[Yahoo-eng-team] [Bug 1823847] Re: Multiple rules in a mapping is not working with type: "local" attribute

2019-04-10 Thread Shivakumar M
** Changed in: keystone
   Status: Invalid => New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1823847

Title:
  Multiple rules in a mapping is not working with type: "local"
  attribute

Status in OpenStack Identity (keystone):
  New

Bug description:
  We have a requirement in which we want to setup an external Identity provider 
with keystone federation for SSO.
  I have added two rules in a mapping which will match to below criteria and 
added this mapping to OS_FEDERATION identity provider.
  Rule 1. If user already exists in keystone, it should not create a new 
ephemeral user.
  Rule 2. If user is not found in keystone, it should create a new user in SSO 
federated domain.

  Problem:
  If user is not present already, it should match second rule and new user 
should be created. But its throwing Unauthorized Error.
  I think, with type:"local" specified, it will throw Unauthorized error even 
if there are multiple rules for a given mapping.
  With multiple rules specified, it should try to match the a rule in an order 
which is not working as expected

  Have attached mapping object for reference.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1823847/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1823847] [NEW] Multiple rules in a mapping is not working with type: "local" attribute

2019-04-08 Thread Shivakumar M
Public bug reported:

We have a requirement in which we want to setup an external Identity provider 
with keystone federation for SSO.
I have added two rules in a mapping which will match to below criteria and 
added this mapping to OS_FEDERATION identity provider.
Rule 1. If user already exists in keystone, it should not create a new 
ephemeral user.
Rule 2. If user is not found in keystone, it should create a new user in SSO 
federated domain.

Problem:
If user is not present already, it should match second rule and new user should 
be created. But its throwing Unauthorized Error.
I think, with type:"local" specified, it will throw Unauthorized error even if 
there are multiple rules for a given mapping.
With multiple rules specified, it should try to match the a rule in an order 
which is not working as expected

Have attached mapping object for reference.

** Affects: keystone
 Importance: Undecided
 Status: New


** Tags: federation

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1823847

Title:
  Multiple rules in a mapping is not working with type: "local"
  attribute

Status in OpenStack Identity (keystone):
  New

Bug description:
  We have a requirement in which we want to setup an external Identity provider 
with keystone federation for SSO.
  I have added two rules in a mapping which will match to below criteria and 
added this mapping to OS_FEDERATION identity provider.
  Rule 1. If user already exists in keystone, it should not create a new 
ephemeral user.
  Rule 2. If user is not found in keystone, it should create a new user in SSO 
federated domain.

  Problem:
  If user is not present already, it should match second rule and new user 
should be created. But its throwing Unauthorized Error.
  I think, with type:"local" specified, it will throw Unauthorized error even 
if there are multiple rules for a given mapping.
  With multiple rules specified, it should try to match the a rule in an order 
which is not working as expected

  Have attached mapping object for reference.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1823847/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1521071] [NEW] Network connectivity fails when a provider network is scheduled to a Node which has invalid physical network mappings

2015-11-29 Thread Shivakumar M
Public bug reported:

I have a setup with 2 Network nodes, with bridge_mappings of l2 agents as 
follows.
Network Node 1 : bridge_mappings: provider:10:1000
Network Node 2 : bridge_mappings: physnet1:1000:1500

Now, I create a provider network.
neutron net-create net1 --provider:network_type vlan 
--provider:physical_network physnet1

Now, when I add a port to that network, the network gets scheduled to
NN1, in which physical_network "physnet1" has no meaning.

Solution:
A pre-check to be added while scheduling a provider network, whether physical 
network specified exists in the bridge_mappings config of the respective NN 
node.

** Affects: neutron
 Importance: Undecided
 Status: New


** Tags: neutron ovs vlan

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1521071

Title:
  Network connectivity fails when a provider network is scheduled to a
  Node which has invalid physical network mappings

Status in neutron:
  New

Bug description:
  I have a setup with 2 Network nodes, with bridge_mappings of l2 agents as 
follows.
  Network Node 1 : bridge_mappings: provider:10:1000
  Network Node 2 : bridge_mappings: physnet1:1000:1500

  Now, I create a provider network.
  neutron net-create net1 --provider:network_type vlan 
--provider:physical_network physnet1

  Now, when I add a port to that network, the network gets scheduled to
  NN1, in which physical_network "physnet1" has no meaning.

  Solution:
  A pre-check to be added while scheduling a provider network, whether physical 
network specified exists in the bridge_mappings config of the respective NN 
node.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1521071/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1324496] Re: shared firewall policies and rules are not displayed in horizon

2015-07-26 Thread Shivakumar M
*** This bug is a duplicate of bug 1294541 ***
https://bugs.launchpad.net/bugs/1294541

** This bug has been marked a duplicate of bug 1294541
   shared firewall policies can't be displayed in horizon

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1324496

Title:
  shared firewall policies and rules are not displayed in horizon

Status in OpenStack Dashboard (Horizon):
  In Progress

Bug description:
  This bug is an extension to
  https://bugs.launchpad.net/neutron/+bug/1323322

  As a normal user, Shared Firewall Policies and Rules which are created by 
admin , are listed for CLI command.
  But, those are not visible in Horizon UI.

  Steps to reproduce:

  As admin:
  Create a firewall rule and mark it as shared.
  Create a firewall policy and mark it as shared.

  Now, as a normal user:
  Try CLI commands:
  neutron firewall-rule-list
  neutron-firewall-policy-list

  It will list all the policies and rules which are shared also.

  Now login to Horizon as normal user,
  In Firewall panel, 
  Nothing is displayed under firewall-policies and firewall-rules.

  Expected Results:
  Shared firewall policies and rules should be listed as in CLI.
  And modification of those should be disabled for all users other than admin.

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1324496/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1422629] [NEW] Creating a network with explicitly specified segmentation id must fail, if that id is not confiured

2015-02-17 Thread Shivakumar M
Public bug reported:

Consider scenario, where ml2 plugin is configured with following segment ranges.
network_vlan_ranges=physnet1:1000:1999
vni_ranges=500:999

Now, if I create a Network specifying a segmentation id which is not in
the range specified in the configuration file, the resource is getting
created.

neutron net-create net1 --provider:network_type=vlan 
--provider:physical_network=physnet1 --provider:segmentation_id=100
Created a new network:
+---+--+
| Field | Value|
+---+--+
| admin_state_up| True |
| id| dbe747f5-9d45-403d-97b2-6f4dd82aef47 |
| name  | net1   |
| provider:network_type | vlan |
| provider:physical_network | physnet1 |
| provider:segmentation_id  | 100  |
| router:external   | False|
| shared| False|
| status| ACTIVE   |
| subnets   |  |
| tenant_id | e7897ad9e9f84826a0a7bfe6086e9278 |
+---+--+


neutron net-create net2 --provider:network_type=vxlan 
--provider:segmentation_id=1
Created a new network:
+---+--+
| Field | Value|
+---+--+
| admin_state_up| True |
| id| ec9dd22a-ae53-41f0-9c78-348e77508dff |
| name  | net2   |
| provider:network_type | vxlan|
| provider:physical_network |  |
| provider:segmentation_id  | 1|
| router:external   | False|
| shared| False|
| status| ACTIVE   |
| subnets   |  |
| tenant_id | e7897ad9e9f84826a0a7bfe6086e9278 |
+---+--+

** Affects: neutron
 Importance: Undecided
 Assignee: Shivakumar M (shiva-m)
 Status: New


** Tags: ml2 neutron-core

** Changed in: neutron
 Assignee: (unassigned) => Shivakumar M (shiva-m)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1422629

Title:
  Creating a network with explicitly specified segmentation id must
  fail, if that id is not confiured

Status in OpenStack Neutron (virtual network service):
  New

Bug description:
  Consider scenario, where ml2 plugin is configured with following segment 
ranges.
  network_vlan_ranges=physnet1:1000:1999
  vni_ranges=500:999

  Now, if I create a Network specifying a segmentation id which is not
  in the range specified in the configuration file, the resource is
  getting created.

  neutron net-create net1 --provider:network_type=vlan 
--provider:physical_network=physnet1 --provider:segmentation_id=100
  Created a new network:
  +---+--+
  | Field | Value|
  +---+--+
  | admin_state_up| True |
  | id| dbe747f5-9d45-403d-97b2-6f4dd82aef47 |
  | name  | net1   |
  | provider:network_type | vlan |
  | provider:physical_network | physnet1 |
  | provider:segmentation_id  | 100  |
  | router:external   | False|
  | shared| False|
  | status| ACTIVE   |
  | subnets   |  |
  | tenant_id | e7897ad9e9f84826a0a7bfe6086e9278 |
  +---+--+

  
  neutron net-create net2 --provider:network_type=vxlan 
--provider:segmentation_id=1
  Created a new network:
  +---+--+
  | Field | Va

[Yahoo-eng-team] [Bug 1405077] [NEW] VLAN configuration changes made is not updated until neutron server is restarted

2014-12-22 Thread Shivakumar M
Public bug reported:

I changed network_vlan_ranges configuration in configuration file, and I want 
changes to take effect without restarting the neutron server.
It may not be a bug, but restarting the networking service itself could lead to 
some critical processes to stop temporarily.

As some configurations are subjected to change often, automatic
reloading of configurations without restarting the whole service may be
a feasible solution.

** Affects: neutron
 Importance: Undecided
 Status: New


** Tags: config neutron reload

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1405077

Title:
  VLAN configuration changes made is not updated until neutron server is
  restarted

Status in OpenStack Neutron (virtual network service):
  New

Bug description:
  I changed network_vlan_ranges configuration in configuration file, and I want 
changes to take effect without restarting the neutron server.
  It may not be a bug, but restarting the networking service itself could lead 
to some critical processes to stop temporarily.

  As some configurations are subjected to change often, automatic
  reloading of configurations without restarting the whole service may
  be a feasible solution.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1405077/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1405057] [NEW] Filter port-list based on security_groups associated not working

2014-12-22 Thread Shivakumar M
Public bug reported:

Sample Usecases:

1. neutron port-list --security_groups=6f3d9d9d-e84d-437c-ac40-82ce3196230c
Invalid input for operation: '6' is not an integer or uuid.

2.neutron port-list --security_groups list=true 
6f3d9d9d-e84d-437c-ac40-82ce3196230c
Invalid input for operation: '6' is not an integer or uuid.

Since, security_groups associated to a port are referenced from securitygroups 
db table, we can just filter ports
based on security_groups directly as it works for other paramters.

Example:
neutron port-list --mac_address list=true fa:16:3e:40:2b:cc fa:16:3e:8e:32:3e
+--+--+---+---+
| id   | name | mac_address   | fixed_ips   
  |
+--+--+---+---+
| 1cecec78-226f-4379-b5ad-c145e2e14048 |  | fa:16:3e:40:2b:cc | 
{"subnet_id": "af938c1c-e2d7-47a0-954a-ec8524677486", "ip_address": 
"50.10.10.2"} |
| eec24494-09a8-4fa8-885d-e3fda37fe756 |  | fa:16:3e:8e:32:3e | 
{"subnet_id": "af938c1c-e2d7-47a0-954a-ec8524677486", "ip_address": 
"50.10.10.3"} |
+--+--+---+-------+

** Affects: neutron
 Importance: Undecided
 Assignee: Shivakumar M (shiva-m)
 Status: New


** Tags: neutron port-list security-groups

** Changed in: neutron
 Assignee: (unassigned) => Shivakumar M (shiva-m)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1405057

Title:
  Filter port-list based on security_groups associated not working

Status in OpenStack Neutron (virtual network service):
  New

Bug description:
  Sample Usecases:

  1. neutron port-list --security_groups=6f3d9d9d-e84d-437c-ac40-82ce3196230c
  Invalid input for operation: '6' is not an integer or uuid.

  2.neutron port-list --security_groups list=true 
6f3d9d9d-e84d-437c-ac40-82ce3196230c
  Invalid input for operation: '6' is not an integer or uuid.

  Since, security_groups associated to a port are referenced from 
securitygroups db table, we can just filter ports
  based on security_groups directly as it works for other paramters.

  Example:
  neutron port-list --mac_address list=true fa:16:3e:40:2b:cc fa:16:3e:8e:32:3e
  
+--+--+---+---+
  | id   | name | mac_address   | fixed_ips 
|
  
+--+--+---+---+
  | 1cecec78-226f-4379-b5ad-c145e2e14048 |  | fa:16:3e:40:2b:cc | 
{"subnet_id": "af938c1c-e2d7-47a0-954a-ec8524677486", "ip_address": 
"50.10.10.2"} |
  | eec24494-09a8-4fa8-885d-e3fda37fe756 |  | fa:16:3e:8e:32:3e | 
{"subnet_id": "af938c1c-e2d7-47a0-954a-ec8524677486", "ip_address": 
"50.10.10.3"} |
  
+--+--+---+---+

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1405057/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1324496] Re: shared firewall policies and rules are not displayed in horizon

2014-05-30 Thread Shivakumar M
Think, you are right.. I should change it as horizon bug..

** Tags added: horizon

** Project changed: neutron => horizon

** Changed in: horizon
   Status: Incomplete => New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1324496

Title:
  shared firewall policies and rules are not displayed in horizon

Status in OpenStack Dashboard (Horizon):
  New

Bug description:
  This bug is an extension to
  https://bugs.launchpad.net/neutron/+bug/1323322

  As a normal user, Shared Firewall Policies and Rules which are created by 
admin , are listed for CLI command.
  But, those are not visible in Horizon UI.

  Steps to reproduce:

  As admin:
  Create a firewall rule and mark it as shared.
  Create a firewall policy and mark it as shared.

  Now, as a normal user:
  Try CLI commands:
  neutron firewall-rule-list
  neutron-firewall-policy-list

  It will list all the policies and rules which are shared also.

  Now login to Horizon as normal user,
  In Firewall panel, 
  Nothing is displayed under firewall-policies and firewall-rules.

  Expected Results:
  Shared firewall policies and rules should be listed as in CLI.
  And modification of those should be disabled for all users other than admin.

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1324496/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1324496] [NEW] shared firewall policies and rules are not displayed in horizon

2014-05-29 Thread Shivakumar M
Public bug reported:

This bug is an extension to
https://bugs.launchpad.net/neutron/+bug/1323322

As a normal user, Shared Firewall Policies and Rules which are created by admin 
, are listed for CLI command.
But, those are not visible in Horizon UI.

Steps to reproduce:

As admin:
Create a firewall rule and mark it as shared.
Create a firewall policy and mark it as shared.

Now, as a normal user:
Try CLI commands:
neutron firewall-rule-list
neutron-firewall-policy-list

It will list all the policies and rules which are shared also.

Now login to Horizon as normal user,
In Firewall panel, 
Nothing is displayed under firewall-policies and firewall-rules.

Expected Results:
Shared firewall policies and rules should be listed as in CLI.
And modification of those should be disabled for all users other than admin.

** Affects: neutron
 Importance: Undecided
 Assignee: Shivakumar M (shiva075gowda)
 Status: New

** Changed in: neutron
 Assignee: (unassigned) => Shivakumar M (shiva075gowda)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1324496

Title:
  shared firewall policies and rules are not displayed in horizon

Status in OpenStack Neutron (virtual network service):
  New

Bug description:
  This bug is an extension to
  https://bugs.launchpad.net/neutron/+bug/1323322

  As a normal user, Shared Firewall Policies and Rules which are created by 
admin , are listed for CLI command.
  But, those are not visible in Horizon UI.

  Steps to reproduce:

  As admin:
  Create a firewall rule and mark it as shared.
  Create a firewall policy and mark it as shared.

  Now, as a normal user:
  Try CLI commands:
  neutron firewall-rule-list
  neutron-firewall-policy-list

  It will list all the policies and rules which are shared also.

  Now login to Horizon as normal user,
  In Firewall panel, 
  Nothing is displayed under firewall-policies and firewall-rules.

  Expected Results:
  Shared firewall policies and rules should be listed as in CLI.
  And modification of those should be disabled for all users other than admin.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1324496/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp