fix
  pretty quickly.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1483853/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1703369] Re: get_identity_providers policy should be singular

2017-07-10 Thread Jeremy Stanley
Just to confirm, this is only a risk for the upcoming Pike release, not
a defect in current supported stable branches? If so, we would not issue
a security advisory unless it remains unfixed at release time per report
class Y ("Vulnerability only found in development release") in our
taxonomy: https://security.openstack.org/vmt-process.html#incident-
report-taxonomy

** Also affects: ossa
   Importance: Undecided
   Status: New

** Changed in: ossa
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1703369

Title:
  get_identity_providers policy should be singular

Status in OpenStack Identity (keystone):
  In Progress
Status in OpenStack Security Advisory:
  Incomplete

Bug description:
  identity:get_identity_providers should be
  identity:get_identity_provider (singular) since a GET is targeted on a
  single provider and the code is setup to check for
  identity:get_identity_provider (singular). See
  
https://github.com/openstack/keystone/blob/c7e29560b7bf7a44e44722eea0645bf18ad56af3/keystone/federation/controllers.py#L112

  found in master (pike)

  The ocata default policy.json also has this problem. Unless someone
  manually overrode policy to specify identity:get_identity_provider
  (singular), the result would be that the default rule was actually
  used for that check instead of identity:get_identity_providers. We
  could go back and fix the default policy.json for past releases, but
  the default actually has the same value as
  identity:get_identity_providers, and if nobody has complained it's
  probably safer to just leave it. It is, after all, just defaults there
  and anyone can override by specifying the correct value.

  But we must fix in pike to go along with the shift of policy into
  code. Policy defaults in code definitely need to match up with what
  the code actually checks. There should no longer be any reliance on
  the default rule.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1703369/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1703413] [NEW] Allow to set UDP ports for VXLAN in Linuxbridge agent

2017-07-10 Thread OpenStack Infra
Public bug reported:

https://review.openstack.org/468911
Dear bug triager. This bug was created since a commit was marked with DOCIMPACT.
Your project "openstack/neutron" is set up so that we directly report the 
documentation bugs against it. If this needs changing, the docimpact-group 
option needs to be added for the project. You can ask the OpenStack infra team 
(#openstack-infra on freenode) for help if you need to.

commit d7c4428525dac6cbde005f51bcd44b12ebc3bc0a
Author: Gyorgy Szombathelyi 
Date:   Mon May 29 16:21:15 2017 +0200

Allow to set UDP ports for VXLAN in Linuxbridge agent

Introduce vxlan.{udp_srcport_min, udp_srcport_max and udp_dstport}
for setting the port range used for VXLAN communication.

Change-Id: I9788090eee7aee9b533ac1dad2de95b29cbe
Closes-Bug: #1483853
DocImpact:  vxlan.{udp_srcport_min, udp_srcport_max and udp_dstport}
can be used to set UDP port numbers used for VXLAN in LinuxBridge
agent.

** Affects: neutron
 Importance: Undecided
 Status: New


** Tags: doc neutron

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1703413

Title:
  Allow to set UDP ports for VXLAN in Linuxbridge agent

Status in neutron:
  New

Bug description:
  https://review.openstack.org/468911
  Dear bug triager. This bug was created since a commit was marked with 
DOCIMPACT.
  Your project "openstack/neutron" is set up so that we directly report the 
documentation bugs against it. If this needs changing, the docimpact-group 
option needs to be added for the project. You can ask the OpenStack infra team 
(#openstack-infra on freenode) for help if you need to.

  commit d7c4428525dac6cbde005f51bcd44b12ebc3bc0a
  Author: Gyorgy Szombathelyi 
  Date:   Mon May 29 16:21:15 2017 +0200

  Allow to set UDP ports for VXLAN in Linuxbridge agent
  
  Introduce vxlan.{udp_srcport_min, udp_srcport_max and udp_dstport}
  for setting the port range used for VXLAN communication.
  
