[Yahoo-eng-team] [Bug 1877229] [NEW] Nova host aggregate cannot sync to placement

2020-05-06 Thread Shi Yan
Public bug reported:

Description
===
We are using the nova stein version.
When adding/removing host from aggregate, nova should sync the host aggregate 
to placement resource provider aggregate as well. But from our test, it is not 
working.

Steps to reproduce
==
1. Check a specific compute node resource provider aggregate
2. Create a new host aggregate and add the compute node into the aggregate
3. Check the compute node resource provider aggregate again to see if the 
additional aggreate is added

(We got the similar error when removing host from an existing aggregate)

Expected result
===
An additional resource provider aggregate for the compute node

Actual result
=
No change.

Logs & Configs
==

from nova-api:

May 07 09:54:06 nova-api nova-api[26742]: 2020-05-07 09:54:06.364 26742
WARNING nova.compute.api [req-b4542212-7a5c-4d81-b602-4702634015b8
c0645ff94b864d3d84c438d9855f9cea 9427903ca1544f0795ba4117d55ed9b2 -
default default] Failed to associate cc2 with a placement aggregate: No
such resource provider cc2.. This may be corrected after running nova-
manage placement sync_aggregates.:
nova.exception.ResourceProviderNotFound: No such resource provider cc2.

Note:
cc2 is the hostname but the name of the resource provider is fqdn(with domain). 
I think that is reason why the resource provider cannot be found.

** Affects: nova
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1877229

Title:
  Nova host aggregate cannot sync to placement

Status in OpenStack Compute (nova):
  New

Bug description:
  Description
  ===
  We are using the nova stein version.
  When adding/removing host from aggregate, nova should sync the host aggregate 
to placement resource provider aggregate as well. But from our test, it is not 
working.

  Steps to reproduce
  ==
  1. Check a specific compute node resource provider aggregate
  2. Create a new host aggregate and add the compute node into the aggregate
  3. Check the compute node resource provider aggregate again to see if the 
additional aggreate is added

  (We got the similar error when removing host from an existing
  aggregate)

  Expected result
  ===
  An additional resource provider aggregate for the compute node

  Actual result
  =
  No change.

  Logs & Configs
  ==

  from nova-api:

  May 07 09:54:06 nova-api nova-api[26742]: 2020-05-07 09:54:06.364
  26742 WARNING nova.compute.api [req-b4542212-7a5c-
  4d81-b602-4702634015b8 c0645ff94b864d3d84c438d9855f9cea
  9427903ca1544f0795ba4117d55ed9b2 - default default] Failed to
  associate cc2 with a placement aggregate: No such resource provider
  cc2.. This may be corrected after running nova-manage placement
  sync_aggregates.: nova.exception.ResourceProviderNotFound: No such
  resource provider cc2.

  Note:
  cc2 is the hostname but the name of the resource provider is fqdn(with 
domain). I think that is reason why the resource provider cannot be found.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1877229/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1873290] Re: OAuth1 request token authorize silently ignores roles parameter

2020-05-06 Thread OpenStack Infra
Reviewed:  https://review.opendev.org/725885
Committed: 
https://git.openstack.org/cgit/openstack/keystone/commit/?id=6c73690f779a42a5c62914b6bc37f0ac2f41a3e3
Submitter: Zuul
Branch:master

commit 6c73690f779a42a5c62914b6bc37f0ac2f41a3e3
Author: Colleen Murphy 
Date:   Thu Apr 16 20:35:46 2020 -0700

Ensure OAuth1 authorized roles are respected

Without this patch, when an OAuth1 request token is authorized with a
limited set of roles, the roles for the access token are ignored when
the user uses it to request a keystone token. This means that user of an
access token can use it to escallate their role assignments beyond what
was authorized by the creator. This patch fixes the issue by ensuring
the token model accounts for an OAuth1-scoped token and correctly
populating the roles for it.

Change-Id: I02f9836fbd4d7e629653977fc341476cfd89859e
Closes-bug: #1873290


** Changed in: keystone
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1873290

Title:
  OAuth1 request token authorize silently ignores roles parameter

Status in OpenStack Identity (keystone):
  Fix Released
Status in OpenStack Security Advisory:
  Fix Released

Bug description:
  Sorry for using "trustor" and "trustee" terms in OAuth1 context, but
  these terms clearly describe users positions.

  OpenStack CLI explicitly requires an OAuth1 "trustor" to specify a
  role for an OAuth1 Access Token:

  $ openstack request token authorize
  usage: openstack request token authorize [-h]
   [-f {json,shell,table,value,yaml}]
   [-c COLUMN] [--noindent]
   [--prefix PREFIX]
   [--max-width ] [--fit-width]
   [--print-empty] --request-key
    --role 
  openstack request token authorize: error: the following arguments are 
required: --request-key, --role

  However a specified role is silently ignored and OAuth1 token gets all
  OAuth1 "trustor" roles.

  
https://github.com/openstack/keystone/blob/7bb6314e40d6947294260324e84a58de191f8609/keystone/api/os_oauth1.py#L287

  As an OAuth1 "trustor" I expect the "trustee" to have only accepted
  roles.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1873290/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1872755] Re: ec2 credential "trust_id" can be updated to null

2020-05-06 Thread Jeremy Stanley
I've set our advisory task to Won't Fix on this one, as no advisory is
required with the fix for bug 1872735 effectively preventing the path to
exploitation.

** Tags added: security

** Information type changed from Public Security to Public

** Changed in: ossa
   Status: Incomplete => Won't Fix

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1872755

Title:
  ec2 credential "trust_id" can be updated to null

Status in OpenStack Identity (keystone):
  In Progress
Status in OpenStack Security Advisory:
  Won't Fix

Bug description:
  Similar to https://bugs.launchpad.net/keystone/+bug/1872733 and
  https://bugs.launchpad.net/keystone/+bug/1872753. If ec2 credentials
  were created within a trust_id scope, it is still possible to set
  these credentials' "trust_id" to "null" using:

  curl -X PATCH 
https://keystone/v3/credentials/3c2b3265350c6da3a18a143fbe975ca4a8ed88a6f8c6dacc2494a5c1287ba66f
 -H 'Accept: application/json' -H 'Content-Type: application/json' -H 
"X-Auth-Token: ***" -d'{
    "credential": {
  "blob": "{\"access\": \"ffe6fc21b47c4d87befc95ad070c3b7a\", \"secret\": 
\"530196cd097e4a7ca9df7258aa89ff0e\", \"trust_id\": null}"
    }
  }'

  Note "null" in blob.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1872755/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1877195] [NEW] [ovn] neutron devstack needs to support openflow15

2020-05-06 Thread Flavio Fernandes
Public bug reported:

OVN has been changed to use OF15  see [1]

Because of that, devstack configuration scripts must be updated to stop using 
the hard coded Openflow13
protocol. Still, we should make this backwards compatible so it remains working 
on potentially older
versions of OVN.

The error you observe in this situation looks like this:

tail -F /opt/stack/logs/ovs-vswitchd.log

2020-05-06T21:04:31.488Z|00482|vconn|WARN|unix#341: version negotiation failed 
(we support version 0x04, peer support
s version 0x06)

To work around this issue on devstack, set the protocol and restart
vswitchd service:

systemctl restart devstack@ovs-vswitchd.service

https://github.com/ovn-
org/ovn/commit/6ec0b82038052866533f12823fe410308b3e457a

** Affects: neutron
 Importance: Undecided
 Assignee: Flavio Fernandes (ffernand)
 Status: In Progress

** Changed in: neutron
 Assignee: (unassigned) => Flavio Fernandes (ffernand)

** Changed in: neutron
   Status: New => In Progress

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1877195

Title:
  [ovn] neutron devstack needs to support openflow15

Status in neutron:
  In Progress

Bug description:
  OVN has been changed to use OF15  see [1]

  Because of that, devstack configuration scripts must be updated to stop using 
the hard coded Openflow13
  protocol. Still, we should make this backwards compatible so it remains 
working on potentially older
  versions of OVN.

  The error you observe in this situation looks like this:

  tail -F /opt/stack/logs/ovs-vswitchd.log

  2020-05-06T21:04:31.488Z|00482|vconn|WARN|unix#341: version negotiation 
failed (we support version 0x04, peer support
  s version 0x06)

  To work around this issue on devstack, set the protocol and restart
  vswitchd service:

  systemctl restart devstack@ovs-vswitchd.service

  https://github.com/ovn-
  org/ovn/commit/6ec0b82038052866533f12823fe410308b3e457a

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1877195/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1877189] [NEW] nova.task_log database records are never deleted

2020-05-06 Thread melanie witt
Public bug reported:

nova.task_log database records are related to the server usage audit log
API [1] which is dependent on the [DEFAULT]/instance_usage_audit config
option being set to True (it defaults to False). Enablement of the
config option causes nova-compute to emit notifications which are
consumed by OpenStack Telemetry. When the config option is enabled,
records will be periodically created in the nova.task_log table. And
there is no cleanup of the records in nova.

I started a ML thread about the server usage audit log API awhile back
[2] and the conclusion was that deprecating or removing the API isn't
practical as there are systems in the wild still using it, so the best
action to take for now is to create a nova-manage command for cleaning
up old nova.task_log records.

I brought up the proposal in a nova meeting [3] and in the nova channel
[4] and the consensus was to treat it as a Wishlist bug so that it can
be backported upstream.

So this is a bug for the work to add a new 'nova-manage db
purge_task_log' command that offers a --before  option.

[1] 
http://eavesdrop.openstack.org/irclogs/%23openstack-nova/%23openstack-nova.2019-09-06.log.html#t2019-09-06T14:19:50
[2] 
http://lists.openstack.org/pipermail/openstack-discuss/2019-September/009245.html
[3] 
http://eavesdrop.openstack.org/meetings/nova/2019/nova.2019-10-17-14.00.log.html#l-306
[4] 
http://eavesdrop.openstack.org/irclogs/%23openstack-nova/%23openstack-nova.2019-10-17.log.html#t2019-10-17T14:54:39

** Affects: nova
 Importance: Wishlist
 Assignee: melanie witt (melwitt)
 Status: Confirmed


** Tags: nova-manage

** Changed in: nova
   Importance: Undecided => Wishlist

** Changed in: nova
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1877189

Title:
  nova.task_log database records are never deleted

Status in OpenStack Compute (nova):
  Confirmed

Bug description:
  nova.task_log database records are related to the server usage audit
  log API [1] which is dependent on the [DEFAULT]/instance_usage_audit
  config option being set to True (it defaults to False). Enablement of
  the config option causes nova-compute to emit notifications which are
  consumed by OpenStack Telemetry. When the config option is enabled,
  records will be periodically created in the nova.task_log table. And
  there is no cleanup of the records in nova.

  I started a ML thread about the server usage audit log API awhile back
  [2] and the conclusion was that deprecating or removing the API isn't
  practical as there are systems in the wild still using it, so the best
  action to take for now is to create a nova-manage command for cleaning
  up old nova.task_log records.

  I brought up the proposal in a nova meeting [3] and in the nova
  channel [4] and the consensus was to treat it as a Wishlist bug so
  that it can be backported upstream.

  So this is a bug for the work to add a new 'nova-manage db
  purge_task_log' command that offers a --before  option.

  [1] 
http://eavesdrop.openstack.org/irclogs/%23openstack-nova/%23openstack-nova.2019-09-06.log.html#t2019-09-06T14:19:50
  [2] 
http://lists.openstack.org/pipermail/openstack-discuss/2019-September/009245.html
  [3] 
http://eavesdrop.openstack.org/meetings/nova/2019/nova.2019-10-17-14.00.log.html#l-306
  [4] 
http://eavesdrop.openstack.org/irclogs/%23openstack-nova/%23openstack-nova.2019-10-17.log.html#t2019-10-17T14:54:39

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1877189/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1872735] Re: EC2 and/or credential endpoints are not protected from a scoped context

2020-05-06 Thread OpenStack Infra
Reviewed:  https://review.opendev.org/725912
Committed: 
https://git.openstack.org/cgit/openstack/ossa/commit/?id=2548f46b0aff357f6c953b30179b4d8e151e4236
Submitter: Zuul
Branch:master

commit 2548f46b0aff357f6c953b30179b4d8e151e4236
Author: Gage Hugo 
Date:   Wed May 6 10:57:15 2020 -0500

Add OSSA-2020-004 (CVEs Pending)

Change-Id: Ide28e91b184edab45d22c47661ad6bb6003dd244
Closes-Bug: #1872735
Closes-Bug: #1872733


** Changed in: ossa
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1872735

Title:
  EC2 and/or credential endpoints are not protected from a scoped
  context

Status in OpenStack Identity (keystone):
  In Progress
Status in OpenStack Security Advisory:
  Fix Released

Bug description:
  Being authorized within a limited scope context, i.e. trust / oauth / 
application credential with a limited role, e.g. "monitoring_viewer" or 
"viewer", it is still possible to create EC2 credentials. User can auth against 
Keystone using EC2 credentials and obtain all project roles
   of a trust/oauth/application_credential owner.

  I prepared a tool to auth against keyston using ec2 credentials:
  https://github.com/kayrus/ec2auth

  * auth against keystone using trust/oauth/application_credential credentials
  * issue ec2 credentials: "openstack ec2 credentials create"
  * authenticate against keystone using ec2 credentials: "ec2auth --access 
7522162ced8f4e3eb9502168ef199584 --secret c558d9401a694377a83ce910e5a5 
--debug"

  You'll see that returned token contains all owner roles.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1872735/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1872733] Re: Keystone V3 /credentials endpoint policy logic allows to change credentials owner or target project ID

2020-05-06 Thread OpenStack Infra
Reviewed:  https://review.opendev.org/725912
Committed: 
https://git.openstack.org/cgit/openstack/ossa/commit/?id=2548f46b0aff357f6c953b30179b4d8e151e4236
Submitter: Zuul
Branch:master

commit 2548f46b0aff357f6c953b30179b4d8e151e4236
Author: Gage Hugo 
Date:   Wed May 6 10:57:15 2020 -0500

Add OSSA-2020-004 (CVEs Pending)

Change-Id: Ide28e91b184edab45d22c47661ad6bb6003dd244
Closes-Bug: #1872735
Closes-Bug: #1872733


** Changed in: ossa
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1872733

Title:
  Keystone V3 /credentials endpoint policy logic allows to change
  credentials owner or target project ID

Status in OpenStack Identity (keystone):
  In Progress
Status in OpenStack Security Advisory:
  Fix Released

Bug description:
  "_build_target_enforcement" function checks only for "credential_id":
  
https://github.com/openstack/keystone/blob/7bb6314e40d6947294260324e84a58de191f8609/keystone/api/credentials.py#L38

  Thus even having a '"identity:update_credential": "rule:cloud_admin or
  (user_id:%(target.credential.user_id)s)"' policy doesn't prevent a
  malicious user to create an EC2 credential, then change its owner and
  project ID, e.g.:

  curl -X PATCH 
https://keystone/v3/credentials/3c2b3265350c6da3a18a143fbe975ca4a8ed88a6f8c6dacc2494a5c1287ba66f
 -H 'Accept: application/json' -H 'Content-Type: application/json' -H 
"X-Auth-Token: ***" -d'{
    "credential": {
  "project_id": "_target_project_id_",
  "user_id": "_target_user_id_"
    }
  }'

  Additionally it is possible to Create a credential with any existing
  project_id, though it doesn't have a serious security issue, e.g.:

  {
    "credential": {
  "blob": "{\"access\": \"ffe6fc21b47c4d87befc95ad070c3b7a\", \"secret\": 
\"530196cd097e4a7ca9df7258aa89ff0e\", \"trust_id\": null}",
  "id": "3c2b3265350c6da3a18a143fbe975ca4a8ed88a6f8c6dacc2494a5c1287ba66f",
  "project_id": "_any_project_id_",
  "type": "ec2",
  "user_id": "_my_user_id_"
    }
  }

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1872733/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1873290] Re: OAuth1 request token authorize silently ignores roles parameter

2020-05-06 Thread OpenStack Infra
Reviewed:  https://review.opendev.org/725917
Committed: 
https://git.openstack.org/cgit/openstack/ossa/commit/?id=3696964abeeef77b725d452b1cda8c79568d5ad0
Submitter: Zuul
Branch:master

commit 3696964abeeef77b725d452b1cda8c79568d5ad0
Author: Gage Hugo 
Date:   Wed May 6 11:06:58 2020 -0500

Add OSSA-2020-005 (CVE Pending)

Change-Id: I6b422cc4491d2c785565716ee4d07ca58efcdb0a
Closes-Bug: #1873290


** Changed in: ossa
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1873290

Title:
  OAuth1 request token authorize silently ignores roles parameter

Status in OpenStack Identity (keystone):
  In Progress
Status in OpenStack Security Advisory:
  Fix Released

Bug description:
  Sorry for using "trustor" and "trustee" terms in OAuth1 context, but
  these terms clearly describe users positions.

  OpenStack CLI explicitly requires an OAuth1 "trustor" to specify a
  role for an OAuth1 Access Token:

  $ openstack request token authorize
  usage: openstack request token authorize [-h]
   [-f {json,shell,table,value,yaml}]
   [-c COLUMN] [--noindent]
   [--prefix PREFIX]
   [--max-width ] [--fit-width]
   [--print-empty] --request-key
    --role 
  openstack request token authorize: error: the following arguments are 
required: --request-key, --role

  However a specified role is silently ignored and OAuth1 token gets all
  OAuth1 "trustor" roles.

  
https://github.com/openstack/keystone/blob/7bb6314e40d6947294260324e84a58de191f8609/keystone/api/os_oauth1.py#L287

  As an OAuth1 "trustor" I expect the "trustee" to have only accepted
  roles.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1873290/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1876139] Re: Groovy cloud-images failing during growpart

2020-05-06 Thread Launchpad Bug Tracker
This bug was fixed in the package cloud-utils - 0.31-8-g9619a1ea-
0ubuntu1

---
cloud-utils (0.31-8-g9619a1ea-0ubuntu1) groovy; urgency=medium

  * New upstream snapshot.
- cloud-image-utils: Add depends on fdisk, drop e2fsprogs
  [Scott Moser] (LP: #1876139)

 -- Ryan Harper   Tue, 05 May 2020 16:12:40
-0500

** Changed in: cloud-utils (Ubuntu)
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to cloud-init.
https://bugs.launchpad.net/bugs/1876139

Title:
  Groovy cloud-images failing during growpart

Status in cloud-images:
  New
Status in cloud-init:
  Incomplete
Status in cloud-utils:
  Fix Committed
Status in cloud-utils package in Ubuntu:
  Fix Released

Bug description:
  Was running on Azure, but I expect this happens on all cloud images.
  We did not see our disk grow as expected on first boot.

  Took a look at /var/log/cloud-init and saw the following:

  2020-04-30 16:04:46,837 - util.py[WARNING]: Failed growpart --dry-run for 
(/dev/sda, 1)
  2020-04-30 16:04:46,837 - util.py[DEBUG]: Failed growpart --dry-run for 
(/dev/sda, 1)
  Traceback (most recent call last):
File "/usr/lib/python3/dist-packages/cloudinit/config/cc_growpart.py", line 
145, in resize
  util.subp(["growpart", '--dry-run', diskdev, partnum])
File "/usr/lib/python3/dist-packages/cloudinit/util.py", line 2084, in subp
  raise ProcessExecutionError(stdout=out, stderr=err,
  cloudinit.util.ProcessExecutionError: Unexpected error while running command.
  Command: ['growpart', '--dry-run', '/dev/sda', '1']
  Exit code: 2
  Reason: -
  Stdout: FAILED: sfdisk not found

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-images/+bug/1876139/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1877146] [NEW] neutron-dynamic-plugin tempest jobs fail on stable/train branch

2020-05-06 Thread Bernard Cafarelli
Public bug reported:

Sample review with failure:
https://review.opendev.org/#/c/725790/
https://1220c88f5f3f7dc2943f-5c9bf716eadc2e193f03b25f937f429b.ssl.cf1.rackcdn.com/725790/1/check/neutron-dynamic-routing-dsvm-tempest-api/19f9000/job-output.txt

2020-05-06 09:12:36.370490 | primary | all-plugin run-test: commands[3] | 
tempest run --regex '^neutron_dynamic_routing.tests.tempest.api\.' 
--concurrency=4
2020-05-06 09:12:40.817171 | primary |
2020-05-06 09:12:40.817256 | primary | =
2020-05-06 09:12:40.817278 | primary | Failures during discovery
2020-05-06 09:12:40.817303 | primary | =
2020-05-06 09:12:40.817322 | primary | --- import errors ---
2020-05-06 09:12:40.817342 | primary | Failed to import test module: 
neutron_dynamic_routing.tests.tempest.api.test_bgp_speaker_extensions
2020-05-06 09:12:40.817362 | primary | Traceback (most recent call last):
2020-05-06 09:12:40.817382 | primary |   File 
"/usr/lib/python3.6/unittest/loader.py", line 428, in _find_test_path
2020-05-06 09:12:40.817401 | primary | module = 
self._get_module_from_name(name)
2020-05-06 09:12:40.817420 | primary |   File 
"/usr/lib/python3.6/unittest/loader.py", line 369, in _get_module_from_name
2020-05-06 09:12:40.817440 | primary | __import__(name)
2020-05-06 09:12:40.817459 | primary |   File 
"/opt/stack/new/neutron-dynamic-routing/neutron_dynamic_routing/tests/tempest/api/test_bgp_speaker_extensions.py",
 line 21, in 
2020-05-06 09:12:40.817478 | primary | from neutron_tempest_plugin.api 
import base
2020-05-06 09:12:40.817498 | primary | ModuleNotFoundError: No module named 
'neutron_tempest_plugin'
2020-05-06 09:12:40.817519 | primary |
2020-05-06 09:12:40.817538 | primary | Failed to import test module: 
neutron_dynamic_routing.tests.tempest.api.test_bgp_speaker_extensions_negative
2020-05-06 09:12:40.817557 | primary | Traceback (most recent call last):
2020-05-06 09:12:40.817575 | primary |   File 
"/usr/lib/python3.6/unittest/loader.py", line 428, in _find_test_path
2020-05-06 09:12:40.817594 | primary | module = 
self._get_module_from_name(name)
2020-05-06 09:12:40.817613 | primary |   File 
"/usr/lib/python3.6/unittest/loader.py", line 369, in _get_module_from_name
2020-05-06 09:12:40.817635 | primary | __import__(name)
2020-05-06 09:12:40.817654 | primary |   File 
"/opt/stack/new/neutron-dynamic-routing/neutron_dynamic_routing/tests/tempest/api/test_bgp_speaker_extensions_negative.py",
 line 21, in 
2020-05-06 09:12:40.817673 | primary | from 
neutron_dynamic_routing.tests.tempest.api import test_bgp_speaker_extensions as 
test_base  # noqa
2020-05-06 09:12:40.817692 | primary |   File 
"/opt/stack/new/neutron-dynamic-routing/neutron_dynamic_routing/tests/tempest/api/test_bgp_speaker_extensions.py",
 line 21, in 
2020-05-06 09:12:40.817711 | primary | from neutron_tempest_plugin.api 
import base
2020-05-06 09:12:40.817730 | primary | ModuleNotFoundError: No module named 
'neutron_tempest_plugin'
2020-05-06 09:12:40.817748 | primary |
2020-05-06 09:12:40.817767 | primary | Failed to import test module: 
neutron_dynamic_routing.tests.tempest.scenario.basic.test_4byte_asn
2020-05-06 09:12:40.817786 | primary | Traceback (most recent call last):
2020-05-06 09:12:40.817804 | primary |   File 
"/usr/lib/python3.6/unittest/loader.py", line 428, in _find_test_path
2020-05-06 09:12:40.817823 | primary | module = 
self._get_module_from_name(name)
2020-05-06 09:12:40.817842 | primary |   File 
"/usr/lib/python3.6/unittest/loader.py", line 369, in _get_module_from_name
2020-05-06 09:12:40.817861 | primary | __import__(name)
2020-05-06 09:12:40.817879 | primary |   File 
"/opt/stack/new/neutron-dynamic-routing/neutron_dynamic_routing/tests/tempest/scenario/basic/test_4byte_asn.py",
 line 17, in 
2020-05-06 09:12:40.817898 | primary | from 
neutron_dynamic_routing.tests.tempest.scenario import base
2020-05-06 09:12:40.817934 | primary |   File 
"/opt/stack/new/neutron-dynamic-routing/neutron_dynamic_routing/tests/tempest/scenario/base.py",
 line 26, in 
2020-05-06 09:12:40.817954 | primary | from neutron_tempest_plugin.api 
import base
2020-05-06 09:12:40.817973 | primary | ModuleNotFoundError: No module named 
'neutron_tempest_plugin'
2020-05-06 09:12:40.817992 | primary |
2020-05-06 09:12:40.818011 | primary | Failed to import test module: 
neutron_dynamic_routing.tests.tempest.scenario.basic.test_basic
2020-05-06 09:12:40.818029 | primary | Traceback (most recent call last):
2020-05-06 09:12:40.818048 | primary |   File 
"/usr/lib/python3.6/unittest/loader.py", line 428, in _find_test_path
2020-05-06 09:12:40.818066 | primary | module = 
self._get_module_from_name(name)
2020-05-06 09:12:40.818085 | primary |   File 
"/usr/lib/python3.6/unittest/loader.py", line 369, in _get_module_from_name
2020-05-06 09:12:40.818104 | primary | __import__(name)
2020-05-06 09:12:40.818122 | primary |   File 
"/opt/stack/new/neutron-dynamic-ro

[Yahoo-eng-team] [Bug 1700501] Re: Insecure rootwrap usage

2020-05-06 Thread Goutham Pacha Ravi
In Manila, we've discussed migrating off of rootwrap, to privsep - and
are yet to find an owner to complete that work. We'll hopefully do that
soon. However, I agree this bug is wide open. We'll use a different
tracker to call out the tasks to deprecate the usage of rootwrap.

** Changed in: manila
   Status: Incomplete => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1700501

Title:
  Insecure rootwrap usage

Status in Cinder:
  New
Status in OpenStack Shared File Systems Service (Manila):
  Invalid
Status in OpenStack Compute (nova):
  Incomplete
Status in OpenStack Security Advisory:
  Won't Fix

Bug description:
  Reported by Benjamin Deuter of SUSE:

  Some rootwrap filters are too permissive and allow privilege
  escalation from service user, as explained here:

  https://security.openstack.org/guidelines/dg_use-oslo-rootwrap-
  securely.html#incorrect

  For example this shouldn't be authorized:

  sudo nova-rootwrap /etc/nova/rootwrap.conf chmod 777 /etc/shadow

To manage notifications about this bug go to:
https://bugs.launchpad.net/cinder/+bug/1700501/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1868033] Re: Booting instance with pci_device fails during rocky->stein live upgrade

2020-05-06 Thread OpenStack Infra
Reviewed:  https://review.opendev.org/721667
Committed: 
https://git.openstack.org/cgit/openstack/nova/commit/?id=d3ca7356860d64555eef6f5138501cb38f50ecc8
Submitter: Zuul
Branch:master

commit d3ca7356860d64555eef6f5138501cb38f50ecc8
Author: Dan Smith 
Date:   Tue Apr 21 09:07:32 2020 -0700

Remove stale nested backport from InstancePCIRequests

Sometime in 2015, we removed the hard-coded obj_relationships mapping
from parent objects which facilitated semi-automated child version
backports.  This was replaced by a manifest-of-versions mechanism
where the client reports all the supported objects and versions
during a backport request to conductor. The InstancePCIRequests object
isn't technically an ObjectListBase, despite acting like one, and thus
wasn't using the obj_relationships. Because of this, it was doing
its own backporting of its child object, which was not removed in
the culling of the static mechanism. Because we now no longer need to
worry about sub-object backport chaining, when version 1.2 was added,
no backport rule was added, and since the object does not call the
base class' generic routine, proper backporting of the child object
was not happening.

All we need to do is remove the override to allow the base
infrastructure to do the work.

Change-Id: Id610a24c066707de5ddc0507e7ef26c421ba366c
Closes-Bug: #1868033


** Changed in: nova
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1868033

Title:
  Booting instance with pci_device fails during rocky->stein live
  upgrade

Status in OpenStack Compute (nova):
  Fix Released

Bug description:
  Environment:

  Stein nova-conductor having set upgrade_levels to rocky 
  Rocky nova-compute

  Boot an instance with a flavour that has a pci_device

  Error:

  Failed to publish message to topic 'nova': maximum recursion depth
  exceeded: RuntimeError: maximum recursion depth exceeded

  
  Tracked this down it it continually trying to backport the 
InstancePCIRequests:

  It gets as arguments:
  objinst={u'nova_object.version': u'1.1', u'nova_object.name': 
u'InstancePCIRequests', u'nova_object.data': {u'instance_uuid': 
u'08212b12-8fa8-42d9-8d3e-52ed60a64135', u'requests': [{u'nova_object.version': 
u'1.3', u'nova_object.name': u'InstancePCIRequest', u'nova_object.data': 
{u'count': 1, u'is_new': False, u'numa_policy': None, u'request_id': None, 
u'requester_id': None, u'alias_name': u'V100-32G', u'spec': [{u'vendor_id': 
u'10de', u'product_id': u'1db6'}]}, u'nova_object.namespace': u'nova'}]}, 
u'nova_object.namespace': u'nova'}, 

  object_versions={u'InstancePCIRequests': '1.1', 'InstancePCIRequest':
  '1.2'}

  
  It fails because it doesn't backport the individual InstancePCIRequest inside 
the InstancePCIRequests object and so keeps trying.

  Error it shows is: IncompatibleObjectVersion: Version 1.3 of
  InstancePCIRequest is not supported, supported version is 1.2


  I have fixed this in our setup by altering obj_make_compatible to
  downgrade the individual requests to version 1.2 which seems to work
  and all is good

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1868033/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1863021] Re: [SRU] eventlet monkey patch results in assert len(_active) == 1 AssertionError

2020-05-06 Thread Chris MacNaughton
** Also affects: python-os-ken (Ubuntu)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1863021

Title:
  [SRU] eventlet monkey patch results in assert len(_active) == 1
  AssertionError

Status in Cinder:
  Fix Released
Status in Designate:
  In Progress
Status in Glance:
  Fix Released
Status in OpenStack Shared File Systems Service (Manila):
  In Progress
Status in masakari:
  In Progress
Status in Mistral:
  In Progress
Status in Murano:
  Fix Released
Status in BaGPipe:
  In Progress
Status in networking-hyperv:
  In Progress
Status in networking-l2gw:
  In Progress
Status in Mellanox backend  integration with Neutron (networking-mlnx):
  In Progress
Status in networking-sfc:
  In Progress
Status in neutron:
  Fix Released
Status in OpenStack Compute (nova):
  Fix Released
Status in oslo.service:
  Fix Released
Status in senlin:
  In Progress
Status in OpenStack Object Storage (swift):
  In Progress
Status in OpenStack DBaaS (Trove):
  In Progress
Status in watcher:
  In Progress
Status in barbican package in Ubuntu:
  Triaged
Status in cinder package in Ubuntu:
  Fix Released
Status in designate package in Ubuntu:
  Triaged
Status in glance package in Ubuntu:
  Fix Released
Status in heat package in Ubuntu:
  Triaged
Status in ironic package in Ubuntu:
  Triaged
Status in ironic-inspector package in Ubuntu:
  Triaged
Status in magnum package in Ubuntu:
  Triaged
Status in manila package in Ubuntu:
  Triaged
Status in masakari package in Ubuntu:
  Triaged
Status in mistral package in Ubuntu:
  Triaged
Status in murano package in Ubuntu:
  Triaged
Status in murano-agent package in Ubuntu:
  Triaged
Status in networking-bagpipe package in Ubuntu:
  Triaged
Status in networking-hyperv package in Ubuntu:
  Triaged
Status in networking-l2gw package in Ubuntu:
  Triaged
Status in networking-mlnx package in Ubuntu:
  Triaged
Status in networking-sfc package in Ubuntu:
  Triaged
Status in neutron package in Ubuntu:
  Fix Released
Status in neutron-dynamic-routing package in Ubuntu:
  Triaged
Status in nova package in Ubuntu:
  Fix Released
Status in openstack-trove package in Ubuntu:
  Triaged
Status in python-os-ken package in Ubuntu:
  New
Status in python-oslo.service package in Ubuntu:
  Triaged
Status in sahara package in Ubuntu:
  Triaged
Status in senlin package in Ubuntu:
  Triaged
Status in swift package in Ubuntu:
  Triaged
Status in watcher package in Ubuntu:
  New
Status in barbican source package in Focal:
  Triaged
Status in cinder source package in Focal:
  Triaged
Status in designate source package in Focal:
  Triaged
Status in glance source package in Focal:
  Fix Released
Status in heat source package in Focal:
  Triaged
Status in ironic source package in Focal:
  Triaged
Status in ironic-inspector source package in Focal:
  Triaged
Status in magnum source package in Focal:
  Triaged
Status in manila source package in Focal:
  Triaged
Status in masakari source package in Focal:
  Triaged
Status in mistral source package in Focal:
  Triaged
Status in murano source package in Focal:
  Triaged
Status in murano-agent source package in Focal:
  Triaged
Status in networking-bagpipe source package in Focal:
  Triaged
Status in networking-hyperv source package in Focal:
  Triaged
Status in networking-l2gw source package in Focal:
  Triaged
Status in networking-mlnx source package in Focal:
  Triaged
Status in networking-sfc source package in Focal:
  Triaged
Status in neutron source package in Focal:
  Triaged
Status in neutron-dynamic-routing source package in Focal:
  Triaged
Status in nova source package in Focal:
  Fix Released
Status in openstack-trove source package in Focal:
  Triaged
Status in python-os-ken source package in Focal:
  New
Status in python-oslo.service source package in Focal:
  Triaged
Status in sahara source package in Focal:
  Triaged
Status in senlin source package in Focal:
  Triaged
Status in swift source package in Focal:
  Triaged
Status in watcher source package in Focal:
  New
Status in barbican source package in Groovy:
  Triaged
Status in cinder source package in Groovy:
  Fix Released
Status in designate source package in Groovy:
  Triaged
Status in glance source package in Groovy:
  Fix Released
Status in heat source package in Groovy:
  Triaged
Status in ironic source package in Groovy:
  Triaged
Status in ironic-inspector source package in Groovy:
  Triaged
Status in magnum source package in Groovy:
  Triaged
Status in manila source package in Groovy:
  Triaged
Status in masakari source package in Groovy:
  Triaged
Status in mistral source package in Groovy:
  Triaged
Status in murano source package in Groovy:
  Triaged
Status in murano-agent source package in Groovy:
  Triaged
Status in networking-bagpipe source package in Groovy:
  Triaged
Status in networking-hyperv source package in Groovy:
  Triaged
Status

[Yahoo-eng-team] [Bug 1871815] Re: neutron port forwarding doesn't work

2020-05-06 Thread Liansen Zhai
** Changed in: neutron
   Status: New => Invalid

** Changed in: neutron
 Assignee: (unassigned) => Liansen Zhai (zhailiansen)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1871815

Title:
  neutron port forwarding doesn't work

Status in neutron:
  Invalid

Bug description:
  I found a bug about neutron port forwarding and Detailed operations are as 
follows:
  first,create a VPC,
   1)openstack address scope create my_project_id
   2)openstack network create my_network
   3)openstack subnet pool create  --address-scope  
--pool-prefix "10.0.114.0/24"
   4)openstack subnet create --network  --subnet-pool  --subnet-range 10.0.114.0/25 
   5)openstack router create my_router
   6)openstack router set jidd-router1 --external-gateway  --enable-snat
   7)openstack router add subnet  
  second,create a vm by the network above
  And,config floating ip port forwarding.

  for example, external ip and port: 10.142.254.158, 8870; internal port: 
10.0.99.29,8870
  It can not reach form a external ip to 10.142.254.158 using telnet.

  Found that, packet is dropped in snat namespace, becase of packet is
  marked different labels between qg-xxx interface and sg-xxx interface.

  hit rules:
  0 0 DROP   all  --  *  sg-4ddcbea1-c6  0.0.0.0/0
0.0.0.0/0mark match ! 0x400/0x

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1871815/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp