Public bug reported:
Description
===
Some of Compute APIs supports regular expression, such as the following one:
https://docs.openstack.org/api-ref/compute/?expanded=list-servers-detail#list-server-request
name (Optional) query string
Filters the response by a server name, as a st
** Also affects: oslo.service
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/2028724
Title:
neutron should forbid configuring agent_down_time
Public bug reported:
This bug is created to improve neutron to not allow configuring
agent_down_time to values that are known to misbehave because of
limitations of CPython C-types interface that doesn't seem to support
any values larger than (2^32 / 2 - 1) [in miliseconds] for green thread
waitin
** Also affects: nova (Ubuntu)
Importance: Undecided
Status: New
** Also affects: nova (Ubuntu Focal)
Importance: Undecided
Status: New
** Changed in: nova (Ubuntu)
Status: New => Invalid
** Changed in: nova (Ubuntu Focal)
Status: New => In Progress
** Changed
Public bug reported:
I wanted to lease a new node in
https://chi.tacc.chameleoncloud.org/project/, but when I reached the
webpage, I found this pop up below:
Error: Unable to retrieve usage information. Details
Unexpected API Error. Please report this at http://bugs.launchpad.net/nova/ and
attac
Both patches are merged:
https://review.opendev.org/c/openstack/devstack/+/888906
https://review.opendev.org/c/openstack/devstack/+/888953
** Changed in: devstack
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Yahoo!
Engineering Tea
** Changed in: tempest
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/2027817
Title:
neutron slow jobs before xena broken with ERROR: unknow
Public bug reported:
In some cases, customers want to specify a port list for 'source_port'(or
destination_port) when create a firewall rule.
Currently the api of firewall_rule could not meet the demand. So we want to
define a new api which could support it.
eg. api :
"firewall_rule":{
"nam
Public bug reported:
Originally reported in the Octavia launchpad:
https://bugs.launchpad.net/octavia/+bug/2028524
The commit https://review.opendev.org/c/openstack/neutron/+/882588
introduced a regression in Octavia
It adds a validate_port_binding_and_virtual_port function that raises an
excep
9 matches
Mail list logo