[Yahoo-eng-team] [Bug 1868246] Re: No network after subiquity LPAR installation on s390x with VLAN

2020-04-14 Thread Michael Hudson-Doyle
** Changed in: initramfs-tools (Ubuntu)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to cloud-init.
https://bugs.launchpad.net/bugs/1868246

Title:
  No network after subiquity LPAR installation on s390x with VLAN

Status in cloud-init:
  Invalid
Status in subiquity:
  Fix Released
Status in Ubuntu on IBM z Systems:
  Fix Released
Status in initramfs-tools package in Ubuntu:
  Fix Released

Bug description:
  I tried today an subiquity LPAR installation using the latest ISO (March 19) 
that includes the latest 20.03 subiquity.
  The installation itself completed fine, but after the post-install reboot the 
system didn't had a network active - please note that the LPAR is connected to 
a VLAN.

  $ ip a   
  1: lo:  mtu 65536 qdisc noqueue state UNKNOWN group 
defaul
  t qlen 1000   
  
  link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 
  
  inet 127.0.0.1/8 scope host lo
  
 valid_lft forever preferred_lft forever
  
  inet6 ::1/128 scope host  
  
 valid_lft forever preferred_lft forever
  
  2: encc000:  mtu 1500 qdisc noop state DOWN group 
default q
  len 1000  
  
  link/ether a2:8d:91:85:12:e3 brd ff:ff:ff:ff:ff:ff
  
  3: enP1p0s0:  mtu 1500 qdisc noop state DOWN group 
default 
  qlen 1000 
  
  link/ether 82:0c:2d:0c:b8:70 brd ff:ff:ff:ff:ff:ff
  
  4: enP1p0s0d1:  mtu 1500 qdisc noop state DOWN group 
defaul
  t qlen 1000   
  
  link/ether 82:0c:2d:0c:b8:71 brd ff:ff:ff:ff:ff:ff
  
  5: enP2p0s0:  mtu 1500 qdisc noop state DOWN group 
default 
  qlen 1000 
  
  link/ether 82:0c:2d:0c:b7:00 brd ff:ff:ff:ff:ff:ff
  
  6: enP2p0s0d1:  mtu 1500 qdisc noop state DOWN group 
defaul
  t qlen 1000   
  
  link/ether 82:0c:2d:0c:b7:01 brd ff:ff:ff:ff:ff:ff   

  Wanting to have a look at the netplan config it turned out that there is no 
yaml file:
  $ ls -l /etc/netplan/
  total 0  

  Adding one manually and applying it worked fine.

  So looks like the installer does not properly generate or copy a
  01-netcfg.yaml to /etc/netplan.

  Please see below the entire steps as well as a compressed file with
  the entire content of /var/log

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-init/+bug/1868246/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1854041] Re: Keystone should propagate redirect exceptions from auth plugins

2020-04-14 Thread Colleen Murphy
** Changed in: keystone
   Status: Expired => Confirmed

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1854041

Title:
  Keystone should propagate redirect exceptions from auth plugins

Status in OpenStack Identity (keystone):
  Confirmed

Bug description:
  When a developer is implementing an Authentication plugin [1] they can
  only return None and setup the relevant information in the auth
  context or raise an Unauthorized exception. However, in some cases
  (like an OpenID Connect plugin) it is needed to perform a redirect to
  the provider to complete the flow. IIRC this was possible in the past
  (before moving to Flask) by raising an exception with the proper HTTP
  code set, but with the current implementation this is impossible.

  [1]: https://docs.openstack.org/keystone/latest/contributor/auth-
  plugins.html

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1854041/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1854041] Re: Keystone should propagate redirect exceptions from auth plugins

2020-04-14 Thread Launchpad Bug Tracker
[Expired for OpenStack Identity (keystone) because there has been no
activity for 60 days.]

** Changed in: keystone
   Status: Incomplete => Expired

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1854041

Title:
  Keystone should propagate redirect exceptions from auth plugins

Status in OpenStack Identity (keystone):
  Expired

Bug description:
  When a developer is implementing an Authentication plugin [1] they can
  only return None and setup the relevant information in the auth
  context or raise an Unauthorized exception. However, in some cases
  (like an OpenID Connect plugin) it is needed to perform a redirect to
  the provider to complete the flow. IIRC this was possible in the past
  (before moving to Flask) by raising an exception with the proper HTTP
  code set, but with the current implementation this is impossible.

  [1]: https://docs.openstack.org/keystone/latest/contributor/auth-
  plugins.html

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1854041/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1857468] Re: Unable to set apt_preferences(5) parameter during maas-enlisting-node phase

2020-04-14 Thread Launchpad Bug Tracker
[Expired for cloud-init because there has been no activity for 60 days.]

** Changed in: cloud-init
   Status: Incomplete => Expired

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to cloud-init.
https://bugs.launchpad.net/bugs/1857468

Title:
  Unable to set apt_preferences(5) parameter during maas-enlisting-node
  phase

Status in cloud-init:
  Expired
Status in MAAS:
  Expired

Bug description:
  During the maas-enlisting-node phase, cloud init tries to run an 'apt-
  get update' and it fails because of an error as given below:

  2019-12-18T06:08:39+00:00 maas-enlisting-node cloud-init[2655]: Get:4 
http:///ubuntu bionic-security InRelease [10.1 kB]
  2019-12-18T06:08:39+00:00 maas-enlisting-node cloud-init[2655]: Err:5 
http:///ubuntu bionic-backports Release
  2019-12-18T06:08:39+00:00 maas-enlisting-node cloud-init[2655]:   404  Not 
Found [IP: 32.68.226.74 80]
  2019-12-18T06:08:40+00:00 maas-enlisting-node cloud-init[2655]: Reading 
package lists...
  2019-12-18T06:08:40+00:00 maas-enlisting-node cloud-init[2655]: E: The 
repository 'http:///ubuntu bionic-backports Release' does not have a 
Release file.
  2019-12-18T06:08:40+00:00 maas-enlisting-node cloud-init[2655]: E: Repository 
'http:///ubuntu bionic InRelease' changed its 'Label' value from 
'Ubuntu' to 'ubuntu bionic'
  2019-12-18T06:08:40+00:00 maas-enlisting-node cloud-init[2655]: E: Repository 
'http:///ubuntu bionic-updates InRelease' changed its 'Label' value 
from 'Ubuntu' to 'ubuntu bionic-updates'
  2019-12-18T06:08:40+00:00 maas-enlisting-node cloud-init[2655]: E: Repository 
'http:///ubuntu bionic-updates InRelease' changed its 'Codename' 
value from 'bionic' to 'bionic-updates'
  2019-12-18T06:08:40+00:00 maas-enlisting-node cloud-init[2655]: E: Repository 
'http:///ubuntu bionic-security InRelease' changed its 'Label' value 
from 'Ubuntu' to 'ubuntu bionic-security'
  2019-12-18T06:08:40+00:00 maas-enlisting-node cloud-init[2655]: E: Repository 
'http:///ubuntu bionic-security InRelease' changed its 'Codename' 
value from 'bionic' to 'bionic-security'

  
  apt has an option to to ignore this error by providing a parameter 
-"--allow-releaseinfo-change", however I am unable to set this parameter in 
maas. Is there a place in the code or in the cloud init phase where we can set 
this option to avoid the above error? If not then would it make sense to add 
such functionality?

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-init/+bug/1857468/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1857468] Re: Unable to set apt_preferences(5) parameter during maas-enlisting-node phase

2020-04-14 Thread Launchpad Bug Tracker
[Expired for MAAS because there has been no activity for 60 days.]

** Changed in: maas
   Status: Incomplete => Expired

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to cloud-init.
https://bugs.launchpad.net/bugs/1857468

Title:
  Unable to set apt_preferences(5) parameter during maas-enlisting-node
  phase

Status in cloud-init:
  Expired
Status in MAAS:
  Expired

Bug description:
  During the maas-enlisting-node phase, cloud init tries to run an 'apt-
  get update' and it fails because of an error as given below:

  2019-12-18T06:08:39+00:00 maas-enlisting-node cloud-init[2655]: Get:4 
http:///ubuntu bionic-security InRelease [10.1 kB]
  2019-12-18T06:08:39+00:00 maas-enlisting-node cloud-init[2655]: Err:5 
http:///ubuntu bionic-backports Release
  2019-12-18T06:08:39+00:00 maas-enlisting-node cloud-init[2655]:   404  Not 
Found [IP: 32.68.226.74 80]
  2019-12-18T06:08:40+00:00 maas-enlisting-node cloud-init[2655]: Reading 
package lists...
  2019-12-18T06:08:40+00:00 maas-enlisting-node cloud-init[2655]: E: The 
repository 'http:///ubuntu bionic-backports Release' does not have a 
Release file.
  2019-12-18T06:08:40+00:00 maas-enlisting-node cloud-init[2655]: E: Repository 
'http:///ubuntu bionic InRelease' changed its 'Label' value from 
'Ubuntu' to 'ubuntu bionic'
  2019-12-18T06:08:40+00:00 maas-enlisting-node cloud-init[2655]: E: Repository 
'http:///ubuntu bionic-updates InRelease' changed its 'Label' value 
from 'Ubuntu' to 'ubuntu bionic-updates'
  2019-12-18T06:08:40+00:00 maas-enlisting-node cloud-init[2655]: E: Repository 
'http:///ubuntu bionic-updates InRelease' changed its 'Codename' 
value from 'bionic' to 'bionic-updates'
  2019-12-18T06:08:40+00:00 maas-enlisting-node cloud-init[2655]: E: Repository 
'http:///ubuntu bionic-security InRelease' changed its 'Label' value 
from 'Ubuntu' to 'ubuntu bionic-security'
  2019-12-18T06:08:40+00:00 maas-enlisting-node cloud-init[2655]: E: Repository 
'http:///ubuntu bionic-security InRelease' changed its 'Codename' 
value from 'bionic' to 'bionic-security'

  
  apt has an option to to ignore this error by providing a parameter 
-"--allow-releaseinfo-change", however I am unable to set this parameter in 
maas. Is there a place in the code or in the cloud init phase where we can set 
this option to avoid the above error? If not then would it make sense to add 
such functionality?

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-init/+bug/1857468/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1872836] [NEW] Swap file creation broken due to incorrect format specifiers

2020-04-14 Thread Jeremy Norris
Public bug reported:

Swap file creation currently fails with the following error:
cc_mounts.py[WARNING]: failed to setup swap: %d format: a number is required, 
not str

This appears to be fallout from changes from this commit:
https://github.com/canonical/cloud-init/commit/6603706
https://github.com/canonical/cloud-init/pull/70

It appears several '%d' format specifiers are being incorrectly paired
with a string type variable instead of number type variable.

** Affects: cloud-init
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to cloud-init.
https://bugs.launchpad.net/bugs/1872836

Title:
  Swap file creation broken due to incorrect format specifiers

Status in cloud-init:
  New

Bug description:
  Swap file creation currently fails with the following error:
  cc_mounts.py[WARNING]: failed to setup swap: %d format: a number is required, 
not str

  This appears to be fallout from changes from this commit:
  https://github.com/canonical/cloud-init/commit/6603706
  https://github.com/canonical/cloud-init/pull/70

  It appears several '%d' format specifiers are being incorrectly paired
  with a string type variable instead of number type variable.

