Public bug reported:
1.Create 2 security groups:
test-security1, with rule(ingress, IPv4, 1-65535/tcp, remote_group:
test-security1)
test-security2, with rule(ingress, IPv4, 1-65535/tcp, remote_group:
test-security2)
2.Create a VM(IP: 40.0.0.46) with test-security1, then the open flows showed:
Reviewed: https://review.opendev.org/693645
Committed:
https://git.openstack.org/cgit/openstack/neutron/commit/?id=139b496ef957364caee6861fd16676cdfb76a38b
Submitter: Zuul
Branch:master
commit 139b496ef957364caee6861fd16676cdfb76a38b
Author: Reedip
Date: Mon Nov 11 10:54:42 2019 +0900
Public bug reported:
see following logs when doing live migration on s390s platform with KVM
openstack server migrate --live kvm02 --block-migration d28caa4a-215b-
44c8-bed0-e0e7faca07e5
ogs:
2019-10-10 12:03:25.710 19003 ERROR nova.virt.libvirt.driver [req-
83d11ac0-3414-489e-8ad2-bfd0078e059
** Also affects: nova/stein
Importance: Undecided
Status: New
** Also affects: nova/rocky
Importance: Undecided
Status: New
** Also affects: nova/train
Importance: Undecided
Status: New
** Changed in: nova/train
Status: New => Fix Released
** Changed in: nov
Was just going through old bugs and patches and noticed this one,
updating based on information I received.
>From Salvatore:
"My recollection is the same as Akihiro. A tenant has no knowledge of IP
addressing beyond the resource it owns, and since a no-snat
configuration implies E-W L3 forwarding
Public bug reported:
This commit (https://git.launchpad.net/cloud-
init/commit/?id=4bc399e0cd0b7e9177f948aecd49f6b8323ff30b) has a diff
that includes the removal of passing headers through to readurl from
read_file_or_url: https://github.com/canonical/cloud-
init/commit/4bc399e0cd0b7e9177f948aecd4
Reviewed: https://review.opendev.org/673463
Committed:
https://git.openstack.org/cgit/openstack/nova/commit/?id=9ad54f3dacbd372271f441baea5380f913072dde
Submitter: Zuul
Branch:master
commit 9ad54f3dacbd372271f441baea5380f913072dde
Author: Lee Yarwood
Date: Mon Jul 29 16:25:45 2019 +0100
** Changed in: neutron
Status: New => Invalid
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1854050
Title:
minor versions 14.0.2 & 14.0.3 are not compatible in dvr-ha
Status in
Reviewed: https://review.opendev.org/688290
Committed:
https://git.openstack.org/cgit/openstack/horizon/commit/?id=ea2212ebe59567d8ea21778cff5128e1029be045
Submitter: Zuul
Branch:master
commit ea2212ebe59567d8ea21778cff5128e1029be045
Author: Hongbin Lu
Date: Sun Oct 13 02:51:53 2019 +
Clearly we're not having problems building docs and this can't be
triaged with the actual doc build logs and the error. Did you have local
changes that might have caused the docs build to fail? If so,
investigate the log for errors. Do you have stale pyc files locally? If
so, do:
find . -name *.py
** Also affects: nova/train
Importance: Undecided
Status: New
** Changed in: nova/train
Importance: Undecided => Low
** Changed in: nova/train
Status: New => In Progress
** Changed in: nova/train
Assignee: (unassigned) => Matt Riedemann (mriedem)
--
You received this b
According to the Project Testing Interface (PTI), py36 isrequired for
Ussuri:
https://governance.openstack.org/tc/reference/runtimes/ussuri.html
#python-runtime-for-ussuri
Reopened the bug and marked as critical.
** Changed in: neutron
Status: Won't Fix => New
** Changed in: neutron
Im
Public bug reported:
Running openstack flavor set from a project in which a user has an admin
role (but the project is not an admin project) allows the provided
project to be mapped to the flavor even if the permissions are
insufficient for the user to verify the project provided i.e the
generated
Public bug reported:
Environment is neutron 14.0.2 with DVR and HA (OVS).
Upgraded a single compute or deployed new with 14.0.3.
Expected outcome:
Minor versions should be fully compatible and neutron should work with
the same major version.
Actual outcome:
Can't schedule instances on computes
Public bug reported:
This should be a NOTE, not a bug in case someone who meets this issue
someday, since the minimum support python version of neutron is 3.7 now.
Branch: master
heads:
2a8b70d Merge "Update security group rule if port range is all ports"
fd5e292 Merge "Remove neutron-grenade jo
Reviewed: https://review.opendev.org/691908
Committed:
https://git.openstack.org/cgit/openstack/nova/commit/?id=5a20996405c5788855a2457283bbbe7d78140a9c
Submitter: Zuul
Branch:master
commit 5a20996405c5788855a2457283bbbe7d78140a9c
Author: Matt Riedemann
Date: Tue Oct 29 12:10:08 2019 -040
Public bug reported:
When a developer is implementing an Authentication plugin [1] they can
only return None and setup the relevant information in the auth context
or raise an Unauthorized exception. However, in some cases (like an
OpenID Connect plugin) it is needed to perform a redirect to the
p
Public bug reported:
Hi,
Horizon's tests are failing with python3.8, see below :
+ http_proxy=127.0.0.1:9 https_proxy=127.0.0.9:9 HTTP_PROXY=127.0.0.1:9
HTTPS_PROXY=127.0.0.1:9
PYTHONPATH=/<>/debian/tmp/usr/lib/python3/dist-packages
PYTHON=python3.8 python3.8 -m coverage run /<>/manage.py tes
Public bug reported:
As the Neutron bug[1] and the similar cyborg problem[2] shows that the
way nova models the compute RP in placement became an external interface
for other OpenStack projects to create child RPs under the compute RP. I
think we don't have this external interface documented in No
19 matches
Mail list logo