Fix proposed to branch: master
Review: https://review.openstack.org/186264
** Changed in: neutron
Status: Invalid => In Progress
** Changed in: neutron
Assignee: Jian Wen (wenjianhn) => lee jian (leejian0612)
--
You received this bug notification because you are a member of Yahoo!
E
Public bug reported:
Compute instance task states represent what is happening to the instance
at the current moment. When the instance is 'ERROR' state, the
'spawning' task_state make users confused, 'spawning' job had been done
and failed, it should been set to 'None'.
1. Version of Nova
$ git
Public bug reported:
Enviroment:
flalvor :1 --- 1G disk.
volume :128c8c78-ff3d-4636-8c5a-e27660741ec0
,---2G,bootable,image:774b174a-a15a-492d-978d-74c3292a116e,
image:774b174a-a15a-492d-978d-74c3292a116e 13M
when boot from volume like this:
nova boot --flavor 1 --nic net-id=2746e15a-b35a-43
** Package changed: neutron-lbaas (Ubuntu) => neutron
** Changed in: neutron
Assignee: (unassigned) => ZongKai LI (lzklibj)
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1453791
Tit
You have been subscribed to a public bug:
There is no definite mapping between Pool Subnet ID and Its Members.
It is possible to Assign another Subnet with different IP for Pool and
its members.
For E.g
A pool is created with subnet 135.254.189.0/24, and its members from
Instances assigned to
Public bug reported:
I am able to verify Fernet tokens that contain garbage at the end, not
so with UUID tokens.
For example.
UUID:
curl -H "X-Auth-Token:84db9247b27d4fe6bd0a09b7b39281e2"
http://localhost:35357/v2.0/tokens/84db9247b27d4fe6bd0a09b7b39281e2
Works
curl -H "X-Auth-Token:84db9247b
Public bug reported:
For services that need to talk to many other services, Keystone has
provided the trust based authentication model. That is good.
When a user (e.g. USER) raises a service request, the actual job is
delegated to the service user (e.g. SERVICE). SERVICE user will use
trust mecha
Public bug reported:
http://logs.openstack.org/48/185848/1/gate/gate-horizon-dsvm-
integration/0c6efa4/console.html#_2015-05-27_10_11_32_954
2015-05-27 10:11:32.921 | 2015-05-27 10:11:32.905 | Traceback (most recent call
last):
2015-05-27 10:11:32.923 | 2015-05-27 10:11:32.906 | File
"/opt/st
Public bug reported:
A port update with multiple fixed IP specifications, one with a subnet
ID and one with a fixed IP that conflicts with the address picked by the
one specifying the subnet ID will result in a dbduplicate entry which is
presented to the user as a mac address error.
~$ neutron po
Public bug reported:
In the current implementation, when doing instance resize action. The
CONF.allow_resize_to_same_host is first checked in
compute/api which is on controller node. If CONF.allow_resize_to_same_host =
True, nothing will added to
filter_properties['ignore_hosts'], if it is set
In case someone stumbles across this like I did.
What's happening in the first case is that the client parsing is getting
confused and turns that into a list of two port updates, one specifying
a subnet_id and one specifying an ip_address. The latter ends up giving
you the IP you wanted and the fi
Quoting from IRC: "devananda | mrda: that feels like a discussion on the
color of the trim of the bikeshed we already store farm equipment in"
** Changed in: ironic
Status: Confirmed => Won't Fix
** Changed in: nova
Status: Confirmed => Won't Fix
--
You received this bug notifica
Public bug reported:
It's not possible to update ipv6 subnet info using Horizon. To recreate:
Setup: create a new network (Admin->System->Networks->Create Network)
create an ipv6 subnet in that network
(new network Detail->Create Subnet)
Network Address: fdc5:f49e:fe9e::/64
IP Version IPv6
Gatew
Public bug reported:
We need to do some cleanup before we can use JSCS globally (turned on in
this patch: https://review.openstack.org/#/c/186154/).
We are using those the JSCS Rules listed by John Papa here:
https://github.com/johnpapa/angular-styleguide#jscs
** Affects: horizon
Importance
Public bug reported:
Since Barbican provides certificate management/storage, and LBaaS has
successfully used the certificates, this RFE proposes to provide
certificate support for VPN IPSec site-to-site connections.
The expectation is that the user would use Barbican to create the
certificate, an
Public bug reported:
Currently, VPNaaS IPsec site to site connections may be created with one
or more peer (right side) subnets specified (as CIDRs). However, for the
local (left) side, only a single subnet can be specified.
The reference OpenSwan/StrongSwan implementations will support multiple
Public bug reported:
When playing with some keystone deployment alternatives I stumble on a
keystone issue:
> 2015-05-27 12:11:52.946 57 DEBUG keystone.common.ldap.core [-] LDAP search:
> base=ou=Groups,dc=acme,dc=org scope=1
> filterstr=(&(&(objectClass=groupOfNames)(member=uid=john,ou=Users,d
Public bug reported:
Resizing Ceph-backed instances seems to be completely non-functional
Steps to reproduce (in devstack with ceph enabled):
1. Boot an instance against m1.nano
2. Run "rbd -p vms ls -l" and note the size of the volume
3. Resize the instance to m1.tiny, and confirm the resize
Public bug reported:
With the latest upstream, modal form seems not working anymore.
See attached
** Affects: horizon
Importance: Undecided
Assignee: Kahou Lei (kahou82)
Status: New
** Attachment added: "Screen Shot 2015-05-27 at 12.13.15 PM.png"
https://bugs.launchpad.ne
** Also affects: nova
Importance: Undecided
Status: New
** No longer affects: python-novaclient
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1457554
Title:
Public bug reported:
*critical for data processing*
In the Data Processing UI (Sahara), in each of the panels that have
"Create X" buttons to create each object, those create buttons are
currently resulting in a non-modal form that is broken.
** Affects: horizon
Importance: Undecided
Public bug reported:
It is possible for Keystone to fail to issue tokens when using an
external identity backend, like LDAP, if the user IDs of a different
format than UUID. This is because the Fernet token formatter attempts to
convert the UUID to bytes before packing the payload. This is done to
Public bug reported:
When i run this on empty db :
```
neutron-db-manage --config-file /etc/neutron/neutron.conf --config-file
/etc/neutron/plugins/ml2/ml2_conf.ini upgrade head
```
I have this error :
```
INFO [alembic.migration] Running upgrade 26b54cf9024d -> 14be42f3d0a5, Add
default s
Public bug reported:
When creating a vm qemu-nbd returned error code and created ephemeral
disk with 5 gigs instead of requested 350gigs. After nova rootwrap
returned non-0 code I assume vm creation should fail.
1. Openstack version:
ii nova-compute 1:2014.2-fuel6.0~mira19
This bug was fixed in the package nova - 1:2014.1.4-0ubuntu2.1
---
nova (1:2014.1.4-0ubuntu2.1) trusty; urgency=medium
* Ensure that compute manager restarts during instance power
operations don't leave instances stuck in transitional task
states (LP: #1304333):
- d/p/re
** No longer affects: designate
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1458945
Title:
Use graduated oslo.policy instead of oslo-incubator code
Status in OpenStack Key Management
Gotta get this one out of here too, I guess.
** Changed in: neutron
Status: New => Invalid
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1453906
Title:
Implement Routing Network
I'm sorry to offend you with this.
** Changed in: neutron
Status: New => Invalid
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1453921
Title:
Implement Address Scopes
Status in
Public bug reported:
It is possible to send traffic through port with
port_security_enabled=True.
Steps to reproduce.
1) Create three VMS on one network:
Guest os:
ubuntu-14.04
"destination" VM to ping (10.100.0.3)
"router" VM to send traffic through (10.100.0.2)
"source"
** Changed in: ossa
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1443598
Title:
[OSSA 2015-008] backend_argument containing a password lea
Public bug reported:
The "pure" SAML assertion example in [1] is not a valid assertion
generated by keystone and the ECP wrapped one is missing the two new
attributes "openstack_user_domain" and "openstack_project_domain".
[1] https://github.com/openstack/keystone-specs/blob/master/api/v3
/identi
Public bug reported:
Currently we have a documentation to enable the Federation extension
[1]. Although there is some steps that are no longer needed, some of
them need to be executed in order to the functionality properly work:
add the "saml2" auth method, install xmlsec1 and pysaml2. These steps
Why was this marked invalid?
** Changed in: keystone
Importance: Undecided => Low
** Changed in: keystone
Status: Invalid => Fix Committed
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad
>From Ken Chen in https://bugs.launchpad.net/python-
keystoneclient/+bug/1457279
--
In keystoneclient/session.py file, _http_log_request method, we have below
codes:
if data:
string_parts.append("-d '%s'" % data)
logger.debug(' '.join(string_parts))
However, if d
https://review.openstack.org/#/c/173123/ has merged.
** Changed in: glance
Status: New => Invalid
** Changed in: keystonemiddleware
Status: New => Invalid
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Glance.
http
** No longer affects: manila
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1458945
Title:
Use graduated oslo.policy instead of oslo-incubator code
Status in OpenStack Key Management (B
Public bug reported:
When using Keystone v3 with multi-domain-driver in Juno on Centos, I
cann't deploy heat stack, because the heat user has no access to default
domain wich runs on sql
default -> SQL -> service user and heat
dom -> LDAP -> AD user
/var/log/heat/heat.log
2015-05-27 11
** No longer affects: sahara
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1458945
Title:
Use graduated oslo.policy instead of oslo-incubator code
Status in OpenStack Key Management (B
** Changed in: trove
Status: New => Invalid
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1458945
Title:
Use graduated oslo.policy instead of oslo-incubator code
Status in OpenS
Public bug reported:
Some devices may need to support VirtualVmxnet3 as a network. We should
to make sure VMware can handle that case.
** Affects: nova
Importance: Low
Assignee: sahid (sahid-ferdjaoui)
Status: Fix Committed
** Tags: juno-backport-potential kilo-backport-poten
** Changed in: nova
Status: Invalid => In Progress
** Changed in: nova
Assignee: (unassigned) => Matthew Gilliard (matthew-gilliard-u)
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://b
41 matches
Mail list logo