[Bug 1369465] Change abandoned on nova (stable/kilo)

2016-03-19 Thread OpenStack Infra
Change abandoned by Liang Chen (liang.c...@canonical.com) on branch: stable/kilo
Review: https://review.openstack.org/294599

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1369465

Title:
  nova resize doesn't resize(extend) rbd disk files when using rbd disk
  backend

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1369465/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1369465] Fix proposed to nova (stable/kilo)

2016-03-19 Thread OpenStack Infra
Fix proposed to branch: stable/kilo
Review: https://review.openstack.org/294599

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1369465

Title:
  nova resize doesn't resize(extend) rbd disk files when using rbd disk
  backend

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1369465/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1554227] Related fix proposed to nova (master)

2016-03-08 Thread OpenStack Infra
Related fix proposed to branch: master
Review: https://review.openstack.org/290079

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1554227

Title:
  DHCP unicast requests are not responded to

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1554227/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1489059] Fix merged to neutron-vpnaas (master)

2016-03-04 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/287802
Committed: 
https://git.openstack.org/cgit/openstack/neutron-vpnaas/commit/?id=b4b22a1f373794a7a13ec85a8386587fc541cb49
Submitter: Jenkins
Branch:master

commit b4b22a1f373794a7a13ec85a8386587fc541cb49
Author: Ihar Hrachyshka 
Date:   Thu Mar 3 14:48:11 2016 +0100

Put py34 first in the env order of tox

To solve the problem of "db type could not be determined" on py34 we
have to run first the py34 env, then, run py27. This patch puts py34
first on the tox.ini list of envs to avoid this problem to happen.

Change-Id: I9457f7e05adb77d4b034ef01e7e51d95fc066013
Closes-bug: #1489059

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to python-ironicclient in Ubuntu.
https://bugs.launchpad.net/bugs/1489059

Title:
  "db type could not be determined" running py34

To manage notifications about this bug go to:
https://bugs.launchpad.net/aodh/+bug/1489059/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1489059] Fix proposed to neutron-vpnaas (master)

2016-03-03 Thread OpenStack Infra
Fix proposed to branch: master
Review: https://review.openstack.org/287802

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to python-ironicclient in Ubuntu.
https://bugs.launchpad.net/bugs/1489059

Title:
  "db type could not be determined" running py34

To manage notifications about this bug go to:
https://bugs.launchpad.net/aodh/+bug/1489059/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1369465] Re: nova resize doesn't resize(extend) rbd disk files when using rbd disk backend

2016-02-26 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/228505
Committed: 
https://git.openstack.org/cgit/openstack/nova/commit/?id=eb1f67c4374fd8210829deac8e49d6f3df6cae4b
Submitter: Jenkins
Branch:stable/liberty

commit eb1f67c4374fd8210829deac8e49d6f3df6cae4b
Author: Nicolas Simonds 
Date:   Mon Jun 1 13:58:37 2015 -0700

libvirt: Fix/implement revert-resize for RBD-backed images

* Makes a snapshot of Ceph-backed roots prior to resize
* Rolls back to snapshot on revert
* Destroys resize snapshots on image cleanup

Conflicts:
nova/tests/unit/virt/libvirt/test_driver.py

because (I70215fb25ef25422786b96d33c91d8f1d4760a23) isn't on liberty

(cherry picked from commit 29476a67d4d4ff7eedd97f589422d47015111448)

Closes-Bug: 1369465
Closes-Bug: 1314526
Change-Id: I328d2c41696a9c0f090f822a51ea42fac83f62ec


** Changed in: nova/liberty
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1369465

Title:
  nova resize doesn't resize(extend) rbd disk files when using rbd disk
  backend

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1369465/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1489059] Re: "db type could not be determined" running py34

2016-02-16 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/279934
Committed: 
https://git.openstack.org/cgit/openstack/networking-ofagent/commit/?id=14184ef7cb5ce5a6b61e0fcec89412f6b2630cb5
Submitter: Jenkins
Branch:master

commit 14184ef7cb5ce5a6b61e0fcec89412f6b2630cb5
Author: Ayush Garg 
Date:   Sun Feb 14 14:04:46 2016 +0530

Run py34 first in default tox run

this avoids py34 failure in default tox run when testrepository is
not yet initialized (e.g. fresh repo clone).

Change-Id: I23ec5be0ea60ecfc5344c705bb08fc91e08d271f
Closes-Bug: #1489059


** Changed in: networking-ofagent
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to python-ironicclient in Ubuntu.
https://bugs.launchpad.net/bugs/1489059

Title:
  "db type could not be determined" running py34

To manage notifications about this bug go to:
https://bugs.launchpad.net/aodh/+bug/1489059/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1460164] Re: restart of openvswitch-switch causes instance network down when l2population enabled

2016-02-15 Thread OpenStack Infra
** Changed in: cloud-archive/kilo
   Status: New => In Progress

** Changed in: cloud-archive/kilo
 Assignee: (unassigned) => Ihar Hrachyshka (ihar-hrachyshka)

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1460164

Title:
  restart of openvswitch-switch causes instance network down when
  l2population enabled

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-archive/+bug/1460164/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1489059] Re: "db type could not be determined" running py34

2016-02-14 Thread OpenStack Infra
Fix proposed to branch: master
Review: https://review.openstack.org/279934

** Changed in: networking-ofagent
   Status: New => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to python-ironicclient in Ubuntu.
https://bugs.launchpad.net/bugs/1489059

Title:
  "db type could not be determined" running py34

To manage notifications about this bug go to:
https://bugs.launchpad.net/aodh/+bug/1489059/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1398999] Re: Block migrate with attached volumes copies volumes to themselves

2016-02-10 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/227278
Committed: 
https://git.openstack.org/cgit/openstack/nova/commit/?id=23fd0389f0e23e7969644079f4b1ad8504cbb8cb
Submitter: Jenkins
Branch:master

commit 23fd0389f0e23e7969644079f4b1ad8504cbb8cb
Author: Pawel Koniszewski 
Date:   Wed Feb 10 13:09:44 2016 +0100

Allow block live migration of an instance with attached volumes

Since libvirt 1.2.17 it is possible to select which block devices
should be migrated to destination host. Block devices that are not
provided will not be migrated. It means that it is possible to
exclude volumes from block migration and therefore prevent volumes
from being copied to themselves.

This patch implements new check of libvirt version. If version is
higher or equal to 1.2.17 it is possible to block live migrate vm
with attached volumes.

Co-Authored-By: Bartosz Fic 

Change-Id: I8fcc3ef3cb5d9fd3a95067929c496fdb5976fd41
Closes-Bug: #1398999
Partially implements: blueprint block-live-migrate-with-attached-volumes


** Changed in: nova
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1398999

Title:
  Block migrate with attached volumes copies volumes to themselves

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1398999/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 997700] Related fix proposed to keystone (master)

2016-02-10 Thread OpenStack Infra
Related fix proposed to branch: master
Review: https://review.openstack.org/278791

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to keystone in Ubuntu.
https://bugs.launchpad.net/bugs/997700

Title:
  LDAP should not check username on "sn" field

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/997700/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1460164] Re: restart of openvswitch-switch causes instance network down when l2population enabled

2016-01-30 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/272566
Committed: 
https://git.openstack.org/cgit/openstack/neutron/commit/?id=05f8099a68918342b6e0a65e78619becfa19a4ae
Submitter: Jenkins
Branch:stable/liberty

commit 05f8099a68918342b6e0a65e78619becfa19a4ae
Author: James Page 
Date:   Fri Dec 18 15:02:11 2015 +

Ensure that tunnels are fully reset on ovs restart

When the l2population mechanism driver is enabled, if ovs is restarted
tunnel ports are not re-configured in full due to stale ofport handles
in the OVS agent.

Reset all handles when OVS is restarted to ensure that tunnels are
fully recreated in this situation.

Change-Id: If0e034a034a7f000a1c58aa8a43d2c857dee6582
Closes-bug: #1460164
(cherry picked from commit 17c14977ce0e2291e911739f8c85838f1c1f3473)


** Tags added: in-stable-liberty

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1460164

Title:
  restart of openvswitch-switch causes instance network down when
  l2population enabled

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1460164/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1460164] Re: restart of openvswitch-switch causes instance network down when l2population enabled

2016-01-26 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/259485
Committed: 
https://git.openstack.org/cgit/openstack/neutron/commit/?id=17c14977ce0e2291e911739f8c85838f1c1f3473
Submitter: Jenkins
Branch:master

commit 17c14977ce0e2291e911739f8c85838f1c1f3473
Author: James Page 
Date:   Fri Dec 18 15:02:11 2015 +

Ensure that tunnels are fully reset on ovs restart

When the l2population mechanism driver is enabled, if ovs is restarted
tunnel ports are not re-configured in full due to stale ofport handles
in the OVS agent.

Reset all handles when OVS is restarted to ensure that tunnels are
fully recreated in this situation.

Change-Id: If0e034a034a7f000a1c58aa8a43d2c857dee6582
Closes-bug: #1460164


** Changed in: neutron
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1460164

Title:
  restart of openvswitch-switch causes instance network down when
  l2population enabled

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1460164/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1460164] Fix proposed to neutron (stable/liberty)

2016-01-26 Thread OpenStack Infra
Fix proposed to branch: stable/liberty
Review: https://review.openstack.org/272566

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1460164

Title:
  restart of openvswitch-switch causes instance network down when
  l2population enabled

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1460164/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1460164] Fix proposed to neutron (stable/kilo)

2016-01-26 Thread OpenStack Infra
Fix proposed to branch: stable/kilo
Review: https://review.openstack.org/272643

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1460164

Title:
  restart of openvswitch-switch causes instance network down when
  l2population enabled

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1460164/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1493303] Fix merged to swift (stable/liberty)

2016-01-21 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/270235
Committed: 
https://git.openstack.org/cgit/openstack/swift/commit/?id=8c1976aa771f8c43c5dbe676bd9a5efc69f09eae
Submitter: Jenkins
Branch:stable/liberty

commit 8c1976aa771f8c43c5dbe676bd9a5efc69f09eae
Author: Samuel Merritt 
Date:   Tue Dec 8 16:36:05 2015 -0800

Fix memory/socket leak in proxy on truncated SLO/DLO GET

When a client disconnected while consuming an SLO or DLO GET response,
the proxy would leak a socket. This could be observed via strace as a
socket that had shutdown() called on it, but was never closed. It
could also be observed by counting entries in /proc//fd, where
 is the pid of a proxy server worker process.

This is due to a memory leak in SegmentedIterable. A SegmentedIterable
has an 'app_iter' attribute, which is a generator. That generator
references 'self' (the SegmentedIterable object). This creates a
cyclic reference: the generator refers to the SegmentedIterable, and
the SegmentedIterable refers to the generator.

Python can normally handle cyclic garbage; reference counting won't
reclaim it, but the garbage collector will. However, objects with
finalizers will stop the garbage collector from collecting them* and
the cycle of which they are part.

For most objects, "has finalizer" is synonymous with "has a __del__
method". However, a generator has a finalizer once it's started
running and before it finishes: basically, while it has stack frames
associated with it**.

When a client disconnects mid-stream, we get a memory leak. We have
our SegmentedIterable object (call it "si"), and its associated
generator. si.app_iter is the generator, and the generator closes over
si, so we have a cycle; and the generator has started but not yet
finished, so the generator needs finalization; hence, the garbage
collector won't ever clean it up.

The socket leak comes in because the generator *also* refers to the
request's WSGI environment, which contains wsgi.input, which
ultimately refers to a _socket object from the standard
library. Python's _socket objects only close their underlying file
descriptor when their reference counts fall to 0***.

This commit makes SegmentedIterable.close() call
self.app_iter.close(), thereby unwinding its generator's stack and
making it eligible for garbage collection.

* in Python < 3.4, at least. See PEP 442.

** see PyGen_NeedsFinalizing() in Objects/genobject.c and also
   has_finalizer() in Modules/gcmodule.c in Python.

*** see sock_dealloc() in Modules/socketmodule.c in Python. See
sock_close() in the same file for the other half of the sad story.

This closes CVE-2016-0738.

Closes-Bug: 1493303

Change-Id: I74ea49eaa7d5c372cdc2399148d5495d3007dbd0
Co-Authored-By: Kota Tsuyuzaki 


** Changed in: swift
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to swift in Ubuntu.
https://bugs.launchpad.net/bugs/1493303

Title:
  [OSSA 2016-004] Swift proxy memory leak on unfinished read
  (CVE-2016-0738)

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-archive/+bug/1493303/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1514325] Change abandoned on cinder (stable/kilo)

2016-01-11 Thread OpenStack Infra
Change abandoned by Eric Harney (ehar...@redhat.com) on branch: stable/kilo
Review: https://review.openstack.org/246772
Reason: -2 in November, and I agree with that, so cleaning this one out of the 
queue.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to cinder in Ubuntu.
https://bugs.launchpad.net/bugs/1514325

Title:
  VersionedObject.__repr__ should return encoded string

To manage notifications about this bug go to:
https://bugs.launchpad.net/cinder/+bug/1514325/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1398999] Related fix merged to nova (master)

2016-01-06 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/252506
Committed: 
https://git.openstack.org/cgit/openstack/nova/commit/?id=f0d5fc61916f41214da580097a09136e4ed2c99a
Submitter: Jenkins
Branch:master

commit f0d5fc61916f41214da580097a09136e4ed2c99a
Author: Pawel Koniszewski 
Date:   Fri Dec 11 03:28:50 2015 +0100

Get list of disks to copy early to avoid multiple DB hits

To support selective block migration we need to read block devices
from nova block device mappings instead of libvirt block info.
It means that in current implementation we would call
_live_migration_copy_disk_paths two times - from
live_migration_operations and from live_migration_monitor.
To avoid that this change gets disk paths early and pass them as
and additional paremeter to live migration monitor.

Change-Id: Ic894cfc7374ba06b436b2a76a5984012d1dba3a5
Related-bug: #1398999

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1398999

Title:
  Block migrate with attached volumes copies volumes to themselves

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1398999/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1497309] Re: l3-agent unable to parse output from ip netns list (iproute2 >= 4.0)

2015-12-24 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/258493
Committed: 
https://git.openstack.org/cgit/openstack/neutron/commit/?id=1d8aff33a6b153c54760d2a141128ef4c045308e
Submitter: Jenkins
Branch:stable/liberty

commit 1d8aff33a6b153c54760d2a141128ef4c045308e
Author: James Page 
Date:   Fri Sep 18 16:38:47 2015 +0100

Add compatibility with iproute2 >= 4.0

The ip netns list command adds additional id data in more recent
versions of iproute2 of the format:

  qdhcp-35fc068a-750d-4add-b1d2-af392dbd8790 (id: 1)

Update parsing to deal with old and new formats.

Change-Id: I0d3fc4262284172f5ad31e4f2f78ae1fb33b4228
Closes-Bug: 1497309
(cherry picked from commit 3aefdf4de76fdcdc02093bc631e339f9ecd4c707)


** Tags added: in-stable-liberty

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1497309

Title:
  l3-agent unable to parse output from ip netns list (iproute2 >= 4.0)

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1497309/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1497309] Re: l3-agent unable to parse output from ip netns list (iproute2 >= 4.0)

2015-12-21 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/258503
Committed: 
https://git.openstack.org/cgit/openstack/neutron/commit/?id=d65576d1665c3b7a8d6b2e23749a3c703ee79c76
Submitter: Jenkins
Branch:stable/kilo

commit d65576d1665c3b7a8d6b2e23749a3c703ee79c76
Author: James Page 
Date:   Fri Sep 18 16:38:47 2015 +0100

Add compatibility with iproute2 >= 4.0

The ip netns list command adds additional id data in more recent
versions of iproute2 of the format:

  qdhcp-35fc068a-750d-4add-b1d2-af392dbd8790 (id: 1)

Update parsing to deal with old and new formats.

Conflicts:
neutron/tests/functional/agent/test_l3_agent.py

Change-Id: I0d3fc4262284172f5ad31e4f2f78ae1fb33b4228
Closes-Bug: 1497309
(cherry picked from commit 3aefdf4de76fdcdc02093bc631e339f9ecd4c707)


** Tags added: in-stable-kilo

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1497309

Title:
  l3-agent unable to parse output from ip netns list (iproute2 >= 4.0)

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1497309/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1460164] Re: restart of openvswitch-switch causes instance network down when l2population enabled

2015-12-18 Thread OpenStack Infra
Fix proposed to branch: master
Review: https://review.openstack.org/259485

** Changed in: neutron
   Status: New => In Progress

** Changed in: neutron
 Assignee: (unassigned) => James Page (james-page)

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1460164

Title:
  restart of openvswitch-switch causes instance network down when
  l2population enabled

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1460164/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1497309] Fix proposed to neutron (stable/liberty)

2015-12-16 Thread OpenStack Infra
Fix proposed to branch: stable/liberty
Review: https://review.openstack.org/258493

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1497309

Title:
  l3-agent unable to parse output from ip netns list (iproute2 >= 4.0)

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1497309/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1497309] Fix proposed to neutron (stable/kilo)

2015-12-16 Thread OpenStack Infra
Fix proposed to branch: stable/kilo
Review: https://review.openstack.org/258503

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1497309

Title:
  l3-agent unable to parse output from ip netns list (iproute2 >= 4.0)

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1497309/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1516085] Re: quotas calls fail when CONF.keymgr.encryption_auth_url is not configured

2015-12-08 Thread OpenStack Infra
Fix proposed to branch: stable/liberty
Review: https://review.openstack.org/254700

** Changed in: cinder/liberty
   Status: New => In Progress

** Changed in: cinder/liberty
 Assignee: (unassigned) => Szymon Borkowski (szymon-borkowski)

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to cinder in Ubuntu.
https://bugs.launchpad.net/bugs/1516085

Title:
  quotas calls fail when CONF.keymgr.encryption_auth_url is not
  configured

To manage notifications about this bug go to:
https://bugs.launchpad.net/cinder/+bug/1516085/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1516085] Re: quotas calls fail when CONF.keymgr.encryption_auth_url is not configured

2015-12-08 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/254700
Committed: 
https://git.openstack.org/cgit/openstack/cinder/commit/?id=fa7d0916d849e9c6f93e08f8323eb2a886bcffc0
Submitter: Jenkins
Branch:stable/liberty

commit fa7d0916d849e9c6f93e08f8323eb2a886bcffc0
Author: Szymon Borkowski 
Date:   Tue Dec 1 14:12:03 2015 +0100

Use proper config option to connect to keystone

Earlier, quotas used to authenticate to endpoint from not required
option located in keymgr.encryption_auth_url. Now, the required
auth_uri option from config file is used to authenticate to
keystone.

Co-Authored-By: Michal Dulko 
Change-Id: I1076527704f8def2c6755c060df49232e5ebe805
Closes-Bug: 1516085
(cherry picked from commit 109353dedbe53201eb684c5658d9193115df)


** Changed in: cinder/liberty
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to cinder in Ubuntu.
https://bugs.launchpad.net/bugs/1516085

Title:
  quotas calls fail when CONF.keymgr.encryption_auth_url is not
  configured

To manage notifications about this bug go to:
https://bugs.launchpad.net/cinder/+bug/1516085/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1516085] Re: quotas calls fail when CONF.keymgr.encryption_auth_url is not configured

2015-12-04 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/251937
Committed: 
https://git.openstack.org/cgit/openstack/cinder/commit/?id=109353dedbe53201eb684c5658d9193115df
Submitter: Jenkins
Branch:master

commit 109353dedbe53201eb684c5658d9193115df
Author: Szymon Borkowski 
Date:   Tue Dec 1 14:12:03 2015 +0100

Use proper config option to connect to keystone

Earlier, quotas used to authenticate to endpoint from not required
option located in keymgr.encryption_auth_url. Now, the required
auth_uri option from config file is used to authenticate to
keystone.

