[Yahoo-eng-team] [Bug 1844152] Re: nova-conductor is having problem with rabbitmq

2019-09-18 Thread Dincer Celik
** Also affects: oslo.messaging
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1844152

Title:
  nova-conductor is having problem with rabbitmq

Status in Ubuntu Cloud Archive:
  New
Status in OpenStack Compute (nova):
  New
Status in oslo.messaging:
  New

Bug description:
  Using stable/stein on Ubuntu 18.04 and having error while creating new
  instance. This is not a network or firewall related issue because all
  other services work like a charm. I was having the same issue with
  nova-api and eventlet monkey patching fixed it. I'm not sure this is
  related with it too.

  2019-09-16 17:24:14.716 6 ERROR oslo.messaging._drivers.impl_rabbit
  [req-b8faac40-ef24-4c54-a2c7-dd0cd325821d
  266e838cc8dc472ead771dcfb15c08b7 e639622000cc419486083d784015215b -
  default default] Connection failed: [Errno 111] ECONNREFUSED (retrying
  in 32.0 seconds): ConnectionRefusedError: [Errno 111] ECONNREFUSED

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-archive/+bug/1844152/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1844595] Re: openstackNova(Rocky)--chinese incorrect codes for db character error

2019-09-18 Thread hubert chen
** Project changed: nova => neutron

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1844595

Title:
  openstackNova(Rocky)--chinese incorrect codes for db character error

Status in neutron:
  Incomplete

Bug description:
  Description
  ===
  When search security-group, a message "Incorrect string value" is sent.

  Environment
  ===
  [root@controller1 ~]# lsb_release -a
  LSB Version:  
:core-4.1-mips64el:core-4.1-noarch:cxx-4.1-mips64el:cxx-4.1-noarch:desktop-4.1-mips64el:desktop-4.1-noarch:languages-4.1-mips64el:languages-4.1-noarch:printing-4.1-mips64el:printing-4.1-noarch
  Distributor ID:   Loongnix
  Description:  Loongnix release 1.0 (20190331)
  Release:  1.0
  Codename: 20190331

  
  Steps to reproduce & Expected result
  ==
  execute a cli:
  [root@controller1 ~]# openstack security group list
  HttpException: 500: Server Error for url: 
http://controller1:9696/v2.0/security-groups, {"NeutronError": {"message": 
"\u8bf7\u6c42\u5931\u8d25\uff1a\u5728\u5904\u7406\u8bf7\u6c42\u65f6\uff0c\u53d1\u751f\u5185\u90e8\u670d\u52a1\u5668\u9519\u8bef\u3002",
 "type": "HTTPInternalServerError", "detail": ""}}
  2019-09-17 15:29:49.660 1845 ERROR neutron.api.v2.resource DBDataError: 
(pymysql.err.InternalError) (1366, u"Incorrect string value: 
'\\xE7\\xBC\\xBA\\xE7\\x9C\\x81...' for column 'description' at row 1") [SQL: 
u'INSERT INTO standa  rdattributes (resource_type, description, created_at, 
updated_at) VALUES (%(resource_type)s, %(description)s, %(created_at)s, 
%(updated_at)s)'] [parameters: {'created_at': datetime.datetime(2019, 9, 17, 7, 
29, 49), 'description': u  '\u7f3a\u7701\u5b89\u5168\u7ec4', 
'resource_type': 'securitygroups', 'updated_at': datetime.datetime(2019, 9, 17, 
7, 29, 49)}] (Background on this error at: http://sqlalche.me/e/2j85)

  Logs & Configs
  ==
  MariaDB [(none)]> show variables like 'character%';
  +--+--+
  | Variable_name| Value|
  +--+--+
  | character_set_client | utf8 |
  | character_set_connection | utf8 |
  | character_set_database   | latin1   |
  | character_set_filesystem | binary   |
  | character_set_results| utf8 |
  | character_set_server | latin1   |
  | character_set_system | utf8 |
  | character_sets_dir   | /usr/share/mariadb/charsets/ |
  +--+--+

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1844595/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1832265] Re: py3: inconsistent encoding of token fields

2019-09-18 Thread OpenStack Infra
Reviewed:  https://review.opendev.org/665617
Committed: 
https://git.openstack.org/cgit/openstack/keystone/commit/?id=ffa0918f5a92fd18c86703916d768012b0bea61b
Submitter: Zuul
Branch:master

commit ffa0918f5a92fd18c86703916d768012b0bea61b
Author: James Page 
Date:   Mon Jun 17 09:56:11 2019 +0100

token: consistently decode binary types

Ensure that any binary types unpacked from message payloads
are correctly converted from binary to text type.

Under Python 3 msgpack returns the serialized input as a
byte string. Similar to other msgpack'd values in the payload,
we need to explicitly decode it to a string value.

This is specifically more of an issue under Python 3; however
the decode operation is safe back to Python 2 so there is no
need to limit the decode codepath to just Python 3.

Change-Id: Ib1073acf5677a60714d0a386de3bcd14ce6cd134
Closes-Bug: 1832265


** Changed in: keystone
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1832265

Title:
  py3: inconsistent encoding of token fields

Status in OpenStack Keystone LDAP integration:
  Invalid
Status in Ubuntu Cloud Archive:
  Fix Committed
Status in Ubuntu Cloud Archive rocky series:
  Fix Committed
Status in Ubuntu Cloud Archive stein series:
  Fix Committed
Status in Ubuntu Cloud Archive train series:
  Fix Released
Status in OpenStack Identity (keystone):
  Fix Released
Status in keystone package in Ubuntu:
  Fix Released
Status in keystone source package in Cosmic:
  Won't Fix
Status in keystone source package in Disco:
  Fix Committed

Bug description:
  When using an LDAP domain user on a bionic-rocky cloud within horizon,
  we are unable to see the projects listed in the project selection
  drop-down, and are unable to query resources from any projects to
  which we are assigned the role Member.

  It appears that the following log entries in keystone may be helpful
  to troubleshooting this issue:

  (keystone.middleware.auth): 2019-06-10 19:47:02,700 DEBUG RBAC: auth_context: 
{'trust_id': None, 'trustor_id': None, 'trustee_id': None, 'domain_id': None, 
'domain_name': None, 'group_ids': [], 'token': , 'user_id': 
b'd4fb94cfa3ce0f7829d76fe44697488e7765d88e29f5a896f57d43caadb0fad4', 
'user_domain_id': '997b3e91271140feb1635eefba7c65a1', 'system_scope': None, 
'project_id': None, 'project_domain_id': None, 'roles': [], 'is_admin_project': 
True, 'service_user_id': None, 'service_user_domain_id': None, 
'service_project_id': None, 'service_project_domain_id': None, 'service_roles': 
[]}
  (keystone.server.flask.application): 2019-06-10 19:47:02,700 DEBUG 
Dispatching request to legacy mapper: /v3/users
  (keystone.server.flask.application): 2019-06-10 19:47:02,700 DEBUG 
SCRIPT_NAME: `/v3`, PATH_INFO: 
`/users/d4fb94cfa3ce0f7829d76fe44697488e7765d88e29f5a896f57d43caadb0fad4/projects`
  (routes.middleware): 2019-06-10 19:47:02,700 DEBUG Matched GET 
/users/d4fb94cfa3ce0f7829d76fe44697488e7765d88e29f5a896f57d43caadb0fad4/projects
  (routes.middleware): 2019-06-10 19:47:02,700 DEBUG Route path: 
'/users/{user_id}/projects', defaults: {'action': 'list_user_projects', 
'controller': }
  (routes.middleware): 2019-06-10 19:47:02,700 DEBUG Match dict: {'user_id': 
'd4fb94cfa3ce0f7829d76fe44697488e7765d88e29f5a896f57d43caadb0fad4', 'action': 
'list_user_projects', 'controller': 
}
  (keystone.common.wsgi): 2019-06-10 19:47:02,700 INFO GET 
https://keystone.mysite:5000/v3/users/d4fb94cfa3ce0f7829d76fe44697488e7765d88e29f5a896f57d43caadb0fad4/projects
  (keystone.common.controller): 2019-06-10 19:47:02,700 DEBUG RBAC: Adding 
query filter params ()
  (keystone.common.authorization): 2019-06-10 19:47:02,700 DEBUG RBAC: 
Authorizing 
identity:list_user_projects(user_id=d4fb94cfa3ce0f7829d76fe44697488e7765d88e29f5a896f57d43caadb0fad4)
  (keystone.policy.backends.rules): 2019-06-10 19:47:02,701 DEBUG enforce 
identity:list_user_projects: {'trust_id': None, 'trustor_id': None, 
'trustee_id': None, 'domain_id': None, 'domain_name': None, 'group_ids': [], 
'token': , 'user_id': 
b'd4fb94cfa3ce0f7829d76fe44697488e7765d88e29f5a896f57d43caadb0fad4', 
'user_domain_id': '997b3e91271140feb1635eefba7c65a1', 'system_scope': None, 
'project_id': None, 'project_domain_id': None, 'roles': [], 'is_admin_project': 
True, 'service_user_id': None, 'service_user_domain_id': None, 
'service_project_id': None, 'service_project_domain_id': None, 'service_roles': 
[]}
  (keystone.common.wsgi): 2019-06-10 19:47:02,702 WARNING You are not 
authorized to perform the requested action: identity:list_user_projects.

  
  It actually appears elsewhere in the keystone.log that there is a string 
which has encapsulated bytecode data in it (or vice versa).

  (keystone.common.wsgi): 2019-06-10 19:46:59,019 INFO POST 

[Yahoo-eng-team] [Bug 1844607] [NEW] log error when create neutron port with wrong subnet

2019-09-18 Thread zhengyong
Public bug reported:

With Neutron Newton version

There are two networks named share_net and test1 in my env, each with
one subnet. When I create port in share_net, but specify subnet_id of
the test1's subnet, not the subnet of share_net. Create port failed, but
log is "Failed to create port on network
8fd6c0d1-e499-4e29-9786-dadb377f9939, because fixed_ips included invalid
subnet d213e64e-045e-4941-a4bd-ffc049ad792c."

Here we can see network 8fd6c0d1-e499-4e29-9786-dadb377f9939 is test1,
subnet d213e64e-045e-4941-a4bd-ffc049ad792c is the subnet of test1. The
log is confused, actually it should log network
311a12a8-6824-4348-b5b5-80068a0c3785 with invalid subnet d213e64e-
045e-4941-a4bd-ffc049ad792c.

()[root@busybox-openstack-85c44df77f-xk2rx /]# neutron net-list
+--++---+
| id   | name   
| subnets   |
+--++---+
| 311a12a8-6824-4348-b5b5-80068a0c3785 | share_net  
| ef7e9220-d478-48f7-819e-80143621f233 192.168.20.0/24  |
| 8fd6c0d1-e499-4e29-9786-dadb377f9939 | test1  
| d213e64e-045e-4941-a4bd-ffc049ad792c 192.168.20.0/24  |
+--++---+

()[root@busybox-openstack-85c44df77f-xk2rx /]# neutron port-create
--name nic1 --fixed-ip subnet_id=d213e64e-045e-4941-a4bd-ffc049ad792c
311a12a8-6824-4348-b5b5-80068a0c3785

Invalid input for operation: Failed to create port on network 
8fd6c0d1-e499-4e29-9786-dadb377f9939, because fixed_ips included invalid subnet 
d213e64e-045e-4941-a4bd-ffc049ad792c.
Neutron server returns request_ids: ['req-e32df57b-0756-4b88-b042-a0b67ccd7fe7']

after inspect code, I found the function code is:

def _get_subnet_for_fixed_ip(self, context, fixed, subnets):
# Subnets are all the subnets belonging to the same network.
if not subnets:
msg = _('IP allocation requires subnets for network')
raise exc.InvalidInput(error_message=msg)

if 'subnet_id' in fixed:
def get_matching_subnet():
for subnet in subnets:
if subnet['id'] == fixed['subnet_id']:
return subnet
subnet = get_matching_subnet()
if not subnet:
subnet = self._get_subnet(context, fixed['subnet_id'])
msg = (_("Failed to create port on network %(network_id)s"
 ", because fixed_ips included invalid subnet "
 "%(subnet_id)s") %
   {'network_id': subnet['network_id'],
'subnet_id': fixed['subnet_id']})
raise exc.InvalidInput(error_message=msg)
this function, it use “'network_id': subnet['network_id'] ”, actually it should 
use the network passed from api.


master branch also have this problem: 
https://github.com/openstack/neutron/blob/master/neutron/db/ipam_backend_mixin.py#382

** Affects: neutron
 Importance: Undecided
 Assignee: zhengyong (zhengy23)
 Status: New

** Changed in: neutron
 Assignee: (unassigned) => zhengyong (zhengy23)

** Description changed:

  With Neutron Newton version
  
  There are two networks named share_net and test1 in my env, each with
  one subnet. When I create port in share_net, but specify subnet_id of
  the test1's subnet, not the subnet of share_net. Create port failed, but
  log is "Failed to create port on network
  8fd6c0d1-e499-4e29-9786-dadb377f9939, because fixed_ips included invalid
  subnet d213e64e-045e-4941-a4bd-ffc049ad792c."
  
  Here we can see network 8fd6c0d1-e499-4e29-9786-dadb377f9939 is test1,
  subnet d213e64e-045e-4941-a4bd-ffc049ad792c is the subnet of test1. The
  log is confused, actually it should log network
  311a12a8-6824-4348-b5b5-80068a0c3785 with invalid subnet d213e64e-
  045e-4941-a4bd-ffc049ad792c.
  
  ()[root@busybox-openstack-85c44df77f-xk2rx /]# neutron net-list
  
+--++---+
  | id   | name 
  | subnets   |
  
+--++---+
  | 311a12a8-6824-4348-b5b5-80068a0c3785 | share_net
  | ef7e9220-d478-48f7-819e-80143621f233 

[Yahoo-eng-team] [Bug 1844595] [NEW] openstackNova(Rocky)--chinese incorrect codes for db character error

2019-09-18 Thread hubert chen
Public bug reported:

Description
===
When search security-group, a message "Incorrect string value" is sent.

Environment
===
[root@controller1 ~]# lsb_release -a
LSB Version:
:core-4.1-mips64el:core-4.1-noarch:cxx-4.1-mips64el:cxx-4.1-noarch:desktop-4.1-mips64el:desktop-4.1-noarch:languages-4.1-mips64el:languages-4.1-noarch:printing-4.1-mips64el:printing-4.1-noarch
Distributor ID: Loongnix
Description:Loongnix release 1.0 (20190331)
Release:1.0
Codename:   20190331


Steps to reproduce & Expected result
==
execute a cli:
[root@controller1 ~]# openstack security group list
HttpException: 500: Server Error for url: 
http://controller1:9696/v2.0/security-groups, {"NeutronError": {"message": 
"\u8bf7\u6c42\u5931\u8d25\uff1a\u5728\u5904\u7406\u8bf7\u6c42\u65f6\uff0c\u53d1\u751f\u5185\u90e8\u670d\u52a1\u5668\u9519\u8bef\u3002",
 "type": "HTTPInternalServerError", "detail": ""}}
2019-09-17 15:29:49.660 1845 ERROR neutron.api.v2.resource DBDataError: 
(pymysql.err.InternalError) (1366, u"Incorrect string value: 
'\\xE7\\xBC\\xBA\\xE7\\x9C\\x81...' for column 'description' at row 1") [SQL: 
u'INSERT INTO standa  rdattributes (resource_type, description, created_at, 
updated_at) VALUES (%(resource_type)s, %(description)s, %(created_at)s, 
%(updated_at)s)'] [parameters: {'created_at': datetime.datetime(2019, 9, 17, 7, 
29, 49), 'description': u  '\u7f3a\u7701\u5b89\u5168\u7ec4', 
'resource_type': 'securitygroups', 'updated_at': datetime.datetime(2019, 9, 17, 
7, 29, 49)}] (Background on this error at: http://sqlalche.me/e/2j85)

Logs & Configs
==
MariaDB [(none)]> show variables like 'character%';
+--+--+
| Variable_name| Value|
+--+--+
| character_set_client | utf8 |
| character_set_connection | utf8 |
| character_set_database   | latin1   |
| character_set_filesystem | binary   |
| character_set_results| utf8 |
| character_set_server | latin1   |
| character_set_system | utf8 |
| character_sets_dir   | /usr/share/mariadb/charsets/ |
+--+--+

** Affects: nova
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1844595

Title:
  openstackNova(Rocky)--chinese incorrect codes for db character error

Status in OpenStack Compute (nova):
  New

Bug description:
  Description
  ===
  When search security-group, a message "Incorrect string value" is sent.

  Environment
  ===
  [root@controller1 ~]# lsb_release -a
  LSB Version:  
:core-4.1-mips64el:core-4.1-noarch:cxx-4.1-mips64el:cxx-4.1-noarch:desktop-4.1-mips64el:desktop-4.1-noarch:languages-4.1-mips64el:languages-4.1-noarch:printing-4.1-mips64el:printing-4.1-noarch
  Distributor ID:   Loongnix
  Description:  Loongnix release 1.0 (20190331)
  Release:  1.0
  Codename: 20190331

  
  Steps to reproduce & Expected result
  ==
  execute a cli:
  [root@controller1 ~]# openstack security group list
  HttpException: 500: Server Error for url: 
http://controller1:9696/v2.0/security-groups, {"NeutronError": {"message": 
"\u8bf7\u6c42\u5931\u8d25\uff1a\u5728\u5904\u7406\u8bf7\u6c42\u65f6\uff0c\u53d1\u751f\u5185\u90e8\u670d\u52a1\u5668\u9519\u8bef\u3002",
 "type": "HTTPInternalServerError", "detail": ""}}
  2019-09-17 15:29:49.660 1845 ERROR neutron.api.v2.resource DBDataError: 
(pymysql.err.InternalError) (1366, u"Incorrect string value: 
'\\xE7\\xBC\\xBA\\xE7\\x9C\\x81...' for column 'description' at row 1") [SQL: 
u'INSERT INTO standa  rdattributes (resource_type, description, created_at, 
updated_at) VALUES (%(resource_type)s, %(description)s, %(created_at)s, 
%(updated_at)s)'] [parameters: {'created_at': datetime.datetime(2019, 9, 17, 7, 
29, 49), 'description': u  '\u7f3a\u7701\u5b89\u5168\u7ec4', 
'resource_type': 'securitygroups', 'updated_at': datetime.datetime(2019, 9, 17, 
7, 29, 49)}] (Background on this error at: http://sqlalche.me/e/2j85)

  Logs & Configs
  ==
  MariaDB [(none)]> show variables like 'character%';
  +--+--+
  | Variable_name| Value|
  +--+--+
  | character_set_client | utf8 |
  | character_set_connection | utf8 |
  | character_set_database   | latin1   |
  | character_set_filesystem | binary   |
  | character_set_results| utf8

[Yahoo-eng-team] [Bug 1814245] Re: _disconnect_volume incorrectly called for multiattach volumes during post_live_migration

2019-09-18 Thread Matt Riedemann
** Also affects: nova/pike
   Importance: Undecided
   Status: New

** Changed in: nova/pike
   Status: New => In Progress

** Changed in: nova/pike
 Assignee: (unassigned) => Matt Riedemann (mriedem)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1814245

Title:
  _disconnect_volume incorrectly called for multiattach volumes  during
  post_live_migration

Status in OpenStack Compute (nova):
  Fix Released
Status in OpenStack Compute (nova) pike series:
  In Progress
Status in OpenStack Compute (nova) queens series:
  Fix Committed
Status in OpenStack Compute (nova) rocky series:
  Fix Committed

Bug description:
  Description
  ===

  Idc5cecffa9129d600c36e332c97f01f1e5ff1f9f introduced a simple check to
  ensure disconnect_volume is only called when detaching a multi-attach
  volume from the final instance using it on a given host.

  That change however doesn't take LM into account and more specifically
  the call to _disconect_volume during post_live_migration at the end of
  the migration from the source. At this point the original instance has
  already moved so the call to objects.InstanceList.get_uuids_by_host
  will only return one local instance that is using the volume instead
  of two, allowing disconnect_volume to be called.

  Depending on the backend being used this call can succeed removing the
  connection to the volume for the remaining instance or os-brick can
  fail in situations where it needs to flush I/O etc from the in-use
  connection.

  
  Steps to reproduce
  ==

  * Launch two instances attached to the same multiattach volume on the same 
host.
  * LM one of these instances to another host.

  Expected result
  ===

  No calls to disconnect_volume are made and the remaining instance on
  the host is still able to access the multi-attach volume.

  Actual result
  =

  A call to disconnect_volume is made and the remaining instance is
  unable to access the volume *or* the LM fails due to os-brick failures
  to disconnect the in-use volume on the host.

  Environment
  ===
  1. Exact version of OpenStack you are running. See the following
list for all releases: http://docs.openstack.org/releases/

 master

  2. Which hypervisor did you use?
 (For example: Libvirt + KVM, Libvirt + XEN, Hyper-V, PowerKVM, ...)

 Libvirt + KVM

  
  2. Which storage type did you use?
 (For example: Ceph, LVM, GPFS, ...)
 What's the version of that?

 LVM/iSCSI with multipath enabled reproduces the os-brick failure.

  3. Which networking type did you use?
 (For example: nova-network, Neutron with OpenVSwitch, ...)

 N/A

  Logs & Configs
  ==

  # nova show testvm2
  [..]
  | fault| {"message": "Unexpected error 
while running command.  
|
  |  | Command: multipath -f 
360014054a424982306a4a659007f73b2   
|
  |  | Exit code: 1 

 |
  |  | Stdout: u'Jan 28 16:09:29 | 
360014054a424982306a4a659007f73b2: map in use\  
  |
  |  | Jan 28 16:09:29 | failed to 
remove multipath map 360014054a424982306a4a", "code": 500, "details": " 
  |
  |  |   File 
\"/usr/lib/python2.7/site-packages/nova/compute/manager.py\", line 202, in 
decorated_function  |
  |  | return function(self, 
context, *args, **kwargs)   
|
  |  |   File 
\"/usr/lib/python2.7/site-packages/nova/compute/manager.py\", line 6299, in 
_post_live_migration   |
  |  | migrate_data)

 |
  |  |   File 
\"/usr/lib/python2.7/site-packages/nova/virt/libvirt/driver.py\", line 7744, in 
post_live_migration|
  |  | 
self._disconnect_volume(context, connection_info, instance) 
  |
  |  |   File 
\"/usr/lib/python2.7/site-packages/nova/virt/libvirt/driver.py\", line 1287, in 
_disconnect_volume |
  |  | 

[Yahoo-eng-team] [Bug 1844583] [NEW] tox -e docs fails with "WARNING: RSVG converter command 'rsvg-convert' cannot be run. Check the rsvg_converter_bin setting"

2019-09-18 Thread Matt Riedemann
Public bug reported:

Since this change:

https://github.com/openstack/nova/commit/16b9486bf7e91bfd5dc48297cee9f54b49156c93

Local docs builds fail if you don't have librsvg2-bin installed for the
sphinxcontrib-svg2pdfconverter dependency (I'm on Ubuntu 18.04). We
should include that in bindep.txt.

** Affects: nova
 Importance: Low
 Assignee: Matt Riedemann (mriedem)
 Status: Confirmed


** Tags: doc

** Changed in: nova
 Assignee: (unassigned) => Matt Riedemann (mriedem)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1844583

Title:
  tox -e docs fails with "WARNING: RSVG converter command 'rsvg-convert'
  cannot be run. Check the rsvg_converter_bin setting"

Status in OpenStack Compute (nova):
  Confirmed

Bug description:
  Since this change:

  
https://github.com/openstack/nova/commit/16b9486bf7e91bfd5dc48297cee9f54b49156c93

  Local docs builds fail if you don't have librsvg2-bin installed for
  the sphinxcontrib-svg2pdfconverter dependency (I'm on Ubuntu 18.04).
  We should include that in bindep.txt.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1844583/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1838554] Re: Specify keystone is OS user for fernet and credential setup

2019-09-18 Thread OpenStack Infra
Reviewed:  https://review.opendev.org/674725
Committed: 
https://git.openstack.org/cgit/openstack/keystone/commit/?id=7fc7ef2a07b2d5721db613635873c08ac88b5258
Submitter: Zuul
Branch:master

commit 7fc7ef2a07b2d5721db613635873c08ac88b5258
Author: chenxing 
Date:   Tue Aug 6 12:04:08 2019 +0800

Specify keystone is OS user for fernet and credential setup

Change-Id: I40124c809d8b14a6c50edc0f758104ab09656250
Closes-Bug: #1838554


** Changed in: keystone
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1838554

Title:
  Specify keystone is OS user for fernet and credential setup

Status in OpenStack Identity (keystone):
  Fix Released

Bug description:
  - [ ] This doc is inaccurate in this way: __
  - [x] This is a doc addition request.
  - [ ] I have a fix to the document that I can paste below including example: 
input and output. 

  I would suggest, that in chapter "Install and configure components"
  point 4 "Initialize Fernet key repositories" is clarified in a way
  that the reader knows the username "keystone" and the group name
  "keystone" are not free to be chosen, but specify the operating
  system's user and group "keystone".

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1838554/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1843889] Re: Windows: IPv6 tunnel endpoints

2019-09-18 Thread OpenStack Infra
Reviewed:  https://review.opendev.org/682031
Committed: 
https://git.openstack.org/cgit/openstack/neutron/commit/?id=484446984295d3122ead42e93288222d8b4e3ccb
Submitter: Zuul
Branch:master

commit 484446984295d3122ead42e93288222d8b4e3ccb
Author: Lucian Petrut 
Date:   Fri Sep 13 14:42:18 2019 +0300

Windows: Fix local adapter ipv6 check

ip_lib.IPDevice.device_has_ip doesn't include ipv6 addresses when
checking if a local adapter is configured to use a certain address.

This change fixes this issue, which will also allow using ipv6
tunnel endpoints.

Co-authored-by: Alin Serdean 
Change-Id: Iff3d25a5701b96df9da75cf398fd19d29e5cfeda
Closes-Bug: #1843889


** Changed in: neutron
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1843889

Title:
  Windows: IPv6 tunnel endpoints

Status in neutron:
  Fix Released

Bug description:
  ip_lib.IPDevice.device_has_ip doesn't include ipv6 addresses when
  checking if a local adapter is configured to use a certain address.
  This prevents IPv6 tunnel endpoints from being used on Windows.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1843889/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1844171] Re: Configuration parameter missing at "Configure the layer-3 agent"

2019-09-18 Thread OpenStack Infra
Reviewed:  https://review.opendev.org/682645
Committed: 
https://git.openstack.org/cgit/openstack/neutron/commit/?id=1df7e4bc466a03aae6566354839fe2e1fde4aea2
Submitter: Zuul
Branch:master

commit 1df7e4bc466a03aae6566354839fe2e1fde4aea2
Author: YAMAMOTO Takashi 
Date:   Tue Sep 17 22:17:20 2019 +0900

doc: Remove stale references to external_network_bridge

This is a leftover of https://review.opendev.org/#/c/395568/ .

Closes-Bug: #1844171
Change-Id: I99e45b78a5b56601f02c9e3c09b621c4d3b67de3


** Changed in: neutron
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1844171

Title:
  Configuration parameter missing at "Configure the layer-3 agent"

Status in neutron:
  Fix Released

Bug description:
  Link at which the bug exists:
  https://docs.openstack.org/neutron/stein/install/controller-install-
  option2-ubuntu.html

  This bug tracker is for errors with the documentation, use the
  following as a template and remove or add fields as you see fit.
  Convert [ ] into [x] to check boxes:

  - [ ] This doc is inaccurate in this way: At the section mentioned in
  the summary, it is stated to configure the Linux bridge and external
  network bridge whereas, the code section below it only shows
  interface_driver. There is NO mention of external_network_bridge

  If you have a troubleshooting or support issue, use the following
  resources:

   - Ask OpenStack: http://ask.openstack.org
   - The mailing list: http://lists.openstack.org
   - IRC: 'openstack' channel on Freenode

  ---
  Release: 14.0.3.dev63 on 2019-01-22 09:42:51
  SHA: 91f12c096c1f36100a83faba28172ac6b134c8ea
  Source: 
https://opendev.org/openstack/neutron/src/doc/source/install/controller-install-option2-ubuntu.rst
  URL: 
https://docs.openstack.org/neutron/stein/install/controller-install-option2-ubuntu.html

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1844171/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1844531] [NEW] Tutorial: Creating an Horizon Plugin in horizon: How to find the Horizon folder?

2019-09-18 Thread dasNessie
Public bug reported:

I do not know how to find the horizon folder, and think it should be
included in the tutorial. In my opinion, it would be useful to include
the default locations for the supported distros.

This bug tracker is for errors with the documentation, use the following
as a template and remove or add fields as you see fit. Convert [ ] into
[x] to check boxes:

- [ ] This doc is inaccurate in this way: __
- [x] This is a doc addition request.
- [ ] I have a fix to the document that I can paste below including example: 
input and output. 

If you have a troubleshooting or support issue, use the following
resources:

 - Ask OpenStack: http://ask.openstack.org
 - The mailing list: http://lists.openstack.org
 - IRC: 'openstack' channel on Freenode

---
Release: 15.1.1.dev12 on 2019-01-09 02:06:03
SHA: 2feb16764cb8f42cf424740a5f5875a35c0b7fb8
Source: 
https://git.openstack.org/cgit/openstack/horizon/tree/doc/source/contributor/tutorials/plugin.rst
URL: https://docs.openstack.org/horizon/stein/contributor/tutorials/plugin.html

** Affects: horizon
 Importance: Undecided
 Status: New


** Tags: documentation

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1844531

Title:
  Tutorial: Creating an Horizon Plugin in horizon: How to find the
  Horizon folder?

Status in OpenStack Dashboard (Horizon):
  New

Bug description:
  I do not know how to find the horizon folder, and think it should be
  included in the tutorial. In my opinion, it would be useful to include
  the default locations for the supported distros.

  This bug tracker is for errors with the documentation, use the
  following as a template and remove or add fields as you see fit.
  Convert [ ] into [x] to check boxes:

  - [ ] This doc is inaccurate in this way: __
  - [x] This is a doc addition request.
  - [ ] I have a fix to the document that I can paste below including example: 
input and output. 

  If you have a troubleshooting or support issue, use the following
  resources:

   - Ask OpenStack: http://ask.openstack.org
   - The mailing list: http://lists.openstack.org
   - IRC: 'openstack' channel on Freenode

  ---
  Release: 15.1.1.dev12 on 2019-01-09 02:06:03
  SHA: 2feb16764cb8f42cf424740a5f5875a35c0b7fb8
  Source: 
https://git.openstack.org/cgit/openstack/horizon/tree/doc/source/contributor/tutorials/plugin.rst
  URL: 
https://docs.openstack.org/horizon/stein/contributor/tutorials/plugin.html

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1844531/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1696476] Re: Identification of e24cloud platform as using Ec2 datasource

2019-09-18 Thread Scott Moser
** Changed in: cloud-init
   Status: Expired => Triaged

** Changed in: cloud-init
   Importance: Undecided => Low

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to cloud-init.
https://bugs.launchpad.net/bugs/1696476

Title:
  Identification of e24cloud platform as using Ec2 datasource

Status in cloud-init:
  Triaged

Bug description:
  Hi,

  I'd like to ask you, to add identification for e24cloud platform
  (e24cloud.com) with Ec2 Datasource.

  It can be identified via system vendor field:

  # cat /sys/class/dmi/id/sys_vendor
  e24cloud

  # dmidecode --string=system-manufacturer
  e24cloud

  I'll be happy to test a patch.

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-init/+bug/1696476/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1844510] Re: openstackNova(Rocky)-launch instacne-NeutronAdminCredentialConfigurationInvalid

2019-09-18 Thread Matt Riedemann
Double check the configuration for the [neutron] section in nova.conf
against this:

https://docs.openstack.org/neutron/rocky/install/controller-install-
ubuntu.html#configure-the-compute-service-to-use-the-networking-service

Note that the install guide is just a reference, the actual URLs have to
make sense for your deployment, e.g. I'm guessing the URL hostname for
auth isn't actually "controller". It also looks like you can drop the
/v3 suffix on the auth_url.

** Tags added: config neutron

** Changed in: nova
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1844510

Title:
  openstackNova(Rocky)-launch instacne-
  NeutronAdminCredentialConfigurationInvalid

Status in OpenStack Compute (nova):
  Invalid

Bug description:
  I try to launch new instance (from horizon as 'admin').
  From empty list of instance, click 'launch instance'.

  [root@controller1 ~]# uname -a
  Linux controller1 3.10.84-21.fc21.loongson.18.mips64el #1 SMP PREEMPT Tue Apr 
16 18:41:34 CST 2019 mips64 mips64 mips64 GNU/Linux

  [root@controller1 ~]# less /var/log/nova/nova-api.log
  2019-09-18 16:42:27.566 2320 ERROR nova.network.neutronv2.api 
[req-4ff4645f-47be-4c66-bff1-2c8dbb4cca99 5af84d7c91ce4def8dad829fdd707e00 
0c71a300399e4d759ef8b9dc6b00accf - default default] Neutron client was not able 
to generate a valid 
  admin token, please verify Neutron admin credential located in nova.conf: 
Unauthorized: 401-{u'error': {u'message': u'The request you have made requires 
authentication.', u'code': 401, u'title': u'Unauthorized'}}
  2019-09-18 16:42:27.568 2320 ERROR nova.api.openstack.wsgi 
[req-4ff4645f-47be-4c66-bff1-2c8dbb4cca99 5af84d7c91ce4def8dad829fdd707e00 
0c71a300399e4d759ef8b9dc6b00accf - default default] Unexpected exception in API 
method: NeutronAdminCre
  dentialConfigurationInvalid: Networking client is experiencing an 
unauthorized exception.
  2019-09-18 16:42:27.568 2320 ERROR nova.api.openstack.wsgi Traceback (most 
recent call last):
  2019-09-18 16:42:27.568 2320 ERROR nova.api.openstack.wsgi   File 
"/usr/lib/python2.7/site-packages/nova/api/openstack/wsgi.py", line 801, in 
wrapped
  2019-09-18 16:42:27.568 2320 ERROR nova.api.openstack.wsgi return 
f(*args, **kwargs)
  2019-09-18 16:42:27.568 2320 ERROR nova.api.openstack.wsgi   File 
"/usr/lib/python2.7/site-packages/nova/api/validation/__init__.py", line 110, 
in wrapper
  2019-09-18 16:42:27.568 2320 ERROR nova.api.openstack.wsgi return 
func(*args, **kwargs)
  2019-09-18 16:42:27.568 2320 ERROR nova.api.openstack.wsgi   File 
"/usr/lib/python2.7/site-packages/nova/api/validation/__init__.py", line 110, 
in wrapper
  2019-09-18 16:42:27.568 2320 ERROR nova.api.openstack.wsgi return 
func(*args, **kwargs)
  2019-09-18 16:42:27.568 2320 ERROR nova.api.openstack.wsgi   File 
"/usr/lib/python2.7/site-packages/nova/api/validation/__init__.py", line 110, 
in wrapper
  2019-09-18 16:42:27.568 2320 ERROR nova.api.openstack.wsgi return 
func(*args, **kwargs)
  2019-09-18 16:42:27.568 2320 ERROR nova.api.openstack.wsgi   File 
"/usr/lib/python2.7/site-packages/nova/api/validation/__init__.py", line 110, 
in wrapper
  2019-09-18 16:42:27.568 2320 ERROR nova.api.openstack.wsgi return 
func(*args, **kwargs)
  2019-09-18 16:42:27.568 2320 ERROR nova.api.openstack.wsgi   File 
"/usr/lib/python2.7/site-packages/nova/api/validation/__init__.py", line 110, 
in wrapper
  2019-09-18 16:42:27.568 2320 ERROR nova.api.openstack.wsgi return 
func(*args, **kwargs)
  2019-09-18 16:42:27.568 2320 ERROR nova.api.openstack.wsgi   File 
"/usr/lib/python2.7/site-packages/nova/api/validation/__init__.py", line 110, 
in wrapper
  2019-09-18 16:42:27.568 2320 ERROR nova.api.openstack.wsgi return 
func(*args, **kwargs)
  2019-09-18 16:42:27.568 2320 ERROR nova.api.openstack.wsgi   File 
"/usr/lib/python2.7/site-packages/nova/api/validation/__init__.py", line 110, 
in wrapper
  2019-09-18 16:42:27.568 2320 ERROR nova.api.openstack.wsgi return 
func(*args, **kwargs)
  2019-09-18 16:42:27.568 2320 ERROR nova.api.openstack.wsgi   File 
"/usr/lib/python2.7/site-packages/nova/api/validation/__init__.py", line 110, 
in wrapper
  2019-09-18 16:42:27.568 2320 ERROR nova.api.openstack.wsgi return 
func(*args, **kwargs)
  2019-09-18 16:42:27.568 2320 ERROR nova.api.openstack.wsgi   File 
"/usr/lib/python2.7/site-packages/nova/api/validation/__init__.py", line 110, 
in wrapper
  2019-09-18 16:42:27.568 2320 ERROR nova.api.openstack.wsgi return 
func(*args, **kwargs)
  2019-09-18 16:42:27.568 2320 ERROR nova.api.openstack.wsgi   File 
"/usr/lib/python2.7/site-packages/nova/api/validation/__init__.py", line 110, 
in wrapper
  2019-09-18 16:42:27.568 2320 ERROR nova.api.openstack.wsgi return 
func(*args, **kwargs)
  2019-09-18 16:42:27.568 2320 ERROR nova.api.openstack.wsgi   File 

[Yahoo-eng-team] [Bug 1844157] Re: keystone-manage db_sync --check misbehaves, version 15.1.0

2019-09-18 Thread OpenStack Infra
Reviewed:  https://review.opendev.org/682447
Committed: 
https://git.openstack.org/cgit/openstack/keystone/commit/?id=6bb14c0ff6c95bbce26ce8023ef621e408c111e6
Submitter: Zuul
Branch:master

commit 6bb14c0ff6c95bbce26ce8023ef621e408c111e6
Author: morgan fainberg 
Date:   Mon Sep 16 11:15:25 2019 -0700

Use correct repo for initial version check

Use the actual repo for the initial version check of the db version when
performing `db_sync --check`. Previously we always used the Legacy Repo
as the repo path was not populated in the `get_init_version` function.

This allowed the case where the new expand/contract/migrate repos
matched the legacy repo version number, the `db_sync --check` command
would assume that everything was properly up to date regardless of the
version for the expand/contract/migrate repositories. This was most
noticable in the case of a db not under version control.

Change-Id: Id5e6f74a5ed96fdf17e2c241466897974aa5a218
closes-bug: #1844157


** Changed in: keystone
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1844157

Title:
  keystone-manage db_sync --check misbehaves, version 15.1.0

Status in OpenStack Identity (keystone):
  Fix Released

Bug description:
  We are seeing a difference in behaviour in keystone-manage between
  version 15.0.0 and 15.1.0.

  The newer version always has a return code of zero, which means that
  in openstack-ansible we never initialise the keystone db - that
  process is driven by parsing the return code.

  Here is an example of the return code being different between the
  different versions http://paste.openstack.org/show/776806/

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1844157/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1843609] Re: Domain-specific domain ID resolution breaks with system-scoped tokens

2019-09-18 Thread OpenStack Infra
Reviewed:  https://review.opendev.org/681833
Committed: 
https://git.openstack.org/cgit/openstack/keystone/commit/?id=8f43b9cab00c86a455b2a9700b434e98b2e9c2d8
Submitter: Zuul
Branch:master

commit 8f43b9cab00c86a455b2a9700b434e98b2e9c2d8
Author: Lance Bragstad 
Date:   Thu Sep 12 16:46:26 2019 +

Make system tokens work with domain-specific drivers

When calling certain group or user APIs, keystone logic would attempt
to figure out the domain to scope responses to. This was specific to
enabling domain-specific driver support, where each domain is backed
by a different identity store. This functionality is turned off by
default. Since system-scoped tokens are not associated to a domain
(unlike project-scoped tokens or domain-scoped tokens), the logic to
determine a domain from a system-scoped token was breaking and
returning an erroneous HTTP 401 Unauthorized when system users
attempted to list users or groups.

This commit adds support for domain detection with system-scoped
tokens.

Change-Id: I8f0f7a623a1741f461493d872849fae7ef3e8077
Closes-Bug: 1843609


** Changed in: keystone
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1843609

Title:
  Domain-specific domain ID resolution breaks with system-scoped tokens

Status in OpenStack Identity (keystone):
  Fix Released
Status in OpenStack Identity (keystone) queens series:
  In Progress
Status in OpenStack Identity (keystone) rocky series:
  In Progress
Status in OpenStack Identity (keystone) stein series:
  In Progress
Status in OpenStack Identity (keystone) train series:
  Fix Released

Bug description:
  System-scope was introduced in Queens [0] but recently we discovered a
  weird case where system users aren't able to do things they should be
  able to with system-scoped tokens when domain-specific drivers are
  enabled.

  For example, they are unable to list groups or users because the API
  logic for GET /v3/groups and GET /v3/users tries to resolve a domain
  ID from the request [1]. If domain-specific drivers are enabled and
  there isn't a domain ID associated to the request (either with a
  domain-scoped token or a project-scoped token) the API returns a 401,
  which makes no sense from the context of a system user [2].

  You can recreate this locally by enabling domain-specific drivers in
  keystone.conf [3] and running the test_groups or test_users v3
  protection tests using:

$ tox -e py37 -- keystone.tests.unit.protection.v3.test_groups

  Observed failures:
  https://pasted.tech/pastes/b45c6b015b97c865018c4b3290f60e0456fe304a.raw

  This isn't blocking the gate because domain-specific drivers are off
  by default and the logic short-circuits [4].

  [0] 
http://specs.openstack.org/openstack/keystone-specs/specs/keystone/queens/system-scope.html
  [1] 
https://opendev.org/openstack/keystone/src/branch/master/keystone/api/groups.py#L84
  [2] 
https://opendev.org/openstack/keystone/src/branch/master/keystone/server/flask/common.py#L917-L943
  [3] https://pasted.tech/pastes/e8ffce7a3377b960dd88de8c88e2ccfd173ec726.raw
  [4] 
https://opendev.org/openstack/keystone/src/branch/master/keystone/server/flask/common.py#L924-L926

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1843609/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1844516] [NEW] [neutron-tempest-plugin] SSH timeout exceptions when executing remote commands

2019-09-18 Thread Rodolfo Alonso
Public bug reported:

Those SSH timeout exceptions have been detected during the execution of
the scenario QoS tests, in particular "test_qos_basic_and_update".

Those SSH timeouts happened during the execution of the following commands:
- "_kill_nc_process", killing any existing "nc" command being executed in the 
remote host.
- creating the "nc" server in the remote host.

Logs:
[1]https://9a0240ca9f61a595b570-86672578d4e6ceb498f2d932b0da6815.ssl.cf1.rackcdn.com/633871/20/check/neutron-tempest-plugin-scenario-openvswitch/772f7a4/testr_results.html.gz
[2]https://1fd93ff32a555bc48a73-5fe9d093373d887f2b09d5c4b981e1db.ssl.cf2.rackcdn.com/652099/34/check/neutron-tempest-plugin-scenario-openvswitch-rocky/4897a52/testr_results.html.gz
[3]https://openstack.fortnebula.com:13808/v1/AUTH_e8fd161dc34c421a979a9e6421f823e9/zuul_opendev_logs_cf0/679510/1/check/neutron-tempest-plugin-scenario-openvswitch/cf055c6/testr_results.html.gz

** Affects: neutron
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1844516

Title:
  [neutron-tempest-plugin] SSH timeout exceptions when executing remote
  commands

Status in neutron:
  New

Bug description:
  Those SSH timeout exceptions have been detected during the execution
  of the scenario QoS tests, in particular "test_qos_basic_and_update".

  Those SSH timeouts happened during the execution of the following commands:
  - "_kill_nc_process", killing any existing "nc" command being executed in the 
remote host.
  - creating the "nc" server in the remote host.

  Logs:
  
[1]https://9a0240ca9f61a595b570-86672578d4e6ceb498f2d932b0da6815.ssl.cf1.rackcdn.com/633871/20/check/neutron-tempest-plugin-scenario-openvswitch/772f7a4/testr_results.html.gz
  
[2]https://1fd93ff32a555bc48a73-5fe9d093373d887f2b09d5c4b981e1db.ssl.cf2.rackcdn.com/652099/34/check/neutron-tempest-plugin-scenario-openvswitch-rocky/4897a52/testr_results.html.gz
  
[3]https://openstack.fortnebula.com:13808/v1/AUTH_e8fd161dc34c421a979a9e6421f823e9/zuul_opendev_logs_cf0/679510/1/check/neutron-tempest-plugin-scenario-openvswitch/cf055c6/testr_results.html.gz

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1844516/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1782922] Re: LDAP: changing user_id_attribute bricks group mapping

2019-09-18 Thread Corey Bryant
Cosmic is EOL. will fix direction in Rocky cloud archive

** Changed in: keystone (Ubuntu Cosmic)
   Status: Triaged => Won't Fix

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1782922

Title:
  LDAP: changing user_id_attribute bricks group mapping

Status in Ubuntu Cloud Archive:
  Triaged
Status in Ubuntu Cloud Archive queens series:
  Triaged
Status in Ubuntu Cloud Archive rocky series:
  Triaged
Status in Ubuntu Cloud Archive stein series:
  Triaged
Status in Ubuntu Cloud Archive train series:
  Fix Released
Status in OpenStack Identity (keystone):
  Fix Released
Status in keystone package in Ubuntu:
  Fix Released
Status in keystone source package in Bionic:
  Triaged
Status in keystone source package in Cosmic:
  Won't Fix
Status in keystone source package in Disco:
  Triaged
Status in keystone source package in Eoan:
  Fix Released

Bug description:
  Env Details:
  Openstack version: Queens (17.0.5)
  OS: CentOS 7.5
  LDAP: Active Directory, Windows Server 2012R2

  We changed the user_id_attribute to sAMAccountName when configuring
  keystone. [ user_id_attribute = "sAMAccountName" ;
  group_members_are_ids = False ]. Unfortunately this bricks the group
  mapping logic in keystone.

  The relevant code in keystone:
  `list_users_in_group` [1] -> gets all groups from the LDAP server, and then 
calls `_transform_group_member_ids`. `_transform_group_member_ids` tries to 
match the user ids (for posixGroups e.g.) or the DN. However DN matching does 
not match the full DN. It rather takes the first RDN of the DN and computes the 
keystone user id [2]. The first RDN in Active Directory is the "CN". While the 
user-create part honors the user_id_attribute and takes "sAMAccountName" in our 
configuration. The generated user-ids in keystone now do not match anymore and 
hence group mapping is broken.

  A fix could be looking up the user by the DN received from the
  'member' attribute of a given group and compare the configured
  'user_id_attribute' of the received ldap user id and the in keystone
  stored user id. A quick fix could also be to mention that behavior in
  the documentation.

  /e: related
  https://bugs.launchpad.net/keystone/+bug/1231488/comments/19

  [1]
  
https://github.com/openstack/keystone/blob/master/keystone/identity/backends/ldap/common.py#L1285

  [2]
  
https://github.com/openstack/keystone/blob/master/keystone/identity/backends/ldap/core.py#L126

  [3]
  
https://github.com/openstack/keystone/blob/master/keystone/identity/backends/ldap/common.py#L1296

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-archive/+bug/1782922/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1782922] Re: LDAP: changing user_id_attribute bricks group mapping

2019-09-18 Thread Corey Bryant
For Ubuntu, a new package version including this fix has been uploaded to the 
following:
* eoan (and train cloud archive) - https://launchpad.net/ubuntu/+source/keystone
* disco unapproved queue - 
https://launchpad.net/ubuntu/disco/+queue?queue_state=1_text=keystone
* rocky-staging (cosmic is EOL) - 
https://launchpad.net/~ubuntu-cloud-archive/+archive/ubuntu/rocky-staging/+packages?field.name_filter=keystone_filter=published_filter=
* bionic unapproved queue - 
https://launchpad.net/ubuntu/bionic/+queue?queue_state=1_text=keystone

** Changed in: keystone (Ubuntu Eoan)
   Status: Triaged => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1782922

Title:
  LDAP: changing user_id_attribute bricks group mapping

Status in Ubuntu Cloud Archive:
  Triaged
Status in Ubuntu Cloud Archive queens series:
  Triaged
Status in Ubuntu Cloud Archive rocky series:
  Triaged
Status in Ubuntu Cloud Archive stein series:
  Triaged
Status in Ubuntu Cloud Archive train series:
  Fix Released
Status in OpenStack Identity (keystone):
  Fix Released
Status in keystone package in Ubuntu:
  Fix Released
Status in keystone source package in Bionic:
  Triaged
Status in keystone source package in Cosmic:
  Won't Fix
Status in keystone source package in Disco:
  Triaged
Status in keystone source package in Eoan:
  Fix Released

Bug description:
  Env Details:
  Openstack version: Queens (17.0.5)
  OS: CentOS 7.5
  LDAP: Active Directory, Windows Server 2012R2

  We changed the user_id_attribute to sAMAccountName when configuring
  keystone. [ user_id_attribute = "sAMAccountName" ;
  group_members_are_ids = False ]. Unfortunately this bricks the group
  mapping logic in keystone.

  The relevant code in keystone:
  `list_users_in_group` [1] -> gets all groups from the LDAP server, and then 
calls `_transform_group_member_ids`. `_transform_group_member_ids` tries to 
match the user ids (for posixGroups e.g.) or the DN. However DN matching does 
not match the full DN. It rather takes the first RDN of the DN and computes the 
keystone user id [2]. The first RDN in Active Directory is the "CN". While the 
user-create part honors the user_id_attribute and takes "sAMAccountName" in our 
configuration. The generated user-ids in keystone now do not match anymore and 
hence group mapping is broken.

  A fix could be looking up the user by the DN received from the
  'member' attribute of a given group and compare the configured
  'user_id_attribute' of the received ldap user id and the in keystone
  stored user id. A quick fix could also be to mention that behavior in
  the documentation.

  /e: related
  https://bugs.launchpad.net/keystone/+bug/1231488/comments/19

  [1]
  
https://github.com/openstack/keystone/blob/master/keystone/identity/backends/ldap/common.py#L1285

  [2]
  
https://github.com/openstack/keystone/blob/master/keystone/identity/backends/ldap/core.py#L126

  [3]
  
https://github.com/openstack/keystone/blob/master/keystone/identity/backends/ldap/common.py#L1296

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-archive/+bug/1782922/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1844510] [NEW] NeutronAdminCredentialConfigurationInvalid

2019-09-18 Thread hubert chen
Public bug reported:


I try to launch new instance (from horizon as 'admin').
>From empty list of instance, click 'launch instance'.

** Affects: nova
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1844510

Title:
  NeutronAdminCredentialConfigurationInvalid

Status in OpenStack Compute (nova):
  New

Bug description:
  
  I try to launch new instance (from horizon as 'admin').
  From empty list of instance, click 'launch instance'.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1844510/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1539722] Re: Image "container_format" incorrectly modified when editing image

2019-09-18 Thread OpenStack Infra
Reviewed:  https://review.opendev.org/664132
Committed: 
https://git.openstack.org/cgit/openstack/horizon/commit/?id=ba75bafc69c03f04b3c7d4f50e1cc9e3123743a3
Submitter: Zuul
Branch:master

commit ba75bafc69c03f04b3c7d4f50e1cc9e3123743a3
Author: 白子玉 
Date:   Sat Jun 8 15:14:51 2019 +0800

Specify proper container_format for 'vhd' disk_format

When editing an image, if the disk_fomrat is 'vhd',
the container_format was wrongly set to 'bare' before.
'ovf' is the correct container_format for 'vhd' disk images.

Closes-Bug: #1539722
Change-Id: Ic6b0c66af0d5c8db2d802d6eea2b97721d92b7eb


** Changed in: horizon
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1539722

Title:
  Image "container_format" incorrectly modified when editing image

Status in OpenStack Dashboard (Horizon):
  Fix Released

Bug description:
  Hello,

  When editing a Glance image in Horizon (for example, changing its
  name), Horizon is incorrectly changing the container_format to "bare",
  losing whatever the value previously was. This is affecting images
  which have been taken from XenServer, as the container_format is
  changed from "ovf" to "bare". The end-result of this, is that Cinder
  does not run through the proper image conversion procedures (coalesce,
  etc.) when creating a Volume from that Image. Instead it will just
  dump the .gz file onto the volume, which is obviously unbootable.

  We have traced the problem down to the file /usr/share/openstack-
  dashboard/openstack_dashboard/dashboards/project/images/images/forms.py.
  In the function "create_image_metadata", there is a section which
  states:

  if disk_format in ('ami', 'aki', 'ari',):
  container_format = disk_format
  elif disk_format == 'docker':
  # To support docker containers we allow the user to specify
  # 'docker' as the format. In that case we really want to use
  # 'raw' as the disk format and 'docker' as the container format.
  disk_format = 'raw'
  container_format = 'docker'
  else:
  container_format = 'bare'

  
  It's clear to see here how this is overriding the container_format from its 
proper value. I believe an appropriate patch would be to add an an "elif 
disk_format=='vhd' " section. For example, we have done the following which is 
working for us:

  if disk_format in ('ami', 'aki', 'ari',):
  container_format = disk_format
  elif disk_format == 'docker':
  # To support docker containers we allow the user to specify
  # 'docker' as the format. In that case we really want to use
  # 'raw' as the disk format and 'docker' as the container format.
  disk_format = 'raw'
  container_format = 'docker'
  elif disk_format == 'vhd':
  container_format = 'ovf'
  else:
  container_format = 'bare'

  
  I'm not enough of a developer to know if this is truly the correct patch, or 
if this will break some other functionality for someone else. Could a real 
developer please take a look at this, and patch as appropriate?

  Thanks in advance,

  Alex Oughton

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1539722/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1844500] [NEW] get_cmdline_from_pid may fail

2019-09-18 Thread Dr. Jens Harbott
Public bug reported:

Even though get_cmdline_from_pid() checks for the existence of the PID
before accessing the cmdline, the process may terminate just in between,
causing an IOError. So we need to catch that exception.

>From 
>https://zuul.opendev.org/t/openstack/build/3a93ef0d0bbd40dc84758682dbc7b049:

ft1.40: 
neutron.tests.functional.agent.test_firewall.FirewallTestCase.test_egress_udp_rule(OVS
 Firewall Driver)_StringException: Traceback (most recent call last):
  File "neutron/tests/base.py", line 180, in func
return f(self, *args, **kwargs)
  File "neutron/tests/functional/agent/test_firewall.py", line 498, in 
test_egress_udp_rule
self._test_rule(self.tester.EGRESS, self.tester.UDP)
  File "neutron/tests/functional/agent/test_firewall.py", line 464, in 
_test_rule
direction=direction)
  File "neutron/tests/common/conn_testers.py", line 205, in assert_no_connection
self.assert_connection(direction, protocol, src_port, dst_port)
  File "neutron/tests/common/conn_testers.py", line 49, in wrap
return f(self, direction, *args, **kwargs)
  File "neutron/tests/common/conn_testers.py", line 200, in assert_connection
testing_method(direction, protocol, src_port, dst_port)
  File "neutron/tests/common/conn_testers.py", line 161, in 
_test_transport_connectivity
nc_tester.test_connectivity()
  File "neutron/tests/common/net_helpers.py", line 526, in test_connectivity
self.client_process.writeline(testing_string)
  File "neutron/tests/common/net_helpers.py", line 476, in client_process
self.establish_connection()
  File "neutron/tests/common/net_helpers.py", line 503, in establish_connection
self._spawn_server_process()
  File "neutron/tests/common/net_helpers.py", line 489, in _spawn_server_process
listen=True)
  File "neutron/tests/common/net_helpers.py", line 554, in 
_spawn_nc_in_namespace
proc = RootHelperProcess(cmd, namespace=namespace)
  File "neutron/tests/common/net_helpers.py", line 300, in __init__
self._wait_for_child_process()
  File "neutron/tests/common/net_helpers.py", line 333, in 
_wait_for_child_process
"in %d seconds" % (self.cmd, timeout)))
  File "neutron/common/utils.py", line 701, in wait_until_true
while not predicate():
  File "neutron/tests/common/net_helpers.py", line 325, in child_is_running
self.pid, self.cmd, run_as_root=True)
  File "neutron/agent/linux/utils.py", line 296, in get_root_helper_child_pid
if pid_invoked_with_cmdline(pid, expected_cmd):
  File "neutron/agent/linux/utils.py", line 356, in pid_invoked_with_cmdline
cmd = get_cmdline_from_pid(pid)
  File "neutron/agent/linux/utils.py", line 326, in get_cmdline_from_pid
with open('/proc/%s/cmdline' % pid, 'r') as f:
IOError: [Errno 2] No such file or directory: '/proc/2866/cmdline

** Affects: neutron
 Importance: Undecided
 Assignee: Dr. Jens Harbott (j-harbott)
 Status: In Progress

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1844500

Title:
  get_cmdline_from_pid may fail

Status in neutron:
  In Progress

Bug description:
  Even though get_cmdline_from_pid() checks for the existence of the PID
  before accessing the cmdline, the process may terminate just in
  between, causing an IOError. So we need to catch that exception.

  From 
https://zuul.opendev.org/t/openstack/build/3a93ef0d0bbd40dc84758682dbc7b049:
  
  ft1.40: 
neutron.tests.functional.agent.test_firewall.FirewallTestCase.test_egress_udp_rule(OVS
 Firewall Driver)_StringException: Traceback (most recent call last):
File "neutron/tests/base.py", line 180, in func
  return f(self, *args, **kwargs)
File "neutron/tests/functional/agent/test_firewall.py", line 498, in 
test_egress_udp_rule
  self._test_rule(self.tester.EGRESS, self.tester.UDP)
File "neutron/tests/functional/agent/test_firewall.py", line 464, in 
_test_rule
  direction=direction)
File "neutron/tests/common/conn_testers.py", line 205, in 
assert_no_connection
  self.assert_connection(direction, protocol, src_port, dst_port)
File "neutron/tests/common/conn_testers.py", line 49, in wrap
  return f(self, direction, *args, **kwargs)
File "neutron/tests/common/conn_testers.py", line 200, in assert_connection
  testing_method(direction, protocol, src_port, dst_port)
File "neutron/tests/common/conn_testers.py", line 161, in 
_test_transport_connectivity
  nc_tester.test_connectivity()
File "neutron/tests/common/net_helpers.py", line 526, in test_connectivity
  self.client_process.writeline(testing_string)
File "neutron/tests/common/net_helpers.py", line 476, in client_process
  self.establish_connection()
File "neutron/tests/common/net_helpers.py", line 503, in 
establish_connection
  self._spawn_server_process()
File "neutron/tests/common/net_helpers.py", line 489, in 
_spawn_server_process
  

[Yahoo-eng-team] [Bug 1782922] Re: LDAP: changing user_id_attribute bricks group mapping

2019-09-18 Thread Corey Bryant
** Changed in: cloud-archive/train
   Status: Triaged => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1782922

Title:
  LDAP: changing user_id_attribute bricks group mapping

Status in Ubuntu Cloud Archive:
  Fix Committed
Status in Ubuntu Cloud Archive queens series:
  Fix Committed
Status in Ubuntu Cloud Archive rocky series:
  Fix Committed
Status in Ubuntu Cloud Archive stein series:
  Fix Committed
Status in Ubuntu Cloud Archive train series:
  Fix Released
Status in OpenStack Identity (keystone):
  Fix Released
Status in keystone package in Ubuntu:
  Triaged
Status in keystone source package in Bionic:
  Triaged
Status in keystone source package in Cosmic:
  Triaged
Status in keystone source package in Disco:
  Triaged
Status in keystone source package in Eoan:
  Triaged

Bug description:
  Env Details:
  Openstack version: Queens (17.0.5)
  OS: CentOS 7.5
  LDAP: Active Directory, Windows Server 2012R2

  We changed the user_id_attribute to sAMAccountName when configuring
  keystone. [ user_id_attribute = "sAMAccountName" ;
  group_members_are_ids = False ]. Unfortunately this bricks the group
  mapping logic in keystone.

  The relevant code in keystone:
  `list_users_in_group` [1] -> gets all groups from the LDAP server, and then 
calls `_transform_group_member_ids`. `_transform_group_member_ids` tries to 
match the user ids (for posixGroups e.g.) or the DN. However DN matching does 
not match the full DN. It rather takes the first RDN of the DN and computes the 
keystone user id [2]. The first RDN in Active Directory is the "CN". While the 
user-create part honors the user_id_attribute and takes "sAMAccountName" in our 
configuration. The generated user-ids in keystone now do not match anymore and 
hence group mapping is broken.

  A fix could be looking up the user by the DN received from the
  'member' attribute of a given group and compare the configured
  'user_id_attribute' of the received ldap user id and the in keystone
  stored user id. A quick fix could also be to mention that behavior in
  the documentation.

  /e: related
  https://bugs.launchpad.net/keystone/+bug/1231488/comments/19

  [1]
  
https://github.com/openstack/keystone/blob/master/keystone/identity/backends/ldap/common.py#L1285

  [2]
  
https://github.com/openstack/keystone/blob/master/keystone/identity/backends/ldap/core.py#L126

  [3]
  
https://github.com/openstack/keystone/blob/master/keystone/identity/backends/ldap/common.py#L1296

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-archive/+bug/1782922/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1844479] [NEW] nova-api bug

2019-09-18 Thread wang
Public bug reported:

2019-09-18 14:22:34.586 32942 ERROR nova.api.openstack.wsgi 
InternalServerError: Request Failed: internal server error while processing 
your request.
2019-09-18 14:22:34.586 32942 ERROR nova.api.openstack.wsgi Neutron server 
returns request_ids: ['req-c5bc199c-66e2-45c6-baa2-0d75d3a6df84']
2019-09-18 14:22:34.586 32942 ERROR nova.api.openstack.wsgi 
2019-09-18 14:22:34.592 32942 INFO nova.api.openstack.wsgi 
[req-03cd8a2e-defb-432e-adb9-26d94730fe03 c2161d6eae004cbeb9ded0015e143278 
80dcdc66b0b549a19d31cde810eb636a - default default] HTTP exception thrown: 
Unexpected API Error. Please report this at http://bugs.launchpad.net/nova/ and 
attach the Nova API log if possible.


实例通过ssh远程连接浮点ip,
删除安全组入tcp端口权限,导致程序异常;

** Affects: nova
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1844479

Title:
  nova-api bug

Status in OpenStack Compute (nova):
  New

Bug description:
  2019-09-18 14:22:34.586 32942 ERROR nova.api.openstack.wsgi 
InternalServerError: Request Failed: internal server error while processing 
your request.
  2019-09-18 14:22:34.586 32942 ERROR nova.api.openstack.wsgi Neutron server 
returns request_ids: ['req-c5bc199c-66e2-45c6-baa2-0d75d3a6df84']
  2019-09-18 14:22:34.586 32942 ERROR nova.api.openstack.wsgi 
  2019-09-18 14:22:34.592 32942 INFO nova.api.openstack.wsgi 
[req-03cd8a2e-defb-432e-adb9-26d94730fe03 c2161d6eae004cbeb9ded0015e143278 
80dcdc66b0b549a19d31cde810eb636a - default default] HTTP exception thrown: 
Unexpected API Error. Please report this at http://bugs.launchpad.net/nova/ and 
attach the Nova API log if possible.
  

  实例通过ssh远程连接浮点ip,
  删除安全组入tcp端口权限,导致程序异常;

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1844479/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp