Re: [Openstack] Openstack + XCP (both on SID): XenAPI python script failing

2011-12-31 Thread Ewan Mellor
> -Original Message- > From: Thomas Goirand [mailto:tho...@goirand.fr] > Sent: 31 December 2011 22:11 > To: Ewan Mellor > Cc: openstack@lists.launchpad.net; Mike McClurg; Jonathan Ludlam > Subject: Re: [Openstack] Openstack + XCP (both on SID): XenAPI python > script failing > > On 01/01/2

Re: [Openstack] Openstack + XCP (both on SID): XenAPI python script failing

2011-12-31 Thread Thomas Goirand
On 01/01/2012 03:23 AM, Ewan Mellor wrote: > The operation it's trying to perform is high up your callstack, at vmops.py > line 826. It's deciding whether to do a VDI.resize or a VDI.resize_online, > based on the host version number. This is because the VDI.resize_online > feature was removed

Re: [Openstack] /usr/bin/keystone

2011-12-31 Thread Jesse Andrews
Agreed - filing a bug. Jesse On Sat, Dec 31, 2011 at 8:15 PM, Ewan Mellor wrote: > We now have a script called ‘keystone’ as the entry point to > python-keystoneclient, and a script called ‘keystone’ that launches a > combined admin and service API server.  Either could be /usr/bin/keystone. > I

[Openstack] /usr/bin/keystone

2011-12-31 Thread Ewan Mellor
We now have a script called 'keystone' as the entry point to python-keystoneclient, and a script called 'keystone' that launches a combined admin and service API server. Either could be /usr/bin/keystone. Is there any plan to get rid of / rename one of these, so that people don't get confused?

Re: [Openstack] Metadata and File Injection

2011-12-31 Thread Ewan Mellor
> -Original Message- > From: openstack-bounces+ewan.mellor=citrix@lists.launchpad.net > [mailto:openstack-bounces+ewan.mellor=citrix@lists.launchpad.net] > On Behalf Of Jesse Andrews > Sent: 15 December 2011 00:34 > To: Jay Pipes > Cc: openstack@lists.launchpad.net > Subject: Re: [O

Re: [Openstack] Metadata and File Injection

2011-12-31 Thread Ewan Mellor
I think that people are scared of the rootkit-like behavior of an arbitrary file injection mechanism. Compromise nova-compute, and now you can trivially compromise every guest in the whole cloud. In some sense that's irrational - I'm sure that there are lots of ways that you can gain control o

Re: [Openstack] Metadata and File Injection

2011-12-31 Thread Ewan Mellor
> -Original Message- > From: openstack-bounces+ewan.mellor=citrix@lists.launchpad.net > [mailto:openstack-bounces+ewan.mellor=citrix@lists.launchpad.net] > On Behalf Of Richard W.M. Jones > Sent: 21 December 2011 10:56 > To: Scott Moser > Cc: openstack@lists.launchpad.net > Subject:

Re: [Openstack] Openstack + XCP (both on SID): XenAPI python script failing

2011-12-31 Thread Thomas Goirand
On 01/01/2012 03:23 AM, Ewan Mellor wrote: > The operation it's trying to perform is high up your callstack, > at vmops.py line 826. It's deciding whether to do a VDI.resize > or a VDI.resize_online, based on the host version number. This > is because the VDI.resize_online feature was removed in

Re: [Openstack] Openstack + XCP (both on SID): XenAPI python script failing

2011-12-31 Thread Ewan Mellor
The operation it's trying to perform is high up your callstack, at vmops.py line 826. It's deciding whether to do a VDI.resize or a VDI.resize_online, based on the host version number. This is because the VDI.resize_online feature was removed in XenServer 6.0. How is XCP advertising itself in