Reviewed: https://review.opendev.org/c/openstack/neutron/+/814892
Committed:
https://opendev.org/openstack/neutron/commit/41159bd9a4178a5f8a4fdc90b034c48fa9880cac
Submitter: "Zuul (22348)"
Branch:master
commit 41159bd9a4178a5f8a4fdc90b034c48fa9880cac
Author: Slawek Kaplonski
Date: Thu Oct
Public bug reported:
We've updated most policies in neutron to adhere to common personas
across OpenStack (system-admin, system-member, system-reader, project-
admin, project-member, project-reader).
In the process of updating the policies we changed the default policy
for listing external networ
** Changed in: neutron
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1912779
Title:
[ovn-octavia-provider]: batch update fails when members to
** Changed in: neutron
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1916646
Title:
ovn-octavia-provider can attempt to write protocol=None to
** Changed in: neutron
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1888646
Title:
[OVN Octavia Provider]
octavia_tempest_plugin.tests.api
** Changed in: neutron
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1906568
Title:
[OVN Octavia Provider] OVN provider not setting member off
Public bug reported:
In order for keystonemiddleware to validate access rules it needs to be
configured with the service_type [0].
We should update the application credential documentation [1] to
describe this, or potentially add a new section to the admin guide so
that operators are aware they n
Public bug reported:
This RFE proposes to add the ability fro FIPs and GW IPs to inherit the
QoS policy from the network they are located, same as with port QoS.
This RFE implies changes in:
- The FIP object, to add the network QoS policy of the (external) network that
is located.
- A change in
Adding upstream OpenStack Nova to the bug to get their perspective on
why the OpenStack datasource is exposing MTU when it knows that the
network should be configured using DHCP ref Brett's question in #21.
** Also affects: nova
Importance: Undecided
Status: New
--
You received this bu
I'm moving this back to new on master to keep it listed in our bug
query.
** Changed in: nova
Status: Invalid => New
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/
10 matches
Mail list logo