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-init/+bug/1872836/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1872813] Re: cloud-init fails to detect iSCSI root on focal Oracle instances

2020-04-14 Thread Dan Watkins
** Also affects: open-iscsi (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: cloud-init
   Status: In Progress => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to cloud-init.
https://bugs.launchpad.net/bugs/1872813

Title:
  cloud-init fails to detect iSCSI root on focal Oracle instances

Status in cloud-init:
  Invalid
Status in open-iscsi package in Ubuntu:
  New

Bug description:
  Currently focal images on Oracle are failing to get data from the
  Oracle DS with this traceback:

  Traceback (most recent call last):
File "/usr/lib/python3/dist-packages/cloudinit/sources/__init__.py", line 
772, in find_source
  if s.update_metadata([EventType.BOOT_NEW_INSTANCE]):
File "/usr/lib/python3/dist-packages/cloudinit/sources/__init__.py", line 
661, in update_metadata
  result = self.get_data()
File "/usr/lib/python3/dist-packages/cloudinit/sources/__init__.py", line 
279, in get_data
  return_value = self._get_data()
File 
"/usr/lib/python3/dist-packages/cloudinit/sources/DataSourceOracle.py", line 
195, in _get_data
  with dhcp.EphemeralDHCPv4(net.find_fallback_nic()):
File "/usr/lib/python3/dist-packages/cloudinit/net/dhcp.py", line 57, in 
__enter__
  return self.obtain_lease()
File "/usr/lib/python3/dist-packages/cloudinit/net/dhcp.py", line 109, in 
obtain_lease
  ephipv4.__enter__()
File "/usr/lib/python3/dist-packages/cloudinit/net/__init__.py", line 1019, 
in __enter__
  self._bringup_static_routes()
File "/usr/lib/python3/dist-packages/cloudinit/net/__init__.py", line 1071, 
in _bringup_static_routes
  util.subp(
File "/usr/lib/python3/dist-packages/cloudinit/util.py", line 2084, in subp
  raise ProcessExecutionError(stdout=out, stderr=err,
  cloudinit.util.ProcessExecutionError: Unexpected error while running command.
  Command: ['ip', '-4', 'route', 'add', '0.0.0.0/0', 'via', '10.0.0.1', 'dev', 
'ens3']
  Exit code: 2
  Reason: -
  Stdout: 
  Stderr: RTNETLINK answers: File exists

  
  In 
https://github.com/canonical/cloud-init/blob/46cf23c28812d3e3ba0c570defd9a05628af5556/cloudinit/sources/DataSourceOracle.py#L194-L198,
 we can see that this path is only taken if _is_iscsi_root returns False.

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-init/+bug/1872813/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1872813] [NEW] cloud-init fails to detect iSCSI root on focal Oracle instances

2020-04-14 Thread Dan Watkins
Public bug reported:

Currently focal images on Oracle are failing to get data from the Oracle
DS with this traceback:

Traceback (most recent call last):
  File "/usr/lib/python3/dist-packages/cloudinit/sources/__init__.py", line 
772, in find_source
if s.update_metadata([EventType.BOOT_NEW_INSTANCE]):
  File "/usr/lib/python3/dist-packages/cloudinit/sources/__init__.py", line 
661, in update_metadata
result = self.get_data()
  File "/usr/lib/python3/dist-packages/cloudinit/sources/__init__.py", line 
279, in get_data
return_value = self._get_data()
  File "/usr/lib/python3/dist-packages/cloudinit/sources/DataSourceOracle.py", 
line 195, in _get_data
with dhcp.EphemeralDHCPv4(net.find_fallback_nic()):
  File "/usr/lib/python3/dist-packages/cloudinit/net/dhcp.py", line 57, in 
__enter__
return self.obtain_lease()
  File "/usr/lib/python3/dist-packages/cloudinit/net/dhcp.py", line 109, in 
obtain_lease
ephipv4.__enter__()
  File "/usr/lib/python3/dist-packages/cloudinit/net/__init__.py", line 1019, 
in __enter__
self._bringup_static_routes()
  File "/usr/lib/python3/dist-packages/cloudinit/net/__init__.py", line 1071, 
in _bringup_static_routes
util.subp(
  File "/usr/lib/python3/dist-packages/cloudinit/util.py", line 2084, in subp
raise ProcessExecutionError(stdout=out, stderr=err,
cloudinit.util.ProcessExecutionError: Unexpected error while running command.
Command: ['ip', '-4', 'route', 'add', '0.0.0.0/0', 'via', '10.0.0.1', 'dev', 
'ens3']
Exit code: 2
Reason: -
Stdout: 
Stderr: RTNETLINK answers: File exists


In 
https://github.com/canonical/cloud-init/blob/46cf23c28812d3e3ba0c570defd9a05628af5556/cloudinit/sources/DataSourceOracle.py#L194-L198,
 we can see that this path is only taken if _is_iscsi_root returns False.

** Affects: cloud-init
 Importance: Undecided
 Assignee: Dan Watkins (daniel-thewatkins)
 Status: In Progress

** Changed in: cloud-init
 Assignee: (unassigned) => Dan Watkins (daniel-thewatkins)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to cloud-init.
https://bugs.launchpad.net/bugs/1872813

Title:
  cloud-init fails to detect iSCSI root on focal Oracle instances

Status in cloud-init:
  In Progress

Bug description:
  Currently focal images on Oracle are failing to get data from the
  Oracle DS with this traceback:

  Traceback (most recent call last):
File "/usr/lib/python3/dist-packages/cloudinit/sources/__init__.py", line 
772, in find_source
  if s.update_metadata([EventType.BOOT_NEW_INSTANCE]):
File "/usr/lib/python3/dist-packages/cloudinit/sources/__init__.py", line 
661, in update_metadata
  result = self.get_data()
File "/usr/lib/python3/dist-packages/cloudinit/sources/__init__.py", line 
279, in get_data
  return_value = self._get_data()
File 
"/usr/lib/python3/dist-packages/cloudinit/sources/DataSourceOracle.py", line 
195, in _get_data
  with dhcp.EphemeralDHCPv4(net.find_fallback_nic()):
File "/usr/lib/python3/dist-packages/cloudinit/net/dhcp.py", line 57, in 
__enter__
  return self.obtain_lease()
File "/usr/lib/python3/dist-packages/cloudinit/net/dhcp.py", line 109, in 
obtain_lease
  ephipv4.__enter__()
File "/usr/lib/python3/dist-packages/cloudinit/net/__init__.py", line 1019, 
in __enter__
  self._bringup_static_routes()
File "/usr/lib/python3/dist-packages/cloudinit/net/__init__.py", line 1071, 
in _bringup_static_routes
  util.subp(
File "/usr/lib/python3/dist-packages/cloudinit/util.py", line 2084, in subp
  raise ProcessExecutionError(stdout=out, stderr=err,
  cloudinit.util.ProcessExecutionError: Unexpected error while running command.
  Command: ['ip', '-4', 'route', 'add', '0.0.0.0/0', 'via', '10.0.0.1', 'dev', 
'ens3']
  Exit code: 2
  Reason: -
  Stdout: 
  Stderr: RTNETLINK answers: File exists

  
  In 
https://github.com/canonical/cloud-init/blob/46cf23c28812d3e3ba0c570defd9a05628af5556/cloudinit/sources/DataSourceOracle.py#L194-L198,
 we can see that this path is only taken if _is_iscsi_root returns False.

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-init/+bug/1872813/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1872792] [NEW] Feature request: Toggle required fields in angular launch instance workflow

2020-04-14 Thread Gabriel Ramirez
Public bug reported:

Nn Project -> instances -> Launch instance wizard, would like the
ability to toggle the required fields, e.g. an ability to flag the
'Configuration' widget with a * so that a user would have to fill this
form out and enter a metadata customization script

** Affects: horizon
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1872792

Title:
  Feature request: Toggle required fields in angular launch instance
  workflow

Status in OpenStack Dashboard (Horizon):
  New

Bug description:
  Nn Project -> instances -> Launch instance wizard, would like the
  ability to toggle the required fields, e.g. an ability to flag the
  'Configuration' widget with a * so that a user would have to fill this
  form out and enter a metadata customization script

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1872792/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1869697] Re: The instance supports USB devices.

2020-04-14 Thread Balazs Gibizer
Nova handles new feature request through launchpad blueprints. Please
follow the process described in[1], e.g. open a blueprint in launchpad
and push a specification according the the spec template to the
openstack/nova-specs repository.

[1]https://docs.openstack.org/nova/latest/contributor/blueprints.html

** Changed in: nova
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1869697

Title:
  The instance  supports USB devices.

Status in OpenStack Compute (nova):
  Invalid

Bug description:
  Description
  ===
  OpenStack instance can realize the USB transmission function of the server 
and realize the data transmission.Realize the support of virtual machine to usb 
device, that is, add, delete and check the function of usb device.

  Rebuild, resize, delete, migrate/live-migrate, and evacuate operations
  on the virtual machine will also require additional processing logic.

  The number of connected usb devices and compatibility with different
  usb protocols (1.0/2.0/3.0) are also considered.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1869697/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1869674] Re: Unit Test test_no_migrations_have_downgrade failing execution

2020-04-14 Thread Balazs Gibizer
I feel this is part of a bigger development effort (supporting usb for
nova instances?). Please propose a blueprint / spec for your feature
first where we can discuss the general idea of your feature. Then when
you need actual development help please propose the actual coded, where
you got stuck, to gerrit. Then join the #openstack-nova IRC channel on
freenode where the nova developers hang and ask for help.

** Changed in: nova
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1869674

Title:
  Unit Test  test_no_migrations_have_downgrade failing execution

Status in OpenStack Compute (nova):
  Invalid

Bug description:
  Description
  ===
  Nova_api newly added a table, but when performing unit tests' tox - epy27 
'methods' test_no_migrations_have_downgrade' error.

  instance_usb.py

  # def downgrade(migrate_engine):
  # meta = MetaData(migrate_engine)
  # meta.reflect(migrate_engine)
  # 
  # table_names = ['instance_usb']
  # for t in table_names:
  # table = Table(t, meta)
  # table.drop(checkfirst=True)

  
  def upgrade(migrate_engine):
  meta = MetaData()
  meta.bind = migrate_engine

  instance_usb = Table('instance_usb', meta,
  Column('instance_uuid',
 String(length=36),
 nullable=False),
  Column('vendor_id',
 String(length=255)),
  Column('product_id',
 String(length=255)),
  Column('id',
 Integer,
 primary_key=True,
 autoincrement=True),
  Column('created_at',
 DateTime),
  Column('updated_at',
 DateTime),
  Column('deleted_at',
 DateTime),
  Column('deleted',
 Boolean),
  PrimaryKeyConstraint(
 'id',
 name="uniq_instance_usb0id"),
  mysql_engine='InnoDB',
  mysql_charset='utf8')
  instance_usb.create(checkfirst=True)

  Environment
  ===
  openstack-Rocky

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1869674/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1872753] [NEW] Updating EC2 credential blob can lead to a ec2 credential id / credential id mismatch

2020-04-14 Thread kay
Public bug reported:

Updating ec2 credential blob field via "openstack credential update"
allows to update the EC2 credential access ID. Considering that EC2
credential access ID is used to calculate an ID of the "credential"
(https://github.com/openstack/keystone/blob/7bb6314e40d6947294260324e84a58de191f8609/keystone/api/users.py#L363,
https://github.com/openstack/keystone/blob/7bb6314e40d6947294260324e84a58de191f8609/keystone/common/utils.py#L101),
the update action doesn't update the actual credential ID using a new
access ID sha256sum. It can lead to orphaned ec2 credentials in the
database.

** Affects: keystone
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1872753

Title:
  Updating EC2 credential blob can lead to a ec2 credential id /
  credential id mismatch

Status in OpenStack Identity (keystone):
  New

Bug description:
  Updating ec2 credential blob field via "openstack credential update"
  allows to update the EC2 credential access ID. Considering that EC2
  credential access ID is used to calculate an ID of the "credential"
  
(https://github.com/openstack/keystone/blob/7bb6314e40d6947294260324e84a58de191f8609/keystone/api/users.py#L363,
  
https://github.com/openstack/keystone/blob/7bb6314e40d6947294260324e84a58de191f8609/keystone/common/utils.py#L101),
  the update action doesn't update the actual credential ID using a new
  access ID sha256sum. It can lead to orphaned ec2 credentials in the
  database.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1872753/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1766485] Re: Support locking user password

2020-04-14 Thread OpenStack Infra
Reviewed:  https://review.opendev.org/630663
Committed: 
https://git.openstack.org/cgit/openstack/horizon/commit/?id=7f849239eadfe3d97c088b77eae4d4852c0ab842
Submitter: Zuul
Branch:master

commit 7f849239eadfe3d97c088b77eae4d4852c0ab842
Author: vmarkov 
Date:   Tue May 15 17:04:47 2018 +0300

Support for Keystone password_lock option

This feature was added in Keystone V3 API. Proposed patch adds support
to Horizon

Co-Authored-By: Ivan Kolodyazhny 
Closes-bug: #1766485
Change-Id: Ic20a58c76826d703b43fa6a2d77ae5f77dcda1f4


** Changed in: horizon
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1766485

Title:
  Support locking user password

Status in OpenStack Dashboard (Horizon):
  Fix Released

Bug description:
  Change https://review.openstack.org/#/c/559438/ (related bug 1755874)
  introduced concept of locking user password from changing via self
  service in Keystone V3 API.

  Horizon should implement support for changing this user option too.

  Sibling story for python-openstackclient
  https://storyboard.openstack.org/#!/story/2001906

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1766485/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1872747] [NEW] Unexpected API Error

2020-04-14 Thread Bilal Imtiaz
Public bug reported:

HI Team,

I just finished my minimum openstack Train installation on
virtual box by taking step by step help from

https://docs.openstack.org/install-guide/

When I reached at creating a VM with cirros image, got below error:


Unexpected API Error. Please report this at http://bugs.launchpad.net/nova/ and 
attach the Nova API log if possible.
 (HTTP 500) (Request-ID: 
req-e99b1405-5a96-4842-bd7a-2a6c8f5c6b46)


Storage type:  LVM
Network type: Neutron with OpenVSwitch

** Affects: nova
 Importance: Undecided
 Status: New


** Tags: api

** Attachment added: "logs.zip"
   https://bugs.launchpad.net/bugs/1872747/+attachment/5353872/+files/logs.zip

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1872747

Title:
  Unexpected API Error

Status in OpenStack Compute (nova):
  New

Bug description:
  HI Team,

  I just finished my minimum openstack Train installation on
  virtual box by taking step by step help from

  https://docs.openstack.org/install-guide/

  When I reached at creating a VM with cirros image, got below error:

  
  Unexpected API Error. Please report this at http://bugs.launchpad.net/nova/ 
and attach the Nova API log if possible.
   (HTTP 500) 
(Request-ID: req-e99b1405-5a96-4842-bd7a-2a6c8f5c6b46)

  
  Storage type:  LVM
  Network type: Neutron with OpenVSwitch

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1872747/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1871806] Re: The information about auth type (Internal, External auth) is not available when rendering openrc files in horizon

2020-04-14 Thread OpenStack Infra
Reviewed:  https://review.opendev.org/718379
Committed: 
https://git.openstack.org/cgit/openstack/horizon/commit/?id=086c6607ef7834c308dcc58e74349293b7685ac1
Submitter: Zuul
Branch:master

commit 086c6607ef7834c308dcc58e74349293b7685ac1
Author: Ivan Kolodyazhny 
Date:   Wed Apr 8 13:23:29 2020 +0300

Add auth_type to template context for openrc file rendering

We need to path auth_type value to the template because different
templates could be rendered for credentials and websso auth_type.

Closes-Bug: #1871806
Change-Id: If218813e0b4a8cc51c4e590081c5f3c50b35b8a7


** Changed in: horizon
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1871806

Title:
  The information about auth type (Internal, External auth) is not
  available when rendering openrc files in horizon

Status in OpenStack Dashboard (Horizon):
  Fix Released

Bug description:
  The authorization method might be checked during horizon login,
  however this info is not available when rendering openrc templates
  [1]. Without ths information we can't customize templates [1] to get
  them working both for websso and login/password authenticated users

  [1] 
https://opendev.org/openstack/horizon/src/branch/master/openstack_dashboard/dashboards/project/api_access/views.py#L72
  [2] 
https://docs.openstack.org/horizon/latest/configuration/settings.html#openstack-clouds-yaml-custom-template

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1871806/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1808814] Re: admin docs: interoperable image import revision for stein

2020-04-14 Thread OpenStack Infra
Reviewed:  https://review.opendev.org/717873
Committed: 
https://git.openstack.org/cgit/openstack/glance/commit/?id=30f821c62416aa79d98c0c79b81bb981eb49155f
Submitter: Zuul
Branch:master

commit 30f821c62416aa79d98c0c79b81bb981eb49155f
Author: khashf 
Date:   Mon Apr 6 15:20:13 2020 -0700

Revise admin interoperable image import docs

This patch revises the documentation of the interoperable image import
feature available to admin operators to concisely describe Stein and
later releases.

Changes include:
- Remove enable_image_import option because it is no longer available
  since the release of Stein
- Simplify the language of the v1 API being deprecated

Change-Id: Ic155afd6de5b37a25743457e9a7ddd5a45dac4e8
Closes-Bug: #1808814


** Changed in: glance
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Glance.
https://bugs.launchpad.net/bugs/1808814

Title:
  admin docs: interoperable image import revision for stein

Status in Glance:
  Fix Released

Bug description:
  https://docs.openstack.org/glance/latest/admin/interoperable-image-
  import.html

  The image import docs need a revision.  I noticed these, there may be
  more:

  * remove mention of enable_image_import option and its effect on the
  v2.6 API

  * probably leave in the mention of the v1 copy-from (so it's clear
  that the OSSN doesn't apply to web-download), but change language of
  the v1 API being deprecated to simply, "Additionally, the Image API v1
  was removed in Glance 17.0.0 (Rocky)."

To manage notifications about this bug go to:
https://bugs.launchpad.net/glance/+bug/1808814/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1870336] Re: Update 'common image properties' doc

2020-04-14 Thread OpenStack Infra
Reviewed:  https://review.opendev.org/718287
Committed: 
https://git.openstack.org/cgit/openstack/glance/commit/?id=984e844c6ab3b365f5104e36429bda0ebd5e9a9d
Submitter: Zuul
Branch:master

commit 984e844c6ab3b365f5104e36429bda0ebd5e9a9d
Author: khashf 
Date:   Tue Apr 7 17:44:39 2020 -0700

Update 'common image properties' doc

Update doc/source/user/common-image-properties.rst (live link [1]) to be
in sync with etc/schema-image.json

This patch does 2 actions:
1. Add the missing properties that are in etc/schema-image.json to
   the doc
2. Rearrange the order of appearance of properties in the doc to be
   the same as they appear in etc/schema-image.json

[1] docs.openstack.org/glance/latest/user/common-image-properties.html

Change-Id: I840f3cbeda28da8b02dd141fde582c9110aeb21e
Closes-bug: #1870336


** Changed in: glance
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Glance.
https://bugs.launchpad.net/bugs/1870336

Title:
  Update 'common image properties' doc

Status in Glance:
  Fix Released

Bug description:
  This doc:

  https://opendev.org/openstack/glance/src/branch/master/doc/source/user
  /common-image-properties.rst

  has gotten out of sync with the actual list of properties:

  https://opendev.org/openstack/glance/src/branch/master/etc/schema-
  image.json

To manage notifications about this bug go to:
https://bugs.launchpad.net/glance/+bug/1870336/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1872730] [NEW] Delete ARQs for an instance when the instance is deleted only delete bound arqs

2020-04-14 Thread sean mooney
Public bug reported:

During development of the cyborg integration with nova the patch that
Delete ARQs for an instance when the instance is deleted
Icb95890d8f16cad1f7dc18487a48def2f7c9aec2 failed to do so in some cases
as noted in 
https://review.opendev.org/#/c/673735/46/nova/conductor/manager.py@1632

if the arq are successfully created in the conductor and then the binding fails 
those
arqs would be leaked as they never entered the bound state. As a result if the 
instance was deleted 
the ARQs that were created for the instance but not bound would not be deleted 
when the instance bound ARQs are clean up.

This bug tracks addressing that edge case.

** Affects: nova
 Importance: High
 Status: Triaged

** Affects: nova/ussuri
 Importance: High
 Status: Triaged


** Tags: conductor cyborg ussuri-backport-potential

** Also affects: nova/ussuri
   Importance: High
   Status: Triaged

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1872730

Title:
  Delete ARQs for an instance when the instance is deleted only delete
  bound arqs

Status in OpenStack Compute (nova):
  Triaged
Status in OpenStack Compute (nova) ussuri series:
  Triaged

Bug description:
  During development of the cyborg integration with nova the patch that
  Delete ARQs for an instance when the instance is deleted
  Icb95890d8f16cad1f7dc18487a48def2f7c9aec2 failed to do so in some cases
  as noted in 
https://review.opendev.org/#/c/673735/46/nova/conductor/manager.py@1632

  if the arq are successfully created in the conductor and then the binding 
fails those
  arqs would be leaked as they never entered the bound state. As a result if 
the instance was deleted 
  the ARQs that were created for the instance but not bound would not be 
deleted when the instance bound ARQs are clean up.

  This bug tracks addressing that edge case.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1872730/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1872732] [NEW] no user limit of ec2 credentials

2020-04-14 Thread Maurice Escher
Public bug reported:

Hi,

similar to application credentials, I would like to have the possibility to 
limit the maximum number of ec2 credentials a user can have to avoid a bloat in 
the
keystone database or open keystone to a DoS attack.

Thanks,
Maurice

** Affects: keystone
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1872732

Title:
  no user limit of ec2 credentials

Status in OpenStack Identity (keystone):
  New

Bug description:
  Hi,

  similar to application credentials, I would like to have the possibility to 
limit the maximum number of ec2 credentials a user can have to avoid a bloat in 
the
  keystone database or open keystone to a DoS attack.

  Thanks,
  Maurice

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1872732/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1869184] Re: Poor LUKSv1 performance when using native QEMU decryption and RBD volumes

2020-04-14 Thread OpenStack Infra
Reviewed:  https://review.opendev.org/708029
Committed: 
https://git.openstack.org/cgit/openstack/nova/commit/?id=7c7a25aa1eda9b1815f12cce25dda0a840d562f1
Submitter: Zuul
Branch:master

commit 7c7a25aa1eda9b1815f12cce25dda0a840d562f1
Author: Lee Yarwood 
Date:   Sat Feb 15 12:24:11 2020 +

workarounds: Add option to locally attach RBD volumes on compute hosts

Building on the ``[workarounds]/disable_native_luksv1``
configurable introduced in Ia500eb614cf575ab846f64f4b69c9068274c8c1f
this change introduces another workaround configurable that when enabled
will connect RBD volumes to the compute host as block devices using
os-brick.

When used togther both options allow operators to workaround recently
discovered performance issues in the libgcrypt library used by QEMU when
natively decrypting LUKSv1 encrypted disks.

For now the extend_volume method raises a NotImplemented error in-line
with the underlying method in os-brick. Future work will be required to
both support this in os-brick and wire up the required calls in the
volume driver.

This workaround is temporary and will be removed during the W release
once all impacted distributions have been able to update their versions
of the libgcrypt library.

Finally os-brick 3.0.1 is now required as it provides the
Id507109df80391699074773f4787f74507c4b882 fix when attempting to
diconnect locally attached RBD volumes.

Closes-Bug: #1869184
Change-Id: Ied3732042738a6194b635c55e0304d71a6fb66e3


** Changed in: nova
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1869184

Title:
  Poor LUKSv1 performance when using native QEMU decryption and RBD
  volumes

Status in OpenStack Compute (nova):
  Fix Released

Bug description:
  Description
  ===

  This bug specifically covers the RBD use case when dealing with bug
  #1869182.

  In addition to allowing operators to switch to the os-brick encryptors
  when decrypting LUKSv1 volumes RBD users will also need to use the RBD
  connector also provided by os-brick.

  This will connect the RBD volume to the host and provide it as a host
  block device, allowing the os-brick encryptors to be layered on top of
  it as with other volume types.

  Steps to reproduce
  ==

  * Attach a LUKSv1 RBD encrypted volume to an instance
  * Test I/O performance within the instance to the volume.

  Expected result
  ===

  Performance is close to baremetal performance using dm-crypt.

  Actual result
  =

  Performance is severely degraded if the libgcrypt issue [1] is not
  resolved on the host.

  Environment
  ===
  1. Exact version of OpenStack you are running. See the following
list for all releases: http://docs.openstack.org/releases/

 Master.

  2. Which hypervisor did you use?
 (For example: Libvirt + KVM, Libvirt + XEN, Hyper-V, PowerKVM, ...)
 What's the version of that?

 libvirt + QEMU/KVM

  2. Which storage type did you use?
 (For example: Ceph, LVM, GPFS, ...)
 What's the version of that?

 RBD - LUKSv1 encryption used.

  3. Which networking type did you use?
 (For example: nova-network, Neutron with OpenVSwitch, ...)

 N/A

  Logs & Configs
  ==

  N/A

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1869184/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1872713] [NEW] Windows library "wmi" is imported but not installed

2020-04-14 Thread Rodolfo Alonso
Public bug reported:

Windows library "wmi" is imported in agent.windows.utils but is not
present in requirements.txt.

** Affects: neutron
 Importance: Undecided
 Assignee: Rodolfo Alonso (rodolfo-alonso-hernandez)
 Status: In Progress

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1872713

Title:
  Windows library "wmi" is imported but not installed

Status in neutron:
  In Progress

Bug description:
  Windows library "wmi" is imported in agent.windows.utils but is not
  present in requirements.txt.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1872713/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1869182] Re: Poor LUKSv1 performance when using native QEMU decryption

2020-04-14 Thread OpenStack Infra
Reviewed:  https://review.opendev.org/708030
Committed: 
https://git.openstack.org/cgit/openstack/nova/commit/?id=dbb58e964ad1821e96f3e6758b3add747339d052
Submitter: Zuul
Branch:master

commit dbb58e964ad1821e96f3e6758b3add747339d052
Author: Lee Yarwood 
Date:   Sat Feb 15 11:33:48 2020 +

workarounds: Add option to disable native LUKSv1 decryption by QEMU

Recently discovered performance issues with the libgcrypt library [1]
mean that operators may wish to avoid the now default native decryption
of LUKSv1 volumes as of I5a0de814f2868f1a4980a69b72b45ee829cedb94.

This change introduces a ``[workarounds]/disable_native_luksv1``
option to disable this native decryption by QEMU, allowing Nova to
fallback to the dm-crypt based os-brick encryptors.

This workaround is temporary and will be removed during the W release
once all impacted distributions have been able to update their
versions of the libgcrypt library.

The _is_luks_v1 method previously used to confirm if a LUKSv1 encryption
provider is being used has been renamed _allow_native_luksv1 and
repurposed to determine if native LUKSv1 decryption by QEMU is allowed.

[1] https://bugzilla.redhat.com/show_bug.cgi?id=1762765

Closes-Bug: #1869182
Change-Id: Ia500eb614cf575ab846f64f4b69c9068274c8c1f


** Changed in: nova
   Status: In Progress => Fix Released

** Bug watch added: Red Hat Bugzilla #1762765
   https://bugzilla.redhat.com/show_bug.cgi?id=1762765

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1869182

Title:
  Poor LUKSv1 performance when using native QEMU decryption

Status in OpenStack Compute (nova):
  Fix Released

Bug description:
  Description
  ===

  LUKSv1 encrypted volumes have been natively decrypted by QEMU since
  I5a0de814f2868f1a4980a69b72b45ee829cedb94. This behaviour is not
  optional at present.

  Recently discovered performance issues within the libgcrypt library
  [1] used by QEMU to decrypt LUKSv1 disks mean that some users may wish
  to disable this feature within the libvirt driver.

  Disabling native decryption by QEMU should result in the original dm-
  crypt approach being taken using encryptors provided from os-brick.

  [1] https://bugzilla.redhat.com/show_bug.cgi?id=1762765

  Steps to reproduce
  ==

  * Attach a LUKSv1 encrypted volume to an instance
  * Test I/O performance within the instance to the volume.

  Expected result
  ===

  Performance is close to baremetal performance using dm-crypt.

  Actual result
  =

  Performance is severely degraded if the libgcrypt issue [1] is not
  resolved on the host.

  Environment
  ===
  1. Exact version of OpenStack you are running. See the following
list for all releases: http://docs.openstack.org/releases/

 Master.

  2. Which hypervisor did you use?
 (For example: Libvirt + KVM, Libvirt + XEN, Hyper-V, PowerKVM, ...)
 What's the version of that?

 libvirt + QEMU/KVM

  2. Which storage type did you use?
 (For example: Ceph, LVM, GPFS, ...)
 What's the version of that?

 N/A - LUKSv1 encryption used.

  3. Which networking type did you use?
 (For example: nova-network, Neutron with OpenVSwitch, ...)

 N/A

  Logs & Configs
  ==

  N/A

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1869182/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1872693] [NEW] Timeout exception in scenario tests with advanced image

2020-04-14 Thread Slawek Kaplonski
Public bug reported:

It seems that sometimes on slow nodes, tests which requires advanced image, 
like e.g. 
neutron_tempest_plugin.scenario.test_multicast.MulticastTestIPv4.test_multicast_between_vms_on_same_network
 or 
neutron_tempest_plugin.scenario.test_trunk.TrunkTest.test_subport_connectivity 
may fail due to global timeout reach.
So we should give some more time for such tests, just to make sure that cleanup 
after test can perform fine and test will not fail in that last phase.

Examples of failure:

Body: None
Response - Headers: {'date': 'Tue, 24 Mar 2020 19:34:39 GMT', 'server': 
'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 
'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 
'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 
'x-openstack-request-id': 'req-f6803ed4-cd44-4aaf-852b-9642166f66fd', 
'x-compute-request-id': 'req-f6803ed4-cd44-4aaf-852b-9642166f66fd', 
'connection': 'close', 'status': '204', 'content-location': 
'https://158.69.70.109/compute/v2.1/servers/6d8abb96-e8de-4833-86f0-2307493e42f9'}
Body: b''
2020-03-24 19:34:41,164 19073 INFO [tempest.lib.common.rest_client] Request 
(MulticastTestIPv4:_run_cleanups): 200 GET 
https://158.69.70.109/compute/v2.1/servers/6d8abb96-e8de-4833-86f0-2307493e42f9 
0.664s
2020-03-24 19:34:41,164 19073 DEBUG[tempest.lib.common.rest_client] Request 
- Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 
'X-Auth-Token': ''}
Body: None
Response - Headers: {'date': 'Tue, 24 Mar 2020 19:34:40 GMT', 'server': 
'Apache/2.4.29 (Ubuntu)', 'content-length': '1636', 'content-type': 
'application/json', 'openstack-api-version': 'compute 2.1', 
'x-openstack-nova-api-version': '2.1', 'vary': 
'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 'x-openstack-request-id': 
'req-9e05c04f-d73f-410e-a593-9732cd0d368b', 'x-compute-request-id': 
'req-9e05c04f-d73f-410e-a593-9732cd0d368b', 'connection': 'close', 'status': 
'200', 'content-location': 
'https://158.69.70.109/compute/v2.1/servers/6d8abb96-e8de-4833-86f0-2307493e42f9'}
Body: b'{"server": {"id": "6d8abb96-e8de-4833-86f0-2307493e42f9", 
"name": "tempest-multicast-server-968193459", "status": "ACTIVE", "tenant_id": 
"1247c419c0bd41bb948eacb87e8bf8e3", "user_id": 
"3b79839ed47d4c95b8f363497a767ff2", "metadata": {}, "hostId": 
"9ee32c342fa222fa161f31fa44b4ad381d7a977bf32d6c6db0070294", "image": {"id": 
"3a21d3c5-44f2-4543-97cd-aee290e1a6a8", "links": [{"rel": "bookmark", "href": 
"https://158.69.70.109/compute/images/3a21d3c5-44f2-4543-97cd-aee290e1a6a8"}]}, 
"flavor": {"id": "d1", "links": [{"rel": "bookmark", "href": 
"https://158.69.70.109/compute/flavors/d1"}]}, "created": 
"2020-03-24T19:24:33Z", "updated": "2020-03-24T19:34:40Z", "addresses": 
{"tempest-test-network--2075552321": [{"version": 4, "addr": "10.1.0.12", 
"OS-EXT-IPS:type": "fixed", "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:e2:f4:69"}, 
{"version": 4, "addr": "172.24.5.147", "OS-EXT-IPS:type": "floating", 
"OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:e2:f4:69"}]}, "accessIPv4": "", 
"accessIPv6": "", "links": [{"rel": "self", "href": 
"https://158.69.70.109/compute/v2.1/servers/6d8abb96-e8de-4833-86f0-2307493e42f9"},
 {"rel": "bookmark", "href": 
"https://158.69.70.109/compute/servers/6d8abb96-e8de-4833-86f0-2307493e42f9"}], 
"OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": 
"nova", "config_drive": "", "key_name": "tempest-keypair-test-913711661", 
"OS-SRV-USG:launched_at": "2020-03-24T19:24:40.00", 
"OS-SRV-USG:terminated_at": null, "security_groups": [{"name": 
"secgroup_mtu"}], "OS-EXT-STS:task_state": "deleting", "OS-EXT-STS:vm_state": 
"active", "OS-EXT-STS:power_state": 1, "os-extended-volumes:volumes_attached": 
[]}}'
2020-03-24 19:34:41,762 19073 INFO [tempest.lib.common.rest_client] Request 
(MulticastTestIPv4:_run_cleanups): 204 DELETE 
https://158.69.70.109/compute/v2.1/servers/fde7c8ae-7fea-4aa9-9f3b-e2d8ac864d4f 
0.322s
2020-03-24 19:34:41,762 19073 DEBUG[tempest.lib.common.rest_client] Request 
- Headers: {'Content-Type': 'application/json', 'Accept': 'application/json', 
'X-Auth-Token': ''}
Body: None
Response - Headers: {'date': 'Tue, 24 Mar 2020 19:34:41 GMT', 'server': 
'Apache/2.4.29 (Ubuntu)', 'content-type': 'application/json', 
'openstack-api-version': 'compute 2.1', 'x-openstack-nova-api-version': '2.1', 
'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', 
'x-openstack-request-id': 'req-06f636f8-ebd2-4974-979b-cf7a81e1f29f', 
'x-compute-request-id': 'req-06f636f8-ebd2-4974-979b-cf7a81e1f29f', 
'connection': 'close', 'status': '204', 'content-location': 
'https://158.69.70.109/compute/v2.1/servers/fde7c8ae-7fea-4aa9-9f3b-e2d8ac864d4f'}
Body: b''
2020-03-24 19:34:42,583 19073 INFO [tempest.lib.common.rest_client] Request 
(MulticastTestIPv4:_run_cleanups): 200 GET 

[Yahoo-eng-team] [Bug 1872663] [NEW] Failing to terminate Windows processes

2020-04-14 Thread Lucian Petrut
Public bug reported:

The neutron Windows exec call helper doesn't properly handle the
situation in which the process that it's trying to kill was already
terminated, in which case using WMI to fetch the process can raise an
exception.

Trace: http://paste.openstack.org/raw/790116/

** Affects: neutron
 Importance: Undecided
 Assignee: Lucian Petrut (petrutlucian94)
 Status: In Progress

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1872663

Title:
  Failing to terminate Windows processes

Status in neutron:
  In Progress

Bug description:
  The neutron Windows exec call helper doesn't properly handle the
  situation in which the process that it's trying to kill was already
  terminated, in which case using WMI to fetch the process can raise an
  exception.

  Trace: http://paste.openstack.org/raw/790116/

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1872663/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp