Public bug reported:
"-1 is not a valid value in some Security Group Rules creation form"
For instance, Custom ICMP Rule:
-1 is invalid which is inconsistent with it's help text:
"Enter a value for ICMP type in the range (-1: 255)"
"Enter a value for ICMP code in the range (-1: 255)"
It will
Reviewed: https://review.openstack.org/258993
Committed:
https://git.openstack.org/cgit/openstack/python-ceilometerclient/commit/?id=a63f15272c61d5b3ab54d00da1209e4d6bf6bcad
Submitter: Jenkins
Branch:master
commit a63f15272c61d5b3ab54d00da1209e4d6bf6bcad
Author: Shuquan Huang
Reviewed: https://review.openstack.org/241700
Committed:
https://git.openstack.org/cgit/openstack/horizon/commit/?id=d1c3b4787b792fe6e20a3fd6e692015fd576a5f1
Submitter: Jenkins
Branch:master
commit d1c3b4787b792fe6e20a3fd6e692015fd576a5f1
Author: dixiaoli
Date: Wed
** Changed in: horizon
Status: New => Invalid
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1483955
Title:
Horizon homepage shows internal server error
Public bug reported:
2015-12-20 04:22:59.286 DEBUG nova.api.openstack.wsgi
[req-a2cd2bde-867b-4034-b801-992f587b2c68 admin admin] Calling method '>' _process_stack /opt/stack/nova/nova/api/openstack/wsgi.py:798
2015-12-20 04:22:59.288 INFO nova.osapi_compute.wsgi.server
Not a Horizon bug, as far as I can tell.
** Project changed: horizon => swift
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1475536
Title:
Uploading in ceph
Reviewed: https://review.openstack.org/259566
Committed:
https://git.openstack.org/cgit/openstack/api-site/commit/?id=7451643f1dbe0cbe37621cb9112ff97a90bd6301
Submitter: Jenkins
Branch:master
commit 7451643f1dbe0cbe37621cb9112ff97a90bd6301
Author: jichenjc
Date: Fri
Reviewed: https://review.openstack.org/259567
Committed:
https://git.openstack.org/cgit/openstack/api-site/commit/?id=426a455d3d5a517f123162631de038d763a0
Submitter: Jenkins
Branch:master
commit 426a455d3d5a517f123162631de038d763a0
Author: jichenjc
Date: Fri
[Expired for neutron because there has been no activity for 60 days.]
** Changed in: neutron
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1508126
[Expired for neutron because there has been no activity for 60 days.]
** Changed in: neutron
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1507489
*** This bug is a duplicate of bug 1524421 ***
https://bugs.launchpad.net/bugs/1524421
** This bug has been marked a duplicate of bug 1524421
Host Manager reads deleted instance info on startup
--
You received this bug notification because you are a member of Yahoo!
Engineering Team,
If we can find a valid consumer for this information from the domain
XMLt hen we can add the code as a specless blueprint or similar.
** Changed in: nova
Status: In Progress => Opinion
** Changed in: nova
Assignee: ChangBo Guo(gcb) (glongwave) => (unassigned)
--
You received this
Public bug reported:
[Existing problem]
Current BGP dynamic routing proposal [1]_ doesn't have support for getting BGP
peer state and statistical information. Such information could be critical for
debugging.
[Proposal]
- Existing BGP dynamic routing framework will be extended for supporting
Public bug reported:
[Existing problem]
Current BGP dynamic routing proposal [1]_ doesn't have support for route
aggregation. Route aggregation could be extremely useful in reducing the size
of the routing table and improves CPU utilization [2]_.
[Proposal]
- Add route-aggregation support to
Public bug reported:
There is a problem - when I run tests in parallel then one/two can fail.
As I see in logs one thread is deleting network while second thread is
listing all ports. And second thread get exception 'NetworkNotFound'.
Part of neutron service logs is:
2015-12-18 06:29:05.151
Public bug reported:
[Existing problem]
Current BGP dynamic routing proposal [1]_ doesn't support route filtering. By
Default, all the routes will be advertised. There is no way by which an admin
can filter routes before advertisement.
[Proposal]
- Add route-policy support to BGP dynamic
Public bug reported:
When I used SR-IOV port instance and route port, that reside on the same
physical server I can't use floating ip and access the vm.
but it is working if the SR-IOV port instance is on different physical server
** Affects: neutron
Importance: Undecided
Assignee:
Public bug reported:
1. I take a snapshot from vmware instance, then the snapshot image(which is
link_clone of snapshot) will be saved in glance server.
2. Start from this snapshot image from glance server. then got the following
error
2015-12-15 01:32:05.255 25992 DEBUG oslo_vmware.api [-]
Public bug reported:
[Existing problem]
The number of BGP speakers a BGP driver can host may vary. For instance Ryu can
support only 1 BGP Speaker while Quagga can host multiple. In the current BGP
dynamic routing implementation [1]_, the BGP DrAgent and DrScheduler cannot
adjust themselves as
** Changed in: keystone
Status: In Progress => Invalid
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1268439
Title:
range method is not same in py3.x and py2.x
Status in
these are two disjoint entities. One is for oslo_policy (the default
rule), the other is for keystone's policy database (largely unused).
with the release of oslo.policy as it's own project, this relationship
had been made more clear, and no longer needs to be grouped together as
the initial bug
this was fixed a while ago:
Notifications are now emitted upon domain create, update and delete
https://github.com/openstack/keystone/blob/master/keystone/resource/controllers.py#L132-L136
** Changed in: keystone
Status: In Progress => Fix Committed
** Changed in: keystone
Public bug reported:
When getting instance rules in virt/firewall.py a for loop is used to
query the db for rules belonging to each individual security group in a
list of security groups that itself comes from a separate query. See:
23 matches
Mail list logo