Co-Authored-By: Michal Dulko 
Change-Id: I1076527704f8def2c6755c060df49232e5ebe805
Closes-Bug: 1516085


** Changed in: cinder
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to cinder in Ubuntu.
https://bugs.launchpad.net/bugs/1516085

Title:
  quotas calls fail when CONF.keymgr.encryption_auth_url is not
  configured

To manage notifications about this bug go to:
https://bugs.launchpad.net/cinder/+bug/1516085/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1516085] Re: quotas calls fail when CONF.keymgr.encryption_auth_url is not configured

2015-12-03 Thread OpenStack Infra
** Changed in: cinder
 Assignee: Szymon Borkowski (szymon-borkowski) => Michal Dulko 
(michal-dulko-f)

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to cinder in Ubuntu.
https://bugs.launchpad.net/bugs/1516085

Title:
  quotas calls fail when CONF.keymgr.encryption_auth_url is not
  configured

To manage notifications about this bug go to:
https://bugs.launchpad.net/cinder/+bug/1516085/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1398999] Related fix proposed to nova (master)

2015-12-02 Thread OpenStack Infra
Related fix proposed to branch: master
Review: https://review.openstack.org/252506

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1398999

Title:
  Block migrate with attached volumes copies volumes to themselves

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1398999/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1516085] Change abandoned on cinder (master)

2015-12-02 Thread OpenStack Infra
Change abandoned by Michal Dulko (michal.du...@intel.com) on branch: master
Review: https://review.openstack.org/245572
Reason: Abandoning in favor of https://review.openstack.org/#/c/251937/

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to cinder in Ubuntu.
https://bugs.launchpad.net/bugs/1516085

Title:
  quotas calls fail when CONF.keymgr.encryption_auth_url is not
  configured

To manage notifications about this bug go to:
https://bugs.launchpad.net/cinder/+bug/1516085/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1353939] Change abandoned on nova (stable/juno)

2015-12-01 Thread OpenStack Infra
Change abandoned by Matt Riedemann (mrie...@us.ibm.com) on branch: stable/juno
Review: https://review.openstack.org/221529
Reason: Juno is EOL soon.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1353939

Title:
  Rescue fails with 'Failed to terminate process: Device or resource
  busy' in the n-cpu log

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-archive/+bug/1353939/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1516085] Re: quotas calls fail when CONF.keymgr.encryption_auth_url is not configured

2015-12-01 Thread OpenStack Infra
Fix proposed to branch: master
Review: https://review.openstack.org/251937

** Changed in: cinder
 Assignee: Michal Dulko (michal-dulko-f) => Szymon Borkowski 
(szymon-borkowski)

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to cinder in Ubuntu.
https://bugs.launchpad.net/bugs/1516085

Title:
  quotas calls fail when CONF.keymgr.encryption_auth_url is not
  configured

To manage notifications about this bug go to:
https://bugs.launchpad.net/cinder/+bug/1516085/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1516652] Re: 'lxd' is an unsupported hypervisor type

2015-11-19 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/245811
Committed: 
https://git.openstack.org/cgit/openstack/nova/commit/?id=050bc120594ffe865c3d823382afb56ea62f556e
Submitter: Jenkins
Branch:master

commit 050bc120594ffe865c3d823382afb56ea62f556e
Author: James Page 
Date:   Mon Nov 16 15:03:50 2015 +

Add 'lxd' to the list of recognized hypervisors

Currently its not possible to set the hypervisor_type on a
glance image to 'lxd' to ensure it gets targetted to the
right type of hypervisors as 'lxd' is not a recognised
hypervisor type.

Change-Id: I9607c2f062b5ae19480a92be313fd4e21aa43ca5
Closes-Bug: 1516652


** Changed in: nova
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1516652

Title:
  'lxd' is an unsupported hypervisor type

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1516652/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1516652] Re: 'lxd' is an unsupported hypervisor type

2015-11-16 Thread OpenStack Infra
Fix proposed to branch: master
Review: https://review.openstack.org/245811

** Changed in: nova
   Status: New => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1516652

Title:
  'lxd' is an unsupported hypervisor type

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1516652/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1374999] Change abandoned on nova (master)

2015-11-15 Thread OpenStack Infra
Change abandoned by Michael Still (mi...@stillhq.com) on branch: master
Review: https://review.openstack.org/135382
Reason: It sounds like this patch is now obsolete. Please restore it if that 
isn't the case.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1374999

Title:
  iSCSI volume detach does not correctly remove the multipath device
  descriptors

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1374999/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1498370] Re: DHCP agent: interface unplug leads to exception

2015-11-05 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/242003
Committed: 
https://git.openstack.org/cgit/openstack/neutron/commit/?id=a27b30d7263aefce0ffbae95316e4e5cd48165a5
Submitter: Jenkins
Branch:stable/kilo

commit a27b30d7263aefce0ffbae95316e4e5cd48165a5
Author: Gary Kotton 
Date:   Sun Sep 27 00:24:31 2015 -0700

DHCP: protect against case when device name is None

There are edge cases when the agent attempts to unplug an interface and
the device does not exist.

Closes-bug: #1498370
(cherry picked from commit caebc8fb8e8d9782746c3cc3ddc86f786342c819)
(cherry picked from commit 0b07910f33ed26fbdd13530eafbdefd74104424d)
Change-Id: I6917ec94f685f3dd3bff6aa1d43dc56aab76274a


** Tags added: in-stable-kilo

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1498370

Title:
  DHCP agent: interface unplug leads to exception

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1498370/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1398999] Re: Block migrate with attached volumes copies volumes to themselves

2015-11-02 Thread OpenStack Infra
** Changed in: nova
 Assignee: Bartosz Fic (bartosz-fic) => Pawel Koniszewski 
(pawel-koniszewski)

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1398999

Title:
  Block migrate with attached volumes copies volumes to themselves

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1398999/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1501772] Fix proposed to neutron (master)

2015-10-15 Thread OpenStack Infra
Fix proposed to branch: master
Review: https://review.openstack.org/235300

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1501772

Title:
  Metadata proxy process errors with binary user_data

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1501772/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1501703] Fix proposed to neutron (master)

2015-10-15 Thread OpenStack Infra
Fix proposed to branch: master
Review: https://review.openstack.org/235300

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1501703

Title:
  unit test failures on 32 bit architectures

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1501703/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1501703] Fix merged to neutron (master)

2015-10-15 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/235300
Committed: 
https://git.openstack.org/cgit/openstack/neutron/commit/?id=140ccc36d172bead2605968b3d61b36cca8a0040
Submitter: Jenkins
Branch:master

commit 6dcfe3a9362ae5fcf18e5cfb59663e43446cd59c
Author: Kevin Benton 
Date:   Tue Oct 6 19:28:47 2015 -0700

Mock oslo policy HTTPCheck instead of urllib

We were mocking internal behavior of oslo policy by
patching urllib. This will break with the upcoming oslo
release that switches to requests.

This patch changes the mock to the HTTPCheck level and we
can leave implementation details testing up to oslo_policy.

Change-Id: I07957f01307e25f1547197c720eea6e3e7f0ef5a
Closes-Bug: #1503890
(cherry picked from commit a0f1d9d6de1560be91d3001c8ac9f880a7a5a7e0)

Add testresources used by oslo.db fixture

If we use oslo.db fixtures, we'll need the package or
the next version of oslo.db release will break us.

Closes-Bug: #1503501
Change-Id: I7dfbf240333095d91a414ba15a439bdc4804eb25
(cherry picked from commit 86ad967e40c2c6752ec0fb46cfd3098ede0c7178)

Fix functional test_server tests

Now oslo.service 0.10.0 no longer sends SIGHUP to parent and
children services.

This was a chance introduced by 286a6ea, and since it invalidated
the very logic under test, this must be revised.

(cherry picked from commit 090fe713592c2b6398d999bfa03b80cbb2054609)

Change-Id: I18a11283925369bc91800244f196010a1bc3
Closes-bug: #1505438
(cherry picked from commit 090fe713592c2b6398d999bfa03b80cbb2054609)

Make test_server work with older versions of oslo.service

Change I18a11283925369bc91800244f196010a1bc3 fixed the test for
oslo.service >= 0.10.0, but it also broke it for older versions of
oslo.service. Since the library has minimal version of >= 0.7.0 in
requirements.txt, test should pass for those versions too.

Now, instead of validating that either reset() or restart() of workers
are triggered on SIGHUP, just validate that .start() is triggered the
expected number of times (either way, no matter how oslo.service decide
to clean up the children, they exit and then are respawned).

Change-Id: I41f9d3af780b3178b075bc1e7084f417a2bd1378
Closes-Bug: #1505645
(cherry picked from commit 7bb40921660cf29beb68e338e205499efd6ffa36)

Fixed multiple py34 gate issues

1. Scope mock of 'open' to module

By mocking 'open' at the module level, we can avoid affecting
'open' calls from other modules.

2. Stop using LOG.exception in contexts with no sys.exc_info set

Python 3.4 logger fills in record.exc_info with sys.exc_info() result
[1], and then it uses it to determine the current exception [2] to
append to the log message. Since there is no exception, exc_info[1] is
None, and we get AttributeError inside traceback module.

It's actually a bug in Python interpreter that it attempt to access the
attribute when there is no exception. It turns out that it's fixed in
latest master of cPython [3] (the intent of the patch does not seem
relevant, but it removes the offending code while reshuffling the code).
Note that now cPython correctly checks the exception value before
accessing its attributes [4].

The patch in cPython that resulted in the failure is [5] and is present
since initial Python 3k releases.

The patch in fixtures that broke us is [6].

[1]: https://hg.python.org/cpython/file/tip/Lib/logging/__init__.py#l1412
[2]: https://hg.python.org/cpython/file/tip/Lib/logging/__init__.py#l575
[3]: https://hg.python.org/cpython/rev/73afda5a4e4c
[4]: https://hg.python.org/cpython/rev/73afda5a4e4c#l6.484
[5]: https://hg.python.org/cpython/rev/2ee09afee126
[6]: 
https://github.com/testing-cabal/fixtures/commit/67dd2956943261e845a866dab155208c51da937e

Closes-Bug: #1503847
Closes-Bug: #1504053
Co-Authored-By: Ihar Hrachyshka 
Change-Id: I456b7846b8a53e4d3f8c91583685e0e1eaa84719
(cherry picked from commit 8f58bbf38f5984e70d6e0be7427deb99d7782d1d)

commit 0b07910f33ed26fbdd13530eafbdefd74104424d
Author: Gary Kotton 
Date:   Sun Sep 27 00:24:31 2015 -0700

DHCP: protect against case when device name is None

There are edge cases when the agent attempts to unplug an interface and
the device does not exist.

Change-Id: I6917ec94f685f3dd3bff6aa1d43dc56aab76274a
Closes-bug: #1498370
(cherry picked from commit caebc8fb8e8d9782746c3cc3ddc86f786342c819)

commit fb40dbbce9ac17ee43d8921aa62c28f1ea723fba
Author: shihanzhang 
Date:   Fri Sep 18 10:38:43 2015 +0800

Execute ipset command using check_exit_code

When l2 agent execute ipset command, we should pass
parameter 

[Bug 1501772] Fix merged to neutron (master)

2015-10-15 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/235300
Committed: 
https://git.openstack.org/cgit/openstack/neutron/commit/?id=140ccc36d172bead2605968b3d61b36cca8a0040
Submitter: Jenkins
Branch:master

commit 6dcfe3a9362ae5fcf18e5cfb59663e43446cd59c
Author: Kevin Benton 
Date:   Tue Oct 6 19:28:47 2015 -0700

Mock oslo policy HTTPCheck instead of urllib

We were mocking internal behavior of oslo policy by
patching urllib. This will break with the upcoming oslo
release that switches to requests.

This patch changes the mock to the HTTPCheck level and we
can leave implementation details testing up to oslo_policy.

Change-Id: I07957f01307e25f1547197c720eea6e3e7f0ef5a
Closes-Bug: #1503890
(cherry picked from commit a0f1d9d6de1560be91d3001c8ac9f880a7a5a7e0)

Add testresources used by oslo.db fixture

If we use oslo.db fixtures, we'll need the package or
the next version of oslo.db release will break us.

Closes-Bug: #1503501
Change-Id: I7dfbf240333095d91a414ba15a439bdc4804eb25
(cherry picked from commit 86ad967e40c2c6752ec0fb46cfd3098ede0c7178)

Fix functional test_server tests

Now oslo.service 0.10.0 no longer sends SIGHUP to parent and
children services.

This was a chance introduced by 286a6ea, and since it invalidated
the very logic under test, this must be revised.

(cherry picked from commit 090fe713592c2b6398d999bfa03b80cbb2054609)

Change-Id: I18a11283925369bc91800244f196010a1bc3
Closes-bug: #1505438
(cherry picked from commit 090fe713592c2b6398d999bfa03b80cbb2054609)

Make test_server work with older versions of oslo.service

Change I18a11283925369bc91800244f196010a1bc3 fixed the test for
oslo.service >= 0.10.0, but it also broke it for older versions of
oslo.service. Since the library has minimal version of >= 0.7.0 in
requirements.txt, test should pass for those versions too.

Now, instead of validating that either reset() or restart() of workers
are triggered on SIGHUP, just validate that .start() is triggered the
expected number of times (either way, no matter how oslo.service decide
to clean up the children, they exit and then are respawned).

Change-Id: I41f9d3af780b3178b075bc1e7084f417a2bd1378
Closes-Bug: #1505645
(cherry picked from commit 7bb40921660cf29beb68e338e205499efd6ffa36)

Fixed multiple py34 gate issues

1. Scope mock of 'open' to module

By mocking 'open' at the module level, we can avoid affecting
'open' calls from other modules.

2. Stop using LOG.exception in contexts with no sys.exc_info set

Python 3.4 logger fills in record.exc_info with sys.exc_info() result
[1], and then it uses it to determine the current exception [2] to
append to the log message. Since there is no exception, exc_info[1] is
None, and we get AttributeError inside traceback module.

It's actually a bug in Python interpreter that it attempt to access the
attribute when there is no exception. It turns out that it's fixed in
latest master of cPython [3] (the intent of the patch does not seem
relevant, but it removes the offending code while reshuffling the code).
Note that now cPython correctly checks the exception value before
accessing its attributes [4].

The patch in cPython that resulted in the failure is [5] and is present
since initial Python 3k releases.

The patch in fixtures that broke us is [6].

[1]: https://hg.python.org/cpython/file/tip/Lib/logging/__init__.py#l1412
[2]: https://hg.python.org/cpython/file/tip/Lib/logging/__init__.py#l575
[3]: https://hg.python.org/cpython/rev/73afda5a4e4c
[4]: https://hg.python.org/cpython/rev/73afda5a4e4c#l6.484
[5]: https://hg.python.org/cpython/rev/2ee09afee126
[6]: 
https://github.com/testing-cabal/fixtures/commit/67dd2956943261e845a866dab155208c51da937e

Closes-Bug: #1503847
Closes-Bug: #1504053
Co-Authored-By: Ihar Hrachyshka 
Change-Id: I456b7846b8a53e4d3f8c91583685e0e1eaa84719
(cherry picked from commit 8f58bbf38f5984e70d6e0be7427deb99d7782d1d)

commit 0b07910f33ed26fbdd13530eafbdefd74104424d
Author: Gary Kotton 
Date:   Sun Sep 27 00:24:31 2015 -0700

DHCP: protect against case when device name is None

There are edge cases when the agent attempts to unplug an interface and
the device does not exist.

Change-Id: I6917ec94f685f3dd3bff6aa1d43dc56aab76274a
Closes-bug: #1498370
(cherry picked from commit caebc8fb8e8d9782746c3cc3ddc86f786342c819)

commit fb40dbbce9ac17ee43d8921aa62c28f1ea723fba
Author: shihanzhang 
Date:   Fri Sep 18 10:38:43 2015 +0800

Execute ipset command using check_exit_code

When l2 agent execute ipset command, we should pass
parameter 

[Bug 1501772] Fix proposed to neutron (stable/juno)

2015-10-12 Thread OpenStack Infra
Fix proposed to branch: stable/juno
Review: https://review.openstack.org/233546

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1501772

Title:
  Metadata proxy process errors with binary user_data

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1501772/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1501772] Change abandoned on neutron (stable/juno)

2015-10-12 Thread OpenStack Infra
Change abandoned by Ihar Hrachyshka (ihrac...@redhat.com) on branch: stable/juno
Review: https://review.openstack.org/233546
Reason: Actually, we don't use oslo.log, neither py34 in Juno, so no need for 
the change.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1501772

Title:
  Metadata proxy process errors with binary user_data

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1501772/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1501772] Re: Metadata proxy process errors with binary user_data

2015-10-11 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/233136
Committed: 
https://git.openstack.org/cgit/openstack/neutron/commit/?id=118a76fd651c19ad098cdee9d0a122a00ddc4e3b
Submitter: Jenkins
Branch:stable/kilo

commit 118a76fd651c19ad098cdee9d0a122a00ddc4e3b
Author: Ihar Hrachyshka 
Date:   Thu Oct 1 17:13:25 2015 +0200

metadata: don't crash proxy on non-unicode user data

We attempt to log every successful metadata response with LOG.debug. But
as per oslo.log docs [1], we should make sure that what we pass into the
library is unicode.

Http.request returns a tuple of Response object and a string, which is
bytes in Python 2.x [2].

That's why we need to convert the response content to unicode before
passing it into oslo.log.

To achieve it, we utilize encodeutils.safe_decode with 'replace' errors
handling strategy, so that we don't get exceptions on input that does
not conform unicode.

For the unit test case, we pass a string that is not expected to convert
to unicode with errors='strict' strategy or similar, and check that we
still don't crash.

While at it, we remove a check for the number of log calls being
triggered, because it's something that we should avoid validating in
test cases, and it cannot trigger a real bug. The mock that was used to
count the number would also hide the bug that we try to reproduce.

Note that the bug does not require debug to be set because the crash
occurs before oslo.log machinery decides it should not log the message.

[1]: 
http://docs.openstack.org/developer/oslo.log/usage.html#no-more-implicit-conversion-to-unicode-str
[2]: 
http://bitworking.org/projects/httplib2/doc/html/libhttplib2.html#httplib2.Http.request

Conflicts:
neutron/agent/metadata/namespace_proxy.py
neutron/tests/unit/agent/metadata/test_namespace_proxy.py

Closes-Bug: #1501772
Change-Id: I6a32c40ff117fae43913386134c8981539697ce8
(cherry picked from commit 80e3d9be4923ecad17377b1d15c8392b8a43dac6)


** Tags added: in-stable-kilo

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1501772

Title:
  Metadata proxy process errors with binary user_data

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1501772/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1501772] Fix proposed to neutron (stable/kilo)

2015-10-09 Thread OpenStack Infra
Fix proposed to branch: stable/kilo
Review: https://review.openstack.org/233136

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1501772

Title:
  Metadata proxy process errors with binary user_data

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1501772/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1422046] Re: cinder backup-list is always listing all tenants's bug for admin

2015-10-07 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/227911
Committed: 
https://git.openstack.org/cgit/stackforge/ospurge/commit/?id=b97992d5099ce8aa9371a5b78461d11faacbea5a
Submitter: Jenkins
Branch:master

commit b97992d5099ce8aa9371a5b78461d11faacbea5a
Author: Yves-Gwenael Bourhis 
Date:   Fri Sep 25 17:23:06 2015 +0200

Do not list cinder backups as admin with cinderclient<1.4.0

Due to the following bug:
https://bugs.launchpad.net/python-cinderclient/+bug/1422046
We do not attempt to list cinder backups as admin if cinderclient's version 
is
lower than 1.4.0

Change-Id: I570971391cff80e1d6a484c330e80f901f5210b3
Closes-Bug: #1422046


** Changed in: ospurge
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to python-cinderclient in Ubuntu.
https://bugs.launchpad.net/bugs/1422046

Title:
  cinder backup-list is always listing all tenants's bug for admin

To manage notifications about this bug go to:
https://bugs.launchpad.net/ospurge/+bug/1422046/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1418590] Re: Instance is left in ACTIVE state even if rescue fails

2015-10-06 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/155120
Committed: 
https://git.openstack.org/cgit/openstack/nova/commit/?id=a9e4e2c9a5aaa4d675057790816aa395bc27e9bc
Submitter: Jenkins
Branch:master

commit a9e4e2c9a5aaa4d675057790816aa395bc27e9bc
Author: George Shuklin 
Date:   Fri May 1 17:57:00 2015 +0300

If rescue failed set instance to ERROR

The compute API will allow attempting to rescue an instance that is in
active/stopped/error state.  The compute manager will power off the instance
before calling driver.rescue.

If the rescue call fails in the virt driver, we should set the instance
to ERROR state since we (1) know the instance is definitely not active since
the compute manager powered it off and (2) we don't know what failed in the
virt driver, so punting and putting the instance into ERROR state is better
than leaving it broken and not signaling that with the vm_state.

Co-Authored-By: Matt Riedemann 

Closes-Bug: 1418590
Change-Id: Ia1054d3f9193f876803f8b5a26d00bd9d5d66c12


** Changed in: nova
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1418590

Title:
  Instance is left in ACTIVE state even if rescue fails

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1418590/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1501703] Re: unit test failures on 32 bit architectures

2015-10-02 Thread OpenStack Infra
Fix proposed to branch: stable/liberty
Review: https://review.openstack.org/230523

** Changed in: neutron/liberty
   Status: New => In Progress

** Changed in: neutron/liberty
 Assignee: (unassigned) => Kyle Mestery (mestery)

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1501703

Title:
  unit test failures on 32 bit architectures

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1501703/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1501772] Re: Metadata proxy process errors with binary user_data

2015-10-02 Thread OpenStack Infra
Fix proposed to branch: stable/liberty
Review: https://review.openstack.org/230513

** Changed in: neutron/liberty
   Status: New => In Progress

** Changed in: neutron/liberty
 Assignee: (unassigned) => Kyle Mestery (mestery)

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1501772

Title:
  Metadata proxy process errors with binary user_data

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1501772/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1501772] Re: Metadata proxy process errors with binary user_data

2015-10-02 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/230513
Committed: 
https://git.openstack.org/cgit/openstack/neutron/commit/?id=13b6d76da361178ea0b84baf4831a4c7f53e29c7
Submitter: Jenkins
Branch:stable/liberty

commit 13b6d76da361178ea0b84baf4831a4c7f53e29c7
Author: Ihar Hrachyshka 
Date:   Thu Oct 1 17:13:25 2015 +0200

metadata: don't crash proxy on non-unicode user data

We attempt to log every successful metadata response with LOG.debug. But
as per oslo.log docs [1], we should make sure that what we pass into the
library is unicode.

Http.request returns a tuple of Response object and a string, which is
bytes in Python 2.x [2].

That's why we need to convert the response content to unicode before
passing it into oslo.log.

To achieve it, we utilize encodeutils.safe_decode with 'replace' errors
handling strategy, so that we don't get exceptions on input that does
not conform unicode.

For the unit test case, we pass a string that is not expected to convert
to unicode with errors='strict' strategy or similar, and check that we
still don't crash.

While at it, we remove a check for the number of log calls being
triggered, because it's something that we should avoid validating in
test cases, and it cannot trigger a real bug. The mock that was used to
count the number would also hide the bug that we try to reproduce.

Note that the bug does not require debug to be set because the crash
occurs before oslo.log machinery decides it should not log the message.

[1]: 
http://docs.openstack.org/developer/oslo.log/usage.html#no-more-implicit-conversion-to-unicode-str
[2]: 
http://bitworking.org/projects/httplib2/doc/html/libhttplib2.html#httplib2.Http.request

Closes-Bug: #1501772
Change-Id: I6a32c40ff117fae43913386134c8981539697ce8
(cherry picked from commit 80e3d9be4923ecad17377b1d15c8392b8a43dac6)


** Tags added: in-stable-liberty

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1501772

Title:
  Metadata proxy process errors with binary user_data

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1501772/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1501703] Re: unit test failures on 32 bit architectures

2015-10-02 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/230523
Committed: 
https://git.openstack.org/cgit/openstack/neutron/commit/?id=18344140bd0aae61dd6f50667d719cd9cfe149cb
Submitter: Jenkins
Branch:stable/liberty

commit 18344140bd0aae61dd6f50667d719cd9cfe149cb
Author: James Page 
Date:   Thu Oct 1 11:54:28 2015 +0100

Use format to convert ints to strings

This ensures that on 32bit architectures, where
sometimes an implicit long is created, the resulting
string does not contain a 'L' suffix as generated
by the hex function.

Change-Id: I264f90d68009963fe7a217c2170e1cf2f46ae2bb
Closes-Bug: 1501703
(cherry picked from commit 49883f1b2bfc9a4f06b1d336553d7f0ab4289a0d)


** Tags added: in-stable-liberty

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1501703

Title:
  unit test failures on 32 bit architectures

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1501703/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1501703] Fix proposed to neutron (master)

2015-10-01 Thread OpenStack Infra
Fix proposed to branch: master
Review: https://review.openstack.org/229819

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1501703

Title:
  unit test failures on 32 bit architectures

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1501703/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1501772] Re: Metadata proxy process errors with binary user_data

2015-10-01 Thread OpenStack Infra
Fix proposed to branch: master
Review: https://review.openstack.org/229958

** Changed in: neutron
   Status: Confirmed => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1501772

Title:
  Metadata proxy process errors with binary user_data

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1501772/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1501703] Re: unit test failures on 32 bit architectures

2015-10-01 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/229819
Committed: 
https://git.openstack.org/cgit/openstack/neutron/commit/?id=49883f1b2bfc9a4f06b1d336553d7f0ab4289a0d
Submitter: Jenkins
Branch:master

commit 49883f1b2bfc9a4f06b1d336553d7f0ab4289a0d
Author: James Page 
Date:   Thu Oct 1 11:54:28 2015 +0100

Use format to convert ints to strings

This ensures that on 32bit architectures, where
sometimes an implicit long is created, the resulting
string does not contain a 'L' suffix as generated
by the hex function.

Change-Id: I264f90d68009963fe7a217c2170e1cf2f46ae2bb
Closes-Bug: 1501703


** Changed in: neutron
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1501703

Title:
  unit test failures on 32 bit architectures

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1501703/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1501772] Re: Metadata proxy process errors with binary user_data

2015-10-01 Thread OpenStack Infra
** Changed in: neutron
 Assignee: Ihar Hrachyshka (ihar-hrachyshka) => Cedric Brandily (cbrandily)

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1501772

Title:
  Metadata proxy process errors with binary user_data

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1501772/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1501772] Re: Metadata proxy process errors with binary user_data

2015-10-01 Thread OpenStack Infra
** Changed in: neutron
 Assignee: Cedric Brandily (cbrandily) => Henry Gessau (gessau)

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1501772

Title:
  Metadata proxy process errors with binary user_data

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1501772/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1501772] Re: Metadata proxy process errors with binary user_data

2015-10-01 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/229958
Committed: 
https://git.openstack.org/cgit/openstack/neutron/commit/?id=80e3d9be4923ecad17377b1d15c8392b8a43dac6
Submitter: Jenkins
Branch:master

commit 80e3d9be4923ecad17377b1d15c8392b8a43dac6
Author: Ihar Hrachyshka 
Date:   Thu Oct 1 17:13:25 2015 +0200

metadata: don't crash proxy on non-unicode user data

We attempt to log every successful metadata response with LOG.debug. But
as per oslo.log docs [1], we should make sure that what we pass into the
library is unicode.

Http.request returns a tuple of Response object and a string, which is
bytes in Python 2.x [2].

That's why we need to convert the response content to unicode before
passing it into oslo.log.

To achieve it, we utilize encodeutils.safe_decode with 'replace' errors
handling strategy, so that we don't get exceptions on input that does
not conform unicode.

For the unit test case, we pass a string that is not expected to convert
to unicode with errors='strict' strategy or similar, and check that we
still don't crash.

While at it, we remove a check for the number of log calls being
triggered, because it's something that we should avoid validating in
test cases, and it cannot trigger a real bug. The mock that was used to
count the number would also hide the bug that we try to reproduce.

Note that the bug does not require debug to be set because the crash
occurs before oslo.log machinery decides it should not log the message.

[1]: 
http://docs.openstack.org/developer/oslo.log/usage.html#no-more-implicit-conversion-to-unicode-str
[2]: 
http://bitworking.org/projects/httplib2/doc/html/libhttplib2.html#httplib2.Http.request

Closes-Bug: #1501772
Change-Id: I6a32c40ff117fae43913386134c8981539697ce8


** Changed in: neutron
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1501772

Title:
  Metadata proxy process errors with binary user_data

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1501772/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1497309] Re: l3-agent unable to parse output from ip netns list (iproute2 >= 4.0)

2015-09-30 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/225206
Committed: 
https://git.openstack.org/cgit/openstack/neutron/commit/?id=3aefdf4de76fdcdc02093bc631e339f9ecd4c707
Submitter: Jenkins
Branch:master

commit 3aefdf4de76fdcdc02093bc631e339f9ecd4c707
Author: James Page 
Date:   Fri Sep 18 16:38:47 2015 +0100

Add compatibility with iproute2 >= 4.0

The ip netns list command adds additional id data in more recent
versions of iproute2 of the format:

  qdhcp-35fc068a-750d-4add-b1d2-af392dbd8790 (id: 1)

Update parsing to deal with old and new formats.

Change-Id: I0d3fc4262284172f5ad31e4f2f78ae1fb33b4228
Closes-Bug: 1497309


** Changed in: neutron
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1497309

Title:
  l3-agent unable to parse output from ip netns list (iproute2 >= 4.0)

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1497309/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1422046] Re: cinder backup-list is always listing all tenants's bug for admin

2015-09-25 Thread OpenStack Infra
Fix proposed to branch: master
Review: https://review.openstack.org/227911

** Changed in: ospurge
   Status: Confirmed => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to python-cinderclient in Ubuntu.
https://bugs.launchpad.net/bugs/1422046

Title:
  cinder backup-list is always listing all tenants's bug for admin

To manage notifications about this bug go to:
https://bugs.launchpad.net/ospurge/+bug/1422046/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1398999] Re: Block migrate with attached volumes copies volumes to themselves

2015-09-24 Thread OpenStack Infra
Fix proposed to branch: master
Review: https://review.openstack.org/227278

** Changed in: nova
   Status: Confirmed => In Progress

** Changed in: nova
 Assignee: Chris St. Pierre (stpierre) => Bartosz Fic (bartosz-fic)

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1398999

Title:
  Block migrate with attached volumes copies volumes to themselves

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1398999/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1497309] Re: l3-agent unable to parse output from ip netns list (iproute2 >= 4.0)

2015-09-18 Thread OpenStack Infra
Fix proposed to branch: master
Review: https://review.openstack.org/225206

** Changed in: neutron
   Status: New => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1497309

Title:
  l3-agent unable to parse output from ip netns list (iproute2 >= 4.0)

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1497309/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1483159] Change abandoned on nova (master)

2015-09-16 Thread OpenStack Infra
Change abandoned by James Page (james.p...@canonical.com) on branch: master
Review: https://review.openstack.org/211041

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1483159

Title:
  Canonical naming for non-x86 architectures

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1483159/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1488815] Re: Kernel traces with skb_warn_bad_offload showing up during an AIO deployment on Ubuntu 14.04

2015-09-15 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/223292
Committed: 
https://git.openstack.org/cgit/openstack/openstack-ansible/commit/?id=cdcfa92b8e9604b82c7c3f8aca6fb3776df56552
Submitter: Jenkins
Branch:kilo

commit cdcfa92b8e9604b82c7c3f8aca6fb3776df56552
Author: Matthew Kassawara 
Date:   Tue Sep 1 09:12:50 2015 -0500

Disable scatter-gather offload on host bridges

Disable scatter-gather offload on host bridges to eliminate
kernel traces that may impact container connectivity. Only
addressing AIO interfaces for now as host configuration for
actual deployments resides in documentation.

Change-Id: Ia66b2bb64b9ace66f5fa3ca8edcc9909af54a4f2
Partial-Bug: #1488815
Co-Authored-By: Evan Callicoat 
(cherry picked from commit 6f6a37fce832be1b3acf0d6a1702ffcee4a33e85)


** Tags added: in-kilo

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu-kvm in Ubuntu.
https://bugs.launchpad.net/bugs/1488815

Title:
  Kernel traces with skb_warn_bad_offload showing up during an AIO
  deployment on Ubuntu 14.04

To manage notifications about this bug go to:
https://bugs.launchpad.net/openstack-ansible/+bug/1488815/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1353939] Fix proposed to nova (stable/juno)

2015-09-08 Thread OpenStack Infra
Fix proposed to branch: stable/juno
Review: https://review.openstack.org/221529

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1353939

Title:
  Rescue fails with 'Failed to terminate process: Device or resource
  busy' in the n-cpu log

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1353939/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1449056] Change abandoned on devstack (master)

2015-09-08 Thread OpenStack Infra
Change abandoned by Mathieu Rohon (mathieu.ro...@gmail.com) on branch: master
Review: https://review.openstack.org/177785

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to rabbitmq-server in Ubuntu.
https://bugs.launchpad.net/bugs/1449056

Title:
  rabbitmq not ready after restart

To manage notifications about this bug go to:
https://bugs.launchpad.net/devstack/+bug/1449056/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1457517] Re: Unable to boot from volume when flavor disk too small

2015-09-01 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/213308
Committed: 
https://git.openstack.org/cgit/openstack/nova/commit/?id=8794b938dcb983b7c918718807c2396cb255b4ce
Submitter: Jenkins
Branch:stable/kilo

commit 8794b938dcb983b7c918718807c2396cb255b4ce
Author: Matthew Booth 
Date:   Wed Jul 22 14:56:52 2015 +0100

Don't check flavor disk size when booting from volume

When creating a volume from an image, cinder copies the image metadata
into volume properties. When booting from the volume, we read this
metadata from the volume and use it as image metadata once again.

While fixing the check against min_ram,
change I861a78b5c7efa71e4bf7206d388b8d0d8048c78e introduced a
regression which prevents a user from booting a volume which is larger
than the flavor's disk. As we are not creating this disk, this check
does not make sense. Similarly, it checks the image metadata's
min_disk against the flavor disk size, which is not being used.

This change leaves the image metadata check unaltered when creating a
flavor disk. When booting from a volume, we check min_disk from image
metadata against the actual size of the volume. We don't check the
volume size at all. The check against min_ram is retained unaltered.

Closes-Bug: #1457517
Closes-Bug: #1459491
Closes-Bug: #1466305
Change-Id: I264493172da20b664df571e32876030246c2a87c
(cherry picked from commit 642c986f0636d52a9ba279c87e25082b4aa9b3b8)


** Tags added: in-stable-kilo

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1457517

Title:
  Unable to boot from volume when flavor disk too small

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1457517/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1485694] Re: Keystone raises an exception when it receives incorrectly encoded parameters

2015-08-26 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/213796
Committed: 
https://git.openstack.org/cgit/openstack/keystone/commit/?id=ef5f60305ce756a0832106ffa98a2314435a402d
Submitter: Jenkins
Branch:master

commit ef5f60305ce756a0832106ffa98a2314435a402d
Author: Sean Perry sean.pe...@hp.com
Date:   Mon Aug 17 10:25:22 2015 -0700

Prevent exception for invalidly encoded parameters

An exception occurs in the WebOb library when it tries to decode a
parameter that is not valid UTF8. To avoid this let's wrap the section
using the WebOb code and raise a ValidationError so the user gets
proper feedback instead of a UnknownError and a server 500 response.

Change-Id: I6781770a6c5b317eaef84064ef61b9c838d22bc2
Closes-Bug: 1485694


** Changed in: keystone
   Status: In Progress = Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to keystone in Ubuntu.
https://bugs.launchpad.net/bugs/1485694

Title:
  Keystone raises an exception when it receives incorrectly encoded
  parameters

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1485694/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1485694] Re: Keystone raises an exception when it receives incorrectly encoded parameters

2015-08-18 Thread OpenStack Infra
** Changed in: keystone
   Status: Confirmed = In Progress

** Changed in: keystone
 Assignee: (unassigned) = Sean Perry (sean-perry-a)

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to keystone in Ubuntu.
https://bugs.launchpad.net/bugs/1485694

Title:
  Keystone raises an exception when it receives incorrectly encoded
  parameters

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1485694/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1418187] Change abandoned on nova (master)

2015-08-11 Thread OpenStack Infra
Change abandoned by Michael Still (mi...@stillhq.com) on branch: master
Review: https://review.openstack.org/160905
Reason: This patch as been WIP'ed for a very long time, so I am going to 
abandon it to keep the review queue sane. Please restore the change when its 
ready for review.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1418187

Title:
  _get_host_numa_topology assumes numa cell has memory

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1418187/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1418187] Change abandoned on nova (master)

2015-08-11 Thread OpenStack Infra
Change abandoned by Michael Still (mi...@stillhq.com) on branch: master
Review: https://review.openstack.org/160906
Reason: This patch as been WIP'ed for a very long time, so I am going to 
abandon it to keep the review queue sane. Please restore the change when its 
ready for review.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1418187

Title:
  _get_host_numa_topology assumes numa cell has memory

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1418187/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1483159] Re: Canonical naming for non-x86 architectures

2015-08-10 Thread OpenStack Infra
** Changed in: nova
   Status: New = In Progress

** Changed in: nova
 Assignee: (unassigned) = James Page (james-page)

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1483159

Title:
  Canonical naming for non-x86 architectures

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1483159/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1459046] Change abandoned on nova (stable/juno)

2015-07-02 Thread OpenStack Infra
Change abandoned by Edward Hope-Morley (edward.hope-mor...@canonical.com) on 
branch: stable/juno
Review: https://review.openstack.org/193110

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1459046

Title:
  nova-* services do not start if rsyslog is not yet started

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1459046/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1459046] Change abandoned on nova (stable/icehouse)

2015-07-01 Thread OpenStack Infra
Change abandoned by Jeremy Stanley (fu...@yuggoth.org) on branch: 
stable/icehouse
Review: https://review.openstack.org/193215
Reason: This branch has reached end of life and is being deleted.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1459046

Title:
  nova-* services do not start if rsyslog is not yet started

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1459046/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1459046] Change abandoned on nova (stable/icehouse)

2015-07-01 Thread OpenStack Infra
Change abandoned by Jeremy Stanley (fu...@yuggoth.org) on branch: 
stable/icehouse
Review: https://review.openstack.org/193105
Reason: This branch has reached end of life and is being deleted.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1459046

Title:
  nova-* services do not start if rsyslog is not yet started

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1459046/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1459046] Change abandoned on nova (stable/icehouse)

2015-07-01 Thread OpenStack Infra
Change abandoned by Jeremy Stanley (fu...@yuggoth.org) on branch: 
stable/icehouse
Review: https://review.openstack.org/193214
Reason: This branch has reached end of life and is being deleted.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1459046

Title:
  nova-* services do not start if rsyslog is not yet started

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1459046/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1459046] Change abandoned on nova (stable/icehouse)

2015-07-01 Thread OpenStack Infra
Change abandoned by Jeremy Stanley (fu...@yuggoth.org) on branch: 
stable/icehouse
Review: https://review.openstack.org/193209
Reason: This branch has reached end of life and is being deleted.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1459046

Title:
  nova-* services do not start if rsyslog is not yet started

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1459046/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1470570] Change abandoned on keystone (master)

2015-07-01 Thread OpenStack Infra
*** This bug is a duplicate of bug 1468000 ***
https://bugs.launchpad.net/bugs/1468000

Change abandoned by Hans Feldt (hans.fe...@ericsson.com) on branch: master
Review: https://review.openstack.org/197650
Reason: duplicate

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to keystone in Ubuntu.
https://bugs.launchpad.net/bugs/1470570

Title:
  role assignment to group fails: Bad search filter

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1470570/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1470570] Re: role assignment to group fails: Bad search filter

2015-07-01 Thread OpenStack Infra
** Changed in: keystone
   Status: New = In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to keystone in Ubuntu.
https://bugs.launchpad.net/bugs/1470570

Title:
  role assignment to group fails: Bad search filter

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1470570/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1385295] Re: use_syslog=True does not log to syslog via /dev/log anymore

2015-06-28 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/193633
Committed: 
https://git.openstack.org/cgit/openstack/oslo.log/commit/?id=9a6c22663b57b7f2d9071767dadf28e59075a75e
Submitter: Jenkins
Branch:stable/kilo

commit 9a6c22663b57b7f2d9071767dadf28e59075a75e
Author: Julien Danjou jul...@danjou.info
Date:   Mon Nov 24 18:35:36 2014 +0100

Replace RFCSysLogHandler by a syslog() based one

Rather than using the Python provided logging module that reimplents the
whole syslog protocol and pointing it to /dev/log (which is not
portable), we use the system calls from the syslog module, which are
portable and default to the behaviour we actually want.

Closes-Bug: 1385295
Closes-Bug: 1391428

Partial-Bug: 1459046

(cherry picked from commit 33f5c6f94d94d5464fea38229d880f177b05aff7)

Conflicts:
oslo_log/log.py
requirements.txt

Change-Id: I2e47c896841cbd43d1f5504f2b8b897fc432cd0b


** Tags added: in-stable-kilo

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1385295

Title:
  use_syslog=True does not log to syslog via /dev/log anymore

To manage notifications about this bug go to:
https://bugs.launchpad.net/oslo.log/+bug/1385295/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1459046] Re: nova-* services do not start if rsyslog is not yet started

2015-06-28 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/193633
Committed: 
https://git.openstack.org/cgit/openstack/oslo.log/commit/?id=9a6c22663b57b7f2d9071767dadf28e59075a75e
Submitter: Jenkins
Branch:stable/kilo

commit 9a6c22663b57b7f2d9071767dadf28e59075a75e
Author: Julien Danjou jul...@danjou.info
Date:   Mon Nov 24 18:35:36 2014 +0100

Replace RFCSysLogHandler by a syslog() based one

Rather than using the Python provided logging module that reimplents the
whole syslog protocol and pointing it to /dev/log (which is not
portable), we use the system calls from the syslog module, which are
portable and default to the behaviour we actually want.

Closes-Bug: 1385295
Closes-Bug: 1391428

Partial-Bug: 1459046

(cherry picked from commit 33f5c6f94d94d5464fea38229d880f177b05aff7)

Conflicts:
oslo_log/log.py
requirements.txt

Change-Id: I2e47c896841cbd43d1f5504f2b8b897fc432cd0b


** Tags added: in-stable-kilo

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1459046

Title:
  nova-* services do not start if rsyslog is not yet started

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1459046/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1385295] Fix proposed to oslo.log (stable/kilo)

2015-06-19 Thread OpenStack Infra
Fix proposed to branch: stable/kilo
Review: https://review.openstack.org/193633

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1385295

Title:
  use_syslog=True does not log to syslog via /dev/log anymore

To manage notifications about this bug go to:
https://bugs.launchpad.net/oslo.log/+bug/1385295/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1459046] Fix proposed to nova (stable/icehouse)

2015-06-18 Thread OpenStack Infra
Fix proposed to branch: stable/icehouse
Review: https://review.openstack.org/193215

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1459046

Title:
  nova-* services do not start if rsyslog is not yet started

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1459046/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1459046] Fix proposed to nova (stable/icehouse)

2015-06-18 Thread OpenStack Infra
Fix proposed to branch: stable/icehouse
Review: https://review.openstack.org/193214

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1459046

Title:
  nova-* services do not start if rsyslog is not yet started

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1459046/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1449056] Re: rabbitmq not ready after restart

2015-06-04 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/186641
Committed: 
https://git.openstack.org/cgit/openstack-dev/devstack/commit/?id=6bc905c3488a93fa87776bcd0af7e362a90b082f
Submitter: Jenkins
Branch:master

commit 6bc905c3488a93fa87776bcd0af7e362a90b082f
Author: Tony Breeds t...@bakeyournoodle.com
Date:   Fri May 15 12:51:43 2015 +1000

Change the restart_rpc_backend loop to accomodate async rabbitmq

Some distros have converted to systemd for starting RabbitMQ.  This has
resulted in:
---
[Call Trace]
./stack.sh:904:restart_rpc_backend

/home/stack/projects/openstack/openstack-dev/devstack/lib/rpc_backend:201:die
[ERROR] 
/home/stack/projects/openstack/openstack-dev/devstack/lib/rpc_backend:201 
Failed to set rabbitmq password
Error on exit
World dumping... see /opt/stack/logs/worlddump-2015-05-29-031618.txt for 
details
---

Because 'restart_service rabbitmq-server' returns before the server is 
ready to
accept connections.

Alter the retry loop to only restart the rabbitmq-server every second time
through the loop.  Allowing time for the slow rabbit to start.

Closes-Bug: 1449056
Change-Id: Ibb291c1ecfd109f9ed10b5f194933364985cc1ce


** Changed in: devstack
   Status: In Progress = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to rabbitmq-server in Ubuntu.
https://bugs.launchpad.net/bugs/1449056

Title:
  rabbitmq not ready after restart

To manage notifications about this bug go to:
https://bugs.launchpad.net/devstack/+bug/1449056/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1449056] Re: rabbitmq not ready after restart

2015-05-31 Thread OpenStack Infra
** Changed in: devstack
 Assignee: Dr. Jens Rosenboom (j-rosenboom-j) = Tony Breeds (o-tony)

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to rabbitmq-server in Ubuntu.
https://bugs.launchpad.net/bugs/1449056

Title:
  rabbitmq not ready after restart

To manage notifications about this bug go to:
https://bugs.launchpad.net/devstack/+bug/1449056/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1449056] Re: rabbitmq not ready after restart

2015-05-29 Thread OpenStack Infra
** Changed in: devstack
 Assignee: Tony Breeds (o-tony) = Dr. Jens Rosenboom (j-rosenboom-j)

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to rabbitmq-server in Ubuntu.
https://bugs.launchpad.net/bugs/1449056

Title:
  rabbitmq not ready after restart

To manage notifications about this bug go to:
https://bugs.launchpad.net/devstack/+bug/1449056/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1449742] Re: InvalidUUID exception after vifs plug failed

2015-05-28 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/178603
Committed: 
https://git.openstack.org/cgit/openstack/nova/commit/?id=378a8d4aeb87cc037127ccab49bcced71e93c88e
Submitter: Jenkins
Branch:stable/icehouse

commit 378a8d4aeb87cc037127ccab49bcced71e93c88e
Author: jichenjc jiche...@cn.ibm.com
Date:   Wed Apr 15 20:15:29 2015 +0800

Use instance.uuid instead of instance

commit e9cf07b96f57fed0d9f46bd8f24aac491b6cb976
was ported to Icehouse but the commit
6b06e45dca465ae3f457b70c1126a8aadd5ccbbc
was not ported to Icehouse,
The function _set_instance_error_state is still expecting
a string with the instance uuid as argument
instead of an instance object.

So this patch partially changed the cherry-picked
commit e9cf07b96f57fed0d9f46bd8f24aac491b6cb976

Change-Id: I3bdd32d29d37ba375eb5af52758b93d08f387663
Closes-Bug: #1449742


** Tags added: in-stable-icehouse

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1449742

Title:
  InvalidUUID exception after vifs plug failed

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1449742/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1426324] Re: VFS blkid calls need to handle 0 or 2 return codes

2015-05-14 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/182716
Committed: 
https://git.openstack.org/cgit/openstack/nova/commit/?id=1b941f1d61ed830cc43aa99b105a1c5629ceab42
Submitter: Jenkins
Branch:stable/kilo

commit 1b941f1d61ed830cc43aa99b105a1c5629ceab42
Author: James Page james.p...@ubuntu.com
Date:   Fri Feb 27 11:27:30 2015 +

Handle return code 2 from blkid calls

blkid returns code 2 if the requested TYPE key is not found
for the specified device.

Ensure that this situation is handled correctly; blkid will
not return any data, so the return value will be empty.

Change-Id: I38cd7b53cdfd694c0eba1b6054d8e4c33759b0b8
Closes-Bug: #1426324
(cherry picked from commit 051fced477cdead4e307c23fc343da427beb6c81)


** Tags added: in-stable-kilo

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1426324

Title:
  VFS blkid calls need to handle 0 or 2 return codes

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-archive/+bug/1426324/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1426324] Fix proposed to nova (stable/kilo)

2015-05-13 Thread OpenStack Infra
Fix proposed to branch: stable/kilo
Review: https://review.openstack.org/182716

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1426324

Title:
  VFS blkid calls need to handle 0 or 2 return codes

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-archive/+bug/1426324/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1388077] Change abandoned on nova (master)

2015-05-13 Thread OpenStack Infra
Change abandoned by Joe Gordon (joe.gord...@gmail.com) on branch: master
Review: https://review.openstack.org/132263
Reason: This review is  4 weeks without comment, and failed Jenkins the last 
time it was checked. We are abandoning this for now. Feel free to reactivate 
the review by pressing the restore button and leaving a 'recheck' comment to 
get fresh test results.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1388077

Title:
  Parallel periodic instance power state reporting from compute nodes
  has high impact on conductors and message broker

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1388077/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1374999] Re: iSCSI volume detach does not correctly remove the multipath device descriptors

2015-05-11 Thread OpenStack Infra
** Changed in: nova
 Assignee: Jorge Niedbalski (niedbalski) = Felipe Reyes (freyes)

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1374999

Title:
  iSCSI volume detach does not correctly remove the multipath device
  descriptors

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1374999/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1426324] Re: VFS blkid calls need to handle 0 or 2 return codes

2015-05-11 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/159797
Committed: 
https://git.openstack.org/cgit/openstack/nova/commit/?id=051fced477cdead4e307c23fc343da427beb6c81
Submitter: Jenkins
Branch:master

commit 051fced477cdead4e307c23fc343da427beb6c81
Author: James Page james.p...@ubuntu.com
Date:   Fri Feb 27 11:27:30 2015 +

Handle return code 2 from blkid calls

blkid returns code 2 if the requested TYPE key is not found
for the specified device.

Ensure that this situation is handled correctly; blkid will
not return any data, so the return value will be empty.

Change-Id: I38cd7b53cdfd694c0eba1b6054d8e4c33759b0b8
Closes-Bug: #1426324


** Changed in: nova
   Status: In Progress = Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1426324

Title:
  VFS blkid calls need to handle 0 or 2 return codes

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-archive/+bug/1426324/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1368815] Change abandoned on cinder (master)

2015-05-08 Thread OpenStack Infra
Change abandoned by Mike Perez (thin...@gmail.com) on branch: master
Review: https://review.openstack.org/143575
Reason: No activity for over a month.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu in Ubuntu.
https://bugs.launchpad.net/bugs/1368815

Title:
  qemu-img convert intermittently corrupts output images

To manage notifications about this bug go to:
https://bugs.launchpad.net/cinder/+bug/1368815/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1374999] Re: iSCSI volume detach does not correctly remove the multipath device descriptors

2015-05-05 Thread OpenStack Infra
** Changed in: nova
 Assignee: Felipe Reyes (freyes) = Jorge Niedbalski (niedbalski)

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1374999

Title:
  iSCSI volume detach does not correctly remove the multipath device
  descriptors

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1374999/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1451134] Change abandoned on trove (master)

2015-05-04 Thread OpenStack Infra
Change abandoned by Emilien Macchi (emil...@redhat.com) on branch: master
Review: https://review.openstack.org/179626
Reason: I think this is something that needs to be solved in packaging.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openstack-trove in Ubuntu.
https://bugs.launchpad.net/bugs/1451134

Title:
  Default connection parameters fails when running dbsync

To manage notifications about this bug go to:
https://bugs.launchpad.net/trove/+bug/1451134/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1304333] Re: [SRU] Instance left stuck in transitional POWERING state

2015-04-30 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/176234
Committed: 
https://git.openstack.org/cgit/openstack/nova/commit/?id=d8853eef181fabebc13bdfdaa98818cfcef318be
Submitter: Jenkins
Branch:stable/icehouse

commit d8853eef181fabebc13bdfdaa98818cfcef318be
Author: David McNally dave.mcna...@hp.com
Date:   Fri Nov 22 16:18:53 2013 +

Recover from POWERING-* state on compute manager start-up

If a compute manager is stopped / fails during POWERING-ON or
POWERING-OFF operations then the instance will be left stuck in
a transitional task_state.

This change handles both these states by simply either retriggering
the power on or power off request on start-up of the compute manager.
If the operation had previously completed then retrying will
essentially be a no-op so it is safe to handle instances in this
state in this way.

Closes bug: #1304333

(cherry picked from commit 8f7056f48c115ee0939c76ce08531dab0f14e354)
Change-Id: I262be6b13a764bc1355be34cdc0180e8e87f260b


** Tags added: in-stable-icehouse

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1304333

Title:
  [SRU] Instance left stuck in transitional POWERING state

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1304333/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1449742] Fix proposed to nova (stable/icehouse)

2015-04-29 Thread OpenStack Infra
Fix proposed to branch: stable/icehouse
Review: https://review.openstack.org/178603

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1449742

Title:
  InvalidUUID exception after vifs plug failed

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1449742/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1446174] Re: test suite failures under i386

2015-04-21 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/175362
Committed: 
https://git.openstack.org/cgit/openstack/trove/commit/?id=66c48ba1735b359e0eb8ecefa2c04d962a70a7f1
Submitter: Jenkins
Branch:master

commit 66c48ba1735b359e0eb8ecefa2c04d962a70a7f1
Author: James Page james.p...@ubuntu.com
Date:   Mon Apr 20 12:39:36 2015 +0100

Support testing on 32 bit systems

Under a 32 bit OS, the type of max/min is long, not int.

Allow both long and int as valid types for these parameters.

Change-Id: If0ae44090229e2bf77405d81f06698e75ac54b97
Closes-Bug: #1446174


** Changed in: trove
   Status: In Progress = Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openstack-trove in Ubuntu.
https://bugs.launchpad.net/bugs/1446174

Title:
  test suite failures under i386

To manage notifications about this bug go to:
https://bugs.launchpad.net/trove/+bug/1446174/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1446174] Re: test suite failures under i386

2015-04-20 Thread OpenStack Infra
Fix proposed to branch: master
Review: https://review.openstack.org/175362

** Changed in: trove
   Status: New = In Progress

** Changed in: trove
 Assignee: (unassigned) = James Page (james-page)

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openstack-trove in Ubuntu.
https://bugs.launchpad.net/bugs/1446174

Title:
  test suite failures under i386

To manage notifications about this bug go to:
https://bugs.launchpad.net/trove/+bug/1446174/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1418187] Re: _get_host_numa_topology assumes numa cell has memory

2015-03-24 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/166004
Committed: 
https://git.openstack.org/cgit/openstack/nova/commit/?id=34f029e68d607c7154adcb6d6616da8da0db3650
Submitter: Jenkins
Branch:stable/juno

commit 34f029e68d607c7154adcb6d6616da8da0db3650
Author: Sahid Orentino Ferdjaoui sahid.ferdja...@redhat.com
Date:   Tue Mar 3 05:00:40 2015 -0500

libvirt: make default value of numa cell memory to 0 when not defined

Some arch can have cells without memory or cpus defined and libvirt
will return an XML without these elements. Our object defintion of the
fields cpus and memory cannot let us to make them to None when not
defined but currently the config representation of a NUMA make it to
None.

This patch fix the default value of config memory to 0 when libvirt
does not return memory element for a cell.

Also this cannot be considered come a fix for bug 1418187 since we
have to handle these cases (cpus or memory not defined) during
scheduling. thse case can be addressed when using distances which will
be addressed in a next serie of patches.

Conflicts:
nova/tests/unit/virt/libvirt/test_config.py
nova/virt/libvirt/config.py

NOTE(mriedem): The conflict in config.py is due to the mempages
code added on master with commit 3283e2a42 that's not in juno.
The test conflict was due to moving the tests in kilo.

Related-Bug: #1418187
Change-Id: Iac08d1221341a86c081d5e905c704fb1c9dca276
(cherry picked from commit 291c1a1db1ab3ceccfac7a3c8312b6fdce3aaa84)


** Tags added: in-stable-juno

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1418187

Title:
  _get_host_numa_topology assumes numa cell has memory

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1418187/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1418187] Related fix merged to nova (master)

2015-03-19 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/160904
Committed: 
https://git.openstack.org/cgit/openstack/nova/commit/?id=291c1a1db1ab3ceccfac7a3c8312b6fdce3aaa84
Submitter: Jenkins
Branch:master

commit 291c1a1db1ab3ceccfac7a3c8312b6fdce3aaa84
Author: Sahid Orentino Ferdjaoui sahid.ferdja...@redhat.com
Date:   Tue Mar 3 05:00:40 2015 -0500

libvirt: make default value of numa cell memory to 0 when not defined

Some arch can have cells without memory or cpus defined and libvirt
will return an XML without these elements. Our object defintion of the
fields cpus and memory cannot let us to make them to None when not
defined but currently the config representation of a NUMA make it to
None.

This patch fix the default value of config memory to 0 when libvirt
does not return memory element for a cell.

Also this cannot be considered come a fix for bug 1418187 since we
have to handle these cases (cpus or memory not defined) during
scheduling. thse case can be addressed when using distances which will
be addressed in a next serie of patches.

Related-Bug: #1418187
Change-Id: Iac08d1221341a86c081d5e905c704fb1c9dca276

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nova in Ubuntu.
https://bugs.launchpad.net/bugs/1418187

Title:
  _get_host_numa_topology assumes numa cell has memory

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1418187/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


  1   2   3   >