  Change-Id: I9788090eee7aee9b533ac1dad2de95b29cbe
  Closes-Bug: #1483853
  DocImpact:  vxlan.{udp_srcport_min, udp_srcport_max and udp_dstport}
  can be used to set UDP port numbers used for VXLAN in LinuxBridge
  agent.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1703413/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1703392] [NEW] default rule no longer applies with policy in code

2017-07-10 Thread Matthew Edmonds
Public bug reported:

The following should not exist in keystone/common/policies/base.py:

policy.RuleDefault(
name='default',
check_str='rule:admin_required')

because a default rule should no longer apply with policy in code. If
we've correctly defined all policy rules in code, then we'll never have
a case where code is checking a rule that can't be found, which is when
the default rule is checked.

In previous releases, some operators who override policy used the
default rule to restrict all rules that they (intentionally) omitted
from their policy.json. This shortened those files, and protected them
if keystone added new policy checks until/unless they decided to open
things up more widely. Leaving the default rule defined now that policy
is in code will confuse this kind of operator (and possibly others) who
haven't thought it through and realized that the default rule can't be
used like that anymore because it won't be checked just because you
didn't define another rule in policy.json.

** Affects: keystone
 Importance: Undecided
 Assignee: Matthew Edmonds (edmondsw)
 Status: In Progress

** Changed in: keystone
 Assignee: (unassigned) => Matthew Edmonds (edmondsw)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1703392

Title:
  default rule no longer applies with policy in code

Status in OpenStack Identity (keystone):
  In Progress

Bug description:
  The following should not exist in keystone/common/policies/base.py:

  policy.RuleDefault(
  name='default',
  check_str='rule:admin_required')

  because a default rule should no longer apply with policy in code. If
  we've correctly defined all policy rules in code, then we'll never
  have a case where code is checking a rule that can't be found, which
  is when the default rule is checked.

  In previous releases, some operators who override policy used the
  default rule to restrict all rules that they (intentionally) omitted
  from their policy.json. This shortened those files, and protected them
  if keystone added new policy checks until/unless they decided to open
  things up more widely. Leaving the default rule defined now that
  policy is in code will confuse this kind of operator (and possibly
  others) who haven't thought it through and realized that the default
  rule can't be used like that anymore because it won't be checked just
  because you didn't define another rule in policy.json.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1703392/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1703305] Re: some functions are deprecated in tempest

2017-07-10 Thread Matthew Treinish
This isn't actually a bug in tempest, those are interfaces that will be
removed in a future version. The neutron tempest plugin is using them
which is causing the warning to be emitted. The issue is that the
neutron plugin code needs to be updated

** Changed in: tempest
   Status: New => Invalid

** Also affects: neutron
   Importance: Undecided
   Status: New

** No longer affects: tempest

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1703305

Title:
  some functions are deprecated in tempest

Status in neutron:
  New

Bug description:
  There are some logs I could find where I could see there are some deprecated 
functions in tempest like following:
  
/usr/lib/python2.7/site-packages/neutron/tests/tempest/api/admin/test_external_network_extension.py:41:
 DeprecationWarning: Function 'tempest.test.idempotent_id()' has moved to 
'tempest.lib.decorators.idempotent_id()' in version 'Mitaka' and will be 
removed in a future version
@test.idempotent_id('afd8f1b7-a81e-4629-bca8-a367b3a144bb')
  
/usr/lib/python2.7/site-packages/neutron/tests/tempest/api/admin/test_floating_ips_admin_actions.py:45:
 DeprecationWarning: Function 'tempest.test.idempotent_id()' has moved to 
'tempest.lib.decorators.idempotent_id()' in version 'Mitaka' and will be 
removed in a future version
@test.idempotent_id('6ee9-4e99-5b15-b8e1-aa7df92ca589')
  
/usr/lib/python2.7/site-packages/neutron/tests/tempest/api/admin/test_l3_agent_scheduler.py:67:
 DeprecationWarning: Function 'tempest.test.idempotent_id()' has moved to 
'tempest.lib.decorators.idempotent_id()' in version 'Mitaka' and will be 
removed in a future version
@test.idempotent_id('b7ce6e89-e837-4ded-9b78-9ed3c9c6a45a')
  
/usr/lib/python2.7/site-packages/neutron/tests/tempest/api/admin/test_networks.py:22:
 DeprecationWarning: Function 'tempest.test.idempotent_id()' has moved to 
'tempest.lib.decorators.idempotent_id()' in version 'Mitaka' and will be 
removed in a future version
@test.idempotent_id('d3c76044-d067-4cb0-ae47-8cdd875c7f67')
  
/usr/lib/python2.7/site-packages/neutron/tests/tempest/api/admin/test_quotas.py:78:
 DeprecationWarning: Function 'tempest.test.idempotent_id()' has moved to 
'tempest.lib.decorators.idempotent_id()' in version 'Mitaka' and will be 
removed in a future version
@test.idempotent_id('2390f766-836d-40ef-9aeb-e810d78207fb')
  
/usr/lib/python2.7/site-packages/neutron/tests/tempest/api/admin/test_quotas_negative.py:26:
 DeprecationWarning: Function 'tempest.test.idempotent_id()' has moved to 
'tempest.lib.decorators.idempotent_id()' in version 'Mitaka' and will be 
removed in a future version
@test.idempotent_id('952f9b24-9156-4bdc-90f3-682a3d4302f0')
  
/usr/lib/python2.7/site-packages/neutron/tests/tempest/api/admin/test_routers_dvr.py:42:
 DeprecationWarning: Function 'tempest.test.idempotent_id()' has moved to 
'tempest.lib.decorators.idempotent_id()' in version 'Mitaka' and will be 
removed in a future version
@test.idempotent_id('08a2a0a8-f1e4-4b34-8e30-e522e836c44e')
  
/usr/lib/python2.7/site-packages/neutron/tests/tempest/api/admin/test_routers_flavors.py:83:
 DeprecationWarning: Function 'tempest.test.idempotent_id()' has moved to 
'tempest.lib.decorators.idempotent_id()' in version 'Mitaka' and will be 
removed in a future version
@test.idempotent_id('a4d01977-e968-4983-b4d9-824ea6c33f4b')
  
/usr/lib/python2.7/site-packages/neutron/tests/tempest/api/admin/test_shared_network_extension.py:33:
 DeprecationWarning: Function 'tempest.test.idempotent_id()' has moved to 
'tempest.lib.decorators.idempotent_id()' in version 'Mitaka' and will be 
removed in a future version
@test.idempotent_id('6661d219-b96d-4597-ad10-55766123421a')
  
/usr/lib/python2.7/site-packages/neutron/tests/tempest/api/test_address_scopes.py:59:
 DeprecationWarning: Function 'tempest.test.idempotent_id()' has moved to 
'tempest.lib.decorators.idempotent_id()' in version 'Mitaka' and will be 
removed in a future version
@test.idempotent_id('045f9294-8b1a-4848-b6a8-edf1b41e9d06')
  
/usr/lib/python2.7/site-packages/neutron/tests/tempest/api/test_address_scopes_negative.py:25:
 DeprecationWarning: Function 'tempest.test.idempotent_id()' has moved to 
'tempest.lib.decorators.idempotent_id()' in version 'Mitaka' and will be 
removed in a future version
@test.idempotent_id('9c92ec34-0c50-4104-aa47-9ce98d5088df')
  
/usr/lib/python2.7/site-packages/neutron/tests/tempest/api/test_allowed_address_pair.py:51:
 DeprecationWarning: Function 'tempest.test.idempotent_id()' has moved to 
'tempest.lib.decorators.idempotent_id()' in version 'Mitaka' and will be 
removed in a future version
@test.idempotent_id('86c3529b-1231-40de-803c-00e40882f043')
  
/usr/lib/python2.7/site-packages/neutron/tests/tempest/api/test_

[Yahoo-eng-team] [Bug 1703390] [NEW] Allow setting default region to log into

2017-07-10 Thread Jiri Suchomel
Public bug reported:

This is based on the solution provided with
https://bugs.launchpad.net/horizon/+bug/1506825 by Timur Sufiev.

The point is to have a setting (in local_settings.py) that allows user
to set the value of the default region to log into. If it is specified
(and no other region is set explicitly) and valid, it is used for
logging in. If it is empty, the existing mechanism of checking the
cookies is used.

** Affects: horizon
 Importance: Undecided
 Assignee: Jiri Suchomel (jsuchome)
 Status: In Progress

** Changed in: horizon
 Assignee: (unassigned) => Jiri Suchomel (jsuchome)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1703390

Title:
  Allow setting default region to log into

Status in OpenStack Dashboard (Horizon):
  In Progress

Bug description:
  This is based on the solution provided with
  https://bugs.launchpad.net/horizon/+bug/1506825 by Timur Sufiev.

  The point is to have a setting (in local_settings.py) that allows user
  to set the value of the default region to log into. If it is specified
  (and no other region is set explicitly) and valid, it is used for
  logging in. If it is empty, the existing mechanism of checking the
  cookies is used.

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1703390/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1663225] Re: ironic does not clean or shutdown nodes if nova-compute is down at the moment of 'nova delete'

2017-07-10 Thread George Shuklin
This problem exists in Ironic regardless of bot attempts to sweep it
under the expiration rug.

** Changed in: nova
   Status: Expired => New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1663225

Title:
  ironic does not clean or shutdown nodes if nova-compute is down at the
  moment of 'nova delete'

Status in OpenStack Compute (nova):
  New

Bug description:
  Affected configuration: Ironic installation with Ironic driver for
  nova.

  If nova-compute service is down at the moment of execution 'nova
  delete' for instance, nova marks instance as 'deleted' even node is
  continue to run.

  Steps to reproduce:
  1. Prepare ironic/nova
  2. Start instance (nova boot/openstack server create)
  3. Wait until 'ACTIVE' state for instance.
  4. Stop nova-compute
  5. Wait until it become 'down' in 'nova service-list'
  5. Execute 'nova delete' command for instance.
  6. Start nova-compute serivce

  Expected result:
  - Instance sits in the 'deleting' state until nova-compute is not come back.
  - Node switch to 'cleaning/available' as soon as nova-compute come back
  - Tenant instance (baremetal server) stops to operate as soon as nova-compute 
is up.
  nova-compute is up.

  Actual result:
  - Instance deleted almost instantly regardless of nova-compute status.
  - Node keeps 'active' state with filled in 'Instance UUID' field.
  - Tenant instance (baremetal server) continue to work after nova-compute is 
up to "running_deleted_instance_action" time.

  I believe this is incorrect behavior, because it allows tenants to
  continue to use services regardless of nova report that there are no
  instances are allocated to tenant.

  Affected version: newton.

  P.S. Normally nova (with libvirt/kvm driver) would keep instance in
  'deleting' state until nova-compute is not come back, and remove it
  from server (from libvirt). Only after that nova marks instance as
  deleted in database. Ironic driver should do the same.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1663225/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1703369] [NEW] get_identity_providers policy should be singular

2017-07-10 Thread Matthew Edmonds
Public bug reported:

identity:get_identity_providers should be identity:get_identity_provider
(singular) since a GET is targeted on a single provider.

found in master (pike)

** Affects: keystone
 Importance: Undecided
 Assignee: Matthew Edmonds (edmondsw)
 Status: In Progress

** Changed in: keystone
 Assignee: (unassigned) => Matthew Edmonds (edmondsw)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1703369

Title:
  get_identity_providers policy should be singular

Status in OpenStack Identity (keystone):
  In Progress

Bug description:
  identity:get_identity_providers should be
  identity:get_identity_provider (singular) since a GET is targeted on a
  single provider.

  found in master (pike)

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1703369/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1703360] [NEW] Don't show IPv6 addresses when selecting port for floating IP

2017-07-10 Thread Dr. Jens Rosenboom
Public bug reported:

A floating IP can only be associated with an IPv4 address, trying to use
an IPv6 address leads to an error like this:

Error: Bad floatingip request: Cannot process floating IP association
with fdb7:6005:3c07:0:f816:3eff:fe94:35d4, since that is not an IPv4
address. Neutron server returns request_ids: ['req-1ffbc2fb-5e84-44ac-
990e-62be46801e77']

So the selector should only show the IPv4 addresses of an instance to
choose from in the "Associate Floating IP" action.

Tested with current stable/ocata.

** Affects: horizon
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1703360

Title:
  Don't show IPv6 addresses when selecting port for floating IP

Status in OpenStack Dashboard (Horizon):
  New

Bug description:
  A floating IP can only be associated with an IPv4 address, trying to
  use an IPv6 address leads to an error like this:

  Error: Bad floatingip request: Cannot process floating IP association
  with fdb7:6005:3c07:0:f816:3eff:fe94:35d4, since that is not an IPv4
  address. Neutron server returns request_ids: ['req-1ffbc2fb-5e84-44ac-
  990e-62be46801e77']

  So the selector should only show the IPv4 addresses of an instance to
  choose from in the "Associate Floating IP" action.

  Tested with current stable/ocata.

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1703360/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1417305] Re: Default value for Physical Network is hardcoded value

2017-07-10 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/476453
Committed: 
https://git.openstack.org/cgit/openstack/horizon/commit/?id=449aa1a48cc7260ffc3c78570334e9ee2fbc51cb
Submitter: Jenkins
Branch:master

commit 449aa1a48cc7260ffc3c78570334e9ee2fbc51cb
Author: Beth Elwell 
Date:   Thu Jun 22 11:20:33 2017 +0100

Removed default value for 'Physical Network'

When creating a network there is currently a default value of 'default'
which causes the network creation to fail. It is nonsensical to have
a default value here as it will change depending on the provider
network type and needs to be set according to custom settings if the
user is not creating a simple local network which then does not require
the physical network value at all.

Change-Id: I448713d986f17ea1c00cd4dd22487291545cfe2a
Closes-Bug: #1417305


** Changed in: horizon
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1417305

Title:
  Default value for Physical Network is hardcoded value

Status in OpenStack Dashboard (Horizon):
  Fix Released

Bug description:
  The default value for the "Physical Network" field in the "Create
  Network" form of the Admin dashboard, shown when the Neutron provider
  extension is supported, is "default". It makes more sense for the
  default to be blank instead of a hardcoded string.

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1417305/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1703347] [NEW] insert_rule/remove_rule in policy.json should be moved to neutron-fwaas

2017-07-10 Thread Akihiro Motoki
Public bug reported:

etc/policy.json in the neutron repo contains 'insert_rule' and
'remove_rule' which are specific to neutron-fwaas [1]. They should be
moved to neutron-fwaas.

[1]
https://github.com/openstack/neutron/blob/master/etc/policy.json#L121-L122

** Affects: neutron
 Importance: Low
 Assignee: Akihiro Motoki (amotoki)
 Status: New


** Tags: fwaas

** Changed in: neutron
   Importance: Undecided => Low

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1703347

Title:
  insert_rule/remove_rule in policy.json should be moved to neutron-
  fwaas

Status in neutron:
  New

Bug description:
  etc/policy.json in the neutron repo contains 'insert_rule' and
  'remove_rule' which are specific to neutron-fwaas [1]. They should be
  moved to neutron-fwaas.

  [1]
  https://github.com/openstack/neutron/blob/master/etc/policy.json#L121-L122

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1703347/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1703340] [NEW] Login twice after 'service apache2 restart'

2017-07-10 Thread Vladislav Kuzmin
Public bug reported:

After restart Apache/Horizon I need to login twice.

Step to reproduce:
1. Go to login page
2. sudo service apache2 restart
3. Log in as admin. After that, you will be redirected back to the login page
4. You need type login and password one more time

Expected behaviour:
After restart I should type login and password only one time

** Affects: horizon
 Importance: Undecided
 Status: New

** Project changed: django-openstack-auth => horizon

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1703340

Title:
  Login twice after 'service apache2 restart'

Status in OpenStack Dashboard (Horizon):
  New

Bug description:
  After restart Apache/Horizon I need to login twice.

  Step to reproduce:
  1. Go to login page
  2. sudo service apache2 restart
  3. Log in as admin. After that, you will be redirected back to the login page
  4. You need type login and password one more time

  Expected behaviour:
  After restart I should type login and password only one time

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1703340/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1703340] [NEW] Login twice after 'service apache2 restart'

2017-07-10 Thread Launchpad Bug Tracker
You have been subscribed to a public bug:

After restart Apache/Horizon I need to login twice.

Step to reproduce:
1. Go to login page
2. sudo service apache2 restart
3. Log in as admin. After that, you will be redirected back to the login page
4. You need type login and password one more time

Expected behaviour:
After restart I should type login and password only one time

** Affects: horizon
 Importance: Undecided
 Status: New

-- 
Login twice after 'service apache2 restart'
https://bugs.launchpad.net/bugs/1703340
You received this bug notification because you are a member of Yahoo! 
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1703318] [NEW] add gateway on router for L3 API

2017-07-10 Thread feyman
Public bug reported:


This bug tracker is for errors with the documentation, use the following
as a template and remove or add fields as you see fit. Convert [ ] into
[x] to check boxes:

- [ ] This doc is inaccurate in this way: __
- [x ] This is a doc addition request.
- [ ] I have a fix to the document that I can paste below including example: 
input and output. 

I found the python-openstacksdk has a "add_gateway_to_router" method
which is finally mapped to /v2/routers/{router_id}/add_gateway_router in
the RESTful api with `PUT` method, however, in the official doc, there
are only /v2.0/routers/{router_id}/add_router_interface API for adding
interface on router. As far as I can see,  it's necessary to introduce
add_gateway_router and remove_gateway_router API

If you have a troubleshooting or support issue, use the following
resources:

 - Ask OpenStack: http://ask.openstack.org
 - The mailing list: http://lists.openstack.org
 - IRC: 'openstack' channel on Freenode

---
Release: 1.7.1.dev53 on 'Thu Jul 6 17:54:16 2017, commit 4e100d9'
SHA: 
Source: Can't derive source file URL
URL: https://developer.openstack.org/api-ref/networking/v2/index.html

** Affects: neutron
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1703318

Title:
  add gateway on router  for L3 API

Status in neutron:
  New

Bug description:

  This bug tracker is for errors with the documentation, use the
  following as a template and remove or add fields as you see fit.
  Convert [ ] into [x] to check boxes:

  - [ ] This doc is inaccurate in this way: __
  - [x ] This is a doc addition request.
  - [ ] I have a fix to the document that I can paste below including example: 
input and output. 

  I found the python-openstacksdk has a "add_gateway_to_router" method
  which is finally mapped to /v2/routers/{router_id}/add_gateway_router
  in the RESTful api with `PUT` method, however, in the official doc,
  there are only /v2.0/routers/{router_id}/add_router_interface API for
  adding interface on router. As far as I can see,  it's necessary to
  introduce add_gateway_router and remove_gateway_router API

  If you have a troubleshooting or support issue, use the following
  resources:

   - Ask OpenStack: http://ask.openstack.org
   - The mailing list: http://lists.openstack.org
   - IRC: 'openstack' channel on Freenode

  ---
  Release: 1.7.1.dev53 on 'Thu Jul 6 17:54:16 2017, commit 4e100d9'
  SHA: 
  Source: Can't derive source file URL
  URL: https://developer.openstack.org/api-ref/networking/v2/index.html

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1703318/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1703313] [NEW] DataTable column level policy_rules(allowed function) throw exception

2017-07-10 Thread Li Rita
Public bug reported:

Version: Ocata
Problem: The function allowed(self, request) in class Column which is in 
horizon/tables/base.py will throw exception "TypeError: 'str' object is not 
callable" if you add the "policy_rules" for DataTable column.

I check the history:
In bellowing changelist, the "DataTable column level policy" was merged on Dec 
9, 2016
https://github.com/openstack/horizon/commit/0744e8e5942858756e80aff6f16fd5f89dec6077

But there was a refactor for "POLICY_CHECK_FUNCTION" on Nov 25, 2016
https://github.com/openstack/horizon/commit/f5685ebe468626a983954132c3e5754e9954563b

The refactor shall also apply to "DataTable column level policy",
otherwise, the exception will be throw.

** Affects: horizon
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1703313

Title:
  DataTable column level policy_rules(allowed function) throw exception

Status in OpenStack Dashboard (Horizon):
  New

Bug description:
  Version: Ocata
  Problem: The function allowed(self, request) in class Column which is in 
horizon/tables/base.py will throw exception "TypeError: 'str' object is not 
callable" if you add the "policy_rules" for DataTable column.

  I check the history:
  In bellowing changelist, the "DataTable column level policy" was merged on 
Dec 9, 2016
  
https://github.com/openstack/horizon/commit/0744e8e5942858756e80aff6f16fd5f89dec6077

  But there was a refactor for "POLICY_CHECK_FUNCTION" on Nov 25, 2016
  
https://github.com/openstack/horizon/commit/f5685ebe468626a983954132c3e5754e9954563b

  The refactor shall also apply to "DataTable column level policy",
  otherwise, the exception will be throw.

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1703313/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1703311] [NEW] gkk

2017-07-10 Thread kaikaige
Public bug reported:

gkk test

** Affects: nova
 Importance: Undecided
 Assignee: kaikaige (krunerge)
 Status: New

** Changed in: nova
 Assignee: (unassigned) => kaikaige (krunerge)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1703311

Title:
  gkk

Status in OpenStack Compute (nova):
  New

Bug description:
  gkk test

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1703311/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1703303] [NEW] compute.pp fails during installation on rhel 7.4

2017-07-10 Thread Anandprakash
Public bug reported:

I was trying to install packstack on rhel 7.4, but I am getting following error-
^[[1;31mError: 
/Stage[main]/Packstack::Nova::Compute::Libvirt/File_line[libvirt-guests]: Could 
not evaluate: No such file or directory - /etc/sysconfig/libvirt-guests^[[0m
^[[1;31mError: 
/Stage[main]/Packstack::Nova::Compute::Libvirt/Exec[virsh-net-destroy-default]: 
Could not evaluate: Could not find command '/usr/bin/virsh'^[[0m
 and compute.pp gets fail.

** Affects: nova
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1703303

Title:
  compute.pp fails during installation on rhel 7.4

Status in OpenStack Compute (nova):
  New

Bug description:
  I was trying to install packstack on rhel 7.4, but I am getting following 
error-
  ^[[1;31mError: 
/Stage[main]/Packstack::Nova::Compute::Libvirt/File_line[libvirt-guests]: Could 
not evaluate: No such file or directory - /etc/sysconfig/libvirt-guests^[[0m
  ^[[1;31mError: 
/Stage[main]/Packstack::Nova::Compute::Libvirt/Exec[virsh-net-destroy-default]: 
Could not evaluate: Could not find command '/usr/bin/virsh'^[[0m
   and compute.pp gets fail.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1703303/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp