[Bug 1369465] Change abandoned on nova (stable/kilo)
Change abandoned by Liang Chen (liang.c...@canonical.com) on branch: stable/kilo Review: https://review.openstack.org/294599 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1369465 Title: nova resize doesn't resize(extend) rbd disk files when using rbd disk backend To manage notifications about this bug go to: https://bugs.launchpad.net/nova/+bug/1369465/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1369465] Fix proposed to nova (stable/kilo)
Fix proposed to branch: stable/kilo Review: https://review.openstack.org/294599 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1369465 Title: nova resize doesn't resize(extend) rbd disk files when using rbd disk backend To manage notifications about this bug go to: https://bugs.launchpad.net/nova/+bug/1369465/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1554227] Related fix proposed to nova (master)
Related fix proposed to branch: master Review: https://review.openstack.org/290079 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1554227 Title: DHCP unicast requests are not responded to To manage notifications about this bug go to: https://bugs.launchpad.net/nova/+bug/1554227/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1489059] Fix merged to neutron-vpnaas (master)
Reviewed: https://review.openstack.org/287802 Committed: https://git.openstack.org/cgit/openstack/neutron-vpnaas/commit/?id=b4b22a1f373794a7a13ec85a8386587fc541cb49 Submitter: Jenkins Branch:master commit b4b22a1f373794a7a13ec85a8386587fc541cb49 Author: Ihar HrachyshkaDate: Thu Mar 3 14:48:11 2016 +0100 Put py34 first in the env order of tox To solve the problem of "db type could not be determined" on py34 we have to run first the py34 env, then, run py27. This patch puts py34 first on the tox.ini list of envs to avoid this problem to happen. Change-Id: I9457f7e05adb77d4b034ef01e7e51d95fc066013 Closes-bug: #1489059 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to python-ironicclient in Ubuntu. https://bugs.launchpad.net/bugs/1489059 Title: "db type could not be determined" running py34 To manage notifications about this bug go to: https://bugs.launchpad.net/aodh/+bug/1489059/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1489059] Fix proposed to neutron-vpnaas (master)
Fix proposed to branch: master Review: https://review.openstack.org/287802 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to python-ironicclient in Ubuntu. https://bugs.launchpad.net/bugs/1489059 Title: "db type could not be determined" running py34 To manage notifications about this bug go to: https://bugs.launchpad.net/aodh/+bug/1489059/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1369465] Re: nova resize doesn't resize(extend) rbd disk files when using rbd disk backend
Reviewed: https://review.openstack.org/228505 Committed: https://git.openstack.org/cgit/openstack/nova/commit/?id=eb1f67c4374fd8210829deac8e49d6f3df6cae4b Submitter: Jenkins Branch:stable/liberty commit eb1f67c4374fd8210829deac8e49d6f3df6cae4b Author: Nicolas SimondsDate: Mon Jun 1 13:58:37 2015 -0700 libvirt: Fix/implement revert-resize for RBD-backed images * Makes a snapshot of Ceph-backed roots prior to resize * Rolls back to snapshot on revert * Destroys resize snapshots on image cleanup Conflicts: nova/tests/unit/virt/libvirt/test_driver.py because (I70215fb25ef25422786b96d33c91d8f1d4760a23) isn't on liberty (cherry picked from commit 29476a67d4d4ff7eedd97f589422d47015111448) Closes-Bug: 1369465 Closes-Bug: 1314526 Change-Id: I328d2c41696a9c0f090f822a51ea42fac83f62ec ** Changed in: nova/liberty Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1369465 Title: nova resize doesn't resize(extend) rbd disk files when using rbd disk backend To manage notifications about this bug go to: https://bugs.launchpad.net/nova/+bug/1369465/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1489059] Re: "db type could not be determined" running py34
Reviewed: https://review.openstack.org/279934 Committed: https://git.openstack.org/cgit/openstack/networking-ofagent/commit/?id=14184ef7cb5ce5a6b61e0fcec89412f6b2630cb5 Submitter: Jenkins Branch:master commit 14184ef7cb5ce5a6b61e0fcec89412f6b2630cb5 Author: Ayush GargDate: Sun Feb 14 14:04:46 2016 +0530 Run py34 first in default tox run this avoids py34 failure in default tox run when testrepository is not yet initialized (e.g. fresh repo clone). Change-Id: I23ec5be0ea60ecfc5344c705bb08fc91e08d271f Closes-Bug: #1489059 ** Changed in: networking-ofagent Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to python-ironicclient in Ubuntu. https://bugs.launchpad.net/bugs/1489059 Title: "db type could not be determined" running py34 To manage notifications about this bug go to: https://bugs.launchpad.net/aodh/+bug/1489059/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1460164] Re: restart of openvswitch-switch causes instance network down when l2population enabled
** Changed in: cloud-archive/kilo Status: New => In Progress ** Changed in: cloud-archive/kilo Assignee: (unassigned) => Ihar Hrachyshka (ihar-hrachyshka) -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1460164 Title: restart of openvswitch-switch causes instance network down when l2population enabled To manage notifications about this bug go to: https://bugs.launchpad.net/cloud-archive/+bug/1460164/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1489059] Re: "db type could not be determined" running py34
Fix proposed to branch: master Review: https://review.openstack.org/279934 ** Changed in: networking-ofagent Status: New => In Progress -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to python-ironicclient in Ubuntu. https://bugs.launchpad.net/bugs/1489059 Title: "db type could not be determined" running py34 To manage notifications about this bug go to: https://bugs.launchpad.net/aodh/+bug/1489059/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1398999] Re: Block migrate with attached volumes copies volumes to themselves
Reviewed: https://review.openstack.org/227278 Committed: https://git.openstack.org/cgit/openstack/nova/commit/?id=23fd0389f0e23e7969644079f4b1ad8504cbb8cb Submitter: Jenkins Branch:master commit 23fd0389f0e23e7969644079f4b1ad8504cbb8cb Author: Pawel KoniszewskiDate: Wed Feb 10 13:09:44 2016 +0100 Allow block live migration of an instance with attached volumes Since libvirt 1.2.17 it is possible to select which block devices should be migrated to destination host. Block devices that are not provided will not be migrated. It means that it is possible to exclude volumes from block migration and therefore prevent volumes from being copied to themselves. This patch implements new check of libvirt version. If version is higher or equal to 1.2.17 it is possible to block live migrate vm with attached volumes. Co-Authored-By: Bartosz Fic Change-Id: I8fcc3ef3cb5d9fd3a95067929c496fdb5976fd41 Closes-Bug: #1398999 Partially implements: blueprint block-live-migrate-with-attached-volumes ** Changed in: nova Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1398999 Title: Block migrate with attached volumes copies volumes to themselves To manage notifications about this bug go to: https://bugs.launchpad.net/nova/+bug/1398999/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 997700] Related fix proposed to keystone (master)
Related fix proposed to branch: master Review: https://review.openstack.org/278791 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to keystone in Ubuntu. https://bugs.launchpad.net/bugs/997700 Title: LDAP should not check username on "sn" field To manage notifications about this bug go to: https://bugs.launchpad.net/keystone/+bug/997700/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1460164] Re: restart of openvswitch-switch causes instance network down when l2population enabled
Reviewed: https://review.openstack.org/272566 Committed: https://git.openstack.org/cgit/openstack/neutron/commit/?id=05f8099a68918342b6e0a65e78619becfa19a4ae Submitter: Jenkins Branch:stable/liberty commit 05f8099a68918342b6e0a65e78619becfa19a4ae Author: James PageDate: Fri Dec 18 15:02:11 2015 + Ensure that tunnels are fully reset on ovs restart When the l2population mechanism driver is enabled, if ovs is restarted tunnel ports are not re-configured in full due to stale ofport handles in the OVS agent. Reset all handles when OVS is restarted to ensure that tunnels are fully recreated in this situation. Change-Id: If0e034a034a7f000a1c58aa8a43d2c857dee6582 Closes-bug: #1460164 (cherry picked from commit 17c14977ce0e2291e911739f8c85838f1c1f3473) ** Tags added: in-stable-liberty -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1460164 Title: restart of openvswitch-switch causes instance network down when l2population enabled To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1460164/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1460164] Re: restart of openvswitch-switch causes instance network down when l2population enabled
Reviewed: https://review.openstack.org/259485 Committed: https://git.openstack.org/cgit/openstack/neutron/commit/?id=17c14977ce0e2291e911739f8c85838f1c1f3473 Submitter: Jenkins Branch:master commit 17c14977ce0e2291e911739f8c85838f1c1f3473 Author: James PageDate: Fri Dec 18 15:02:11 2015 + Ensure that tunnels are fully reset on ovs restart When the l2population mechanism driver is enabled, if ovs is restarted tunnel ports are not re-configured in full due to stale ofport handles in the OVS agent. Reset all handles when OVS is restarted to ensure that tunnels are fully recreated in this situation. Change-Id: If0e034a034a7f000a1c58aa8a43d2c857dee6582 Closes-bug: #1460164 ** Changed in: neutron Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1460164 Title: restart of openvswitch-switch causes instance network down when l2population enabled To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1460164/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1460164] Fix proposed to neutron (stable/liberty)
Fix proposed to branch: stable/liberty Review: https://review.openstack.org/272566 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1460164 Title: restart of openvswitch-switch causes instance network down when l2population enabled To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1460164/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1460164] Fix proposed to neutron (stable/kilo)
Fix proposed to branch: stable/kilo Review: https://review.openstack.org/272643 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1460164 Title: restart of openvswitch-switch causes instance network down when l2population enabled To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1460164/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1493303] Fix merged to swift (stable/liberty)
Reviewed: https://review.openstack.org/270235 Committed: https://git.openstack.org/cgit/openstack/swift/commit/?id=8c1976aa771f8c43c5dbe676bd9a5efc69f09eae Submitter: Jenkins Branch:stable/liberty commit 8c1976aa771f8c43c5dbe676bd9a5efc69f09eae Author: Samuel MerrittDate: Tue Dec 8 16:36:05 2015 -0800 Fix memory/socket leak in proxy on truncated SLO/DLO GET When a client disconnected while consuming an SLO or DLO GET response, the proxy would leak a socket. This could be observed via strace as a socket that had shutdown() called on it, but was never closed. It could also be observed by counting entries in /proc//fd, where is the pid of a proxy server worker process. This is due to a memory leak in SegmentedIterable. A SegmentedIterable has an 'app_iter' attribute, which is a generator. That generator references 'self' (the SegmentedIterable object). This creates a cyclic reference: the generator refers to the SegmentedIterable, and the SegmentedIterable refers to the generator. Python can normally handle cyclic garbage; reference counting won't reclaim it, but the garbage collector will. However, objects with finalizers will stop the garbage collector from collecting them* and the cycle of which they are part. For most objects, "has finalizer" is synonymous with "has a __del__ method". However, a generator has a finalizer once it's started running and before it finishes: basically, while it has stack frames associated with it**. When a client disconnects mid-stream, we get a memory leak. We have our SegmentedIterable object (call it "si"), and its associated generator. si.app_iter is the generator, and the generator closes over si, so we have a cycle; and the generator has started but not yet finished, so the generator needs finalization; hence, the garbage collector won't ever clean it up. The socket leak comes in because the generator *also* refers to the request's WSGI environment, which contains wsgi.input, which ultimately refers to a _socket object from the standard library. Python's _socket objects only close their underlying file descriptor when their reference counts fall to 0***. This commit makes SegmentedIterable.close() call self.app_iter.close(), thereby unwinding its generator's stack and making it eligible for garbage collection. * in Python < 3.4, at least. See PEP 442. ** see PyGen_NeedsFinalizing() in Objects/genobject.c and also has_finalizer() in Modules/gcmodule.c in Python. *** see sock_dealloc() in Modules/socketmodule.c in Python. See sock_close() in the same file for the other half of the sad story. This closes CVE-2016-0738. Closes-Bug: 1493303 Change-Id: I74ea49eaa7d5c372cdc2399148d5495d3007dbd0 Co-Authored-By: Kota Tsuyuzaki ** Changed in: swift Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to swift in Ubuntu. https://bugs.launchpad.net/bugs/1493303 Title: [OSSA 2016-004] Swift proxy memory leak on unfinished read (CVE-2016-0738) To manage notifications about this bug go to: https://bugs.launchpad.net/cloud-archive/+bug/1493303/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1514325] Change abandoned on cinder (stable/kilo)
Change abandoned by Eric Harney (ehar...@redhat.com) on branch: stable/kilo Review: https://review.openstack.org/246772 Reason: -2 in November, and I agree with that, so cleaning this one out of the queue. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to cinder in Ubuntu. https://bugs.launchpad.net/bugs/1514325 Title: VersionedObject.__repr__ should return encoded string To manage notifications about this bug go to: https://bugs.launchpad.net/cinder/+bug/1514325/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1398999] Related fix merged to nova (master)
Reviewed: https://review.openstack.org/252506 Committed: https://git.openstack.org/cgit/openstack/nova/commit/?id=f0d5fc61916f41214da580097a09136e4ed2c99a Submitter: Jenkins Branch:master commit f0d5fc61916f41214da580097a09136e4ed2c99a Author: Pawel KoniszewskiDate: Fri Dec 11 03:28:50 2015 +0100 Get list of disks to copy early to avoid multiple DB hits To support selective block migration we need to read block devices from nova block device mappings instead of libvirt block info. It means that in current implementation we would call _live_migration_copy_disk_paths two times - from live_migration_operations and from live_migration_monitor. To avoid that this change gets disk paths early and pass them as and additional paremeter to live migration monitor. Change-Id: Ic894cfc7374ba06b436b2a76a5984012d1dba3a5 Related-bug: #1398999 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1398999 Title: Block migrate with attached volumes copies volumes to themselves To manage notifications about this bug go to: https://bugs.launchpad.net/nova/+bug/1398999/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1497309] Re: l3-agent unable to parse output from ip netns list (iproute2 >= 4.0)
Reviewed: https://review.openstack.org/258493 Committed: https://git.openstack.org/cgit/openstack/neutron/commit/?id=1d8aff33a6b153c54760d2a141128ef4c045308e Submitter: Jenkins Branch:stable/liberty commit 1d8aff33a6b153c54760d2a141128ef4c045308e Author: James PageDate: Fri Sep 18 16:38:47 2015 +0100 Add compatibility with iproute2 >= 4.0 The ip netns list command adds additional id data in more recent versions of iproute2 of the format: qdhcp-35fc068a-750d-4add-b1d2-af392dbd8790 (id: 1) Update parsing to deal with old and new formats. Change-Id: I0d3fc4262284172f5ad31e4f2f78ae1fb33b4228 Closes-Bug: 1497309 (cherry picked from commit 3aefdf4de76fdcdc02093bc631e339f9ecd4c707) ** Tags added: in-stable-liberty -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1497309 Title: l3-agent unable to parse output from ip netns list (iproute2 >= 4.0) To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1497309/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1497309] Re: l3-agent unable to parse output from ip netns list (iproute2 >= 4.0)
Reviewed: https://review.openstack.org/258503 Committed: https://git.openstack.org/cgit/openstack/neutron/commit/?id=d65576d1665c3b7a8d6b2e23749a3c703ee79c76 Submitter: Jenkins Branch:stable/kilo commit d65576d1665c3b7a8d6b2e23749a3c703ee79c76 Author: James PageDate: Fri Sep 18 16:38:47 2015 +0100 Add compatibility with iproute2 >= 4.0 The ip netns list command adds additional id data in more recent versions of iproute2 of the format: qdhcp-35fc068a-750d-4add-b1d2-af392dbd8790 (id: 1) Update parsing to deal with old and new formats. Conflicts: neutron/tests/functional/agent/test_l3_agent.py Change-Id: I0d3fc4262284172f5ad31e4f2f78ae1fb33b4228 Closes-Bug: 1497309 (cherry picked from commit 3aefdf4de76fdcdc02093bc631e339f9ecd4c707) ** Tags added: in-stable-kilo -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1497309 Title: l3-agent unable to parse output from ip netns list (iproute2 >= 4.0) To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1497309/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1460164] Re: restart of openvswitch-switch causes instance network down when l2population enabled
Fix proposed to branch: master Review: https://review.openstack.org/259485 ** Changed in: neutron Status: New => In Progress ** Changed in: neutron Assignee: (unassigned) => James Page (james-page) -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1460164 Title: restart of openvswitch-switch causes instance network down when l2population enabled To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1460164/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1497309] Fix proposed to neutron (stable/liberty)
Fix proposed to branch: stable/liberty Review: https://review.openstack.org/258493 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1497309 Title: l3-agent unable to parse output from ip netns list (iproute2 >= 4.0) To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1497309/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1497309] Fix proposed to neutron (stable/kilo)
Fix proposed to branch: stable/kilo Review: https://review.openstack.org/258503 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1497309 Title: l3-agent unable to parse output from ip netns list (iproute2 >= 4.0) To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1497309/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1516085] Re: quotas calls fail when CONF.keymgr.encryption_auth_url is not configured
Fix proposed to branch: stable/liberty Review: https://review.openstack.org/254700 ** Changed in: cinder/liberty Status: New => In Progress ** Changed in: cinder/liberty Assignee: (unassigned) => Szymon Borkowski (szymon-borkowski) -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to cinder in Ubuntu. https://bugs.launchpad.net/bugs/1516085 Title: quotas calls fail when CONF.keymgr.encryption_auth_url is not configured To manage notifications about this bug go to: https://bugs.launchpad.net/cinder/+bug/1516085/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1516085] Re: quotas calls fail when CONF.keymgr.encryption_auth_url is not configured
Reviewed: https://review.openstack.org/254700 Committed: https://git.openstack.org/cgit/openstack/cinder/commit/?id=fa7d0916d849e9c6f93e08f8323eb2a886bcffc0 Submitter: Jenkins Branch:stable/liberty commit fa7d0916d849e9c6f93e08f8323eb2a886bcffc0 Author: Szymon BorkowskiDate: Tue Dec 1 14:12:03 2015 +0100 Use proper config option to connect to keystone Earlier, quotas used to authenticate to endpoint from not required option located in keymgr.encryption_auth_url. Now, the required auth_uri option from config file is used to authenticate to keystone. Co-Authored-By: Michal Dulko Change-Id: I1076527704f8def2c6755c060df49232e5ebe805 Closes-Bug: 1516085 (cherry picked from commit 109353dedbe53201eb684c5658d9193115df) ** Changed in: cinder/liberty Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to cinder in Ubuntu. https://bugs.launchpad.net/bugs/1516085 Title: quotas calls fail when CONF.keymgr.encryption_auth_url is not configured To manage notifications about this bug go to: https://bugs.launchpad.net/cinder/+bug/1516085/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1516085] Re: quotas calls fail when CONF.keymgr.encryption_auth_url is not configured
Reviewed: https://review.openstack.org/251937 Committed: https://git.openstack.org/cgit/openstack/cinder/commit/?id=109353dedbe53201eb684c5658d9193115df Submitter: Jenkins Branch:master commit 109353dedbe53201eb684c5658d9193115df Author: Szymon BorkowskiDate: Tue Dec 1 14:12:03 2015 +0100 Use proper config option to connect to keystone Earlier, quotas used to authenticate to endpoint from not required option located in keymgr.encryption_auth_url. Now, the required auth_uri option from config file is used to authenticate to keystone. Co-Authored-By: Michal Dulko Change-Id: I1076527704f8def2c6755c060df49232e5ebe805 Closes-Bug: 1516085 ** Changed in: cinder Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to cinder in Ubuntu. https://bugs.launchpad.net/bugs/1516085 Title: quotas calls fail when CONF.keymgr.encryption_auth_url is not configured To manage notifications about this bug go to: https://bugs.launchpad.net/cinder/+bug/1516085/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1516085] Re: quotas calls fail when CONF.keymgr.encryption_auth_url is not configured
** Changed in: cinder Assignee: Szymon Borkowski (szymon-borkowski) => Michal Dulko (michal-dulko-f) -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to cinder in Ubuntu. https://bugs.launchpad.net/bugs/1516085 Title: quotas calls fail when CONF.keymgr.encryption_auth_url is not configured To manage notifications about this bug go to: https://bugs.launchpad.net/cinder/+bug/1516085/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1398999] Related fix proposed to nova (master)
Related fix proposed to branch: master Review: https://review.openstack.org/252506 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1398999 Title: Block migrate with attached volumes copies volumes to themselves To manage notifications about this bug go to: https://bugs.launchpad.net/nova/+bug/1398999/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1516085] Change abandoned on cinder (master)
Change abandoned by Michal Dulko (michal.du...@intel.com) on branch: master Review: https://review.openstack.org/245572 Reason: Abandoning in favor of https://review.openstack.org/#/c/251937/ -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to cinder in Ubuntu. https://bugs.launchpad.net/bugs/1516085 Title: quotas calls fail when CONF.keymgr.encryption_auth_url is not configured To manage notifications about this bug go to: https://bugs.launchpad.net/cinder/+bug/1516085/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1353939] Change abandoned on nova (stable/juno)
Change abandoned by Matt Riedemann (mrie...@us.ibm.com) on branch: stable/juno Review: https://review.openstack.org/221529 Reason: Juno is EOL soon. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1353939 Title: Rescue fails with 'Failed to terminate process: Device or resource busy' in the n-cpu log To manage notifications about this bug go to: https://bugs.launchpad.net/cloud-archive/+bug/1353939/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1516085] Re: quotas calls fail when CONF.keymgr.encryption_auth_url is not configured
Fix proposed to branch: master Review: https://review.openstack.org/251937 ** Changed in: cinder Assignee: Michal Dulko (michal-dulko-f) => Szymon Borkowski (szymon-borkowski) -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to cinder in Ubuntu. https://bugs.launchpad.net/bugs/1516085 Title: quotas calls fail when CONF.keymgr.encryption_auth_url is not configured To manage notifications about this bug go to: https://bugs.launchpad.net/cinder/+bug/1516085/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1516652] Re: 'lxd' is an unsupported hypervisor type
Reviewed: https://review.openstack.org/245811 Committed: https://git.openstack.org/cgit/openstack/nova/commit/?id=050bc120594ffe865c3d823382afb56ea62f556e Submitter: Jenkins Branch:master commit 050bc120594ffe865c3d823382afb56ea62f556e Author: James PageDate: Mon Nov 16 15:03:50 2015 + Add 'lxd' to the list of recognized hypervisors Currently its not possible to set the hypervisor_type on a glance image to 'lxd' to ensure it gets targetted to the right type of hypervisors as 'lxd' is not a recognised hypervisor type. Change-Id: I9607c2f062b5ae19480a92be313fd4e21aa43ca5 Closes-Bug: 1516652 ** Changed in: nova Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1516652 Title: 'lxd' is an unsupported hypervisor type To manage notifications about this bug go to: https://bugs.launchpad.net/nova/+bug/1516652/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1516652] Re: 'lxd' is an unsupported hypervisor type
Fix proposed to branch: master Review: https://review.openstack.org/245811 ** Changed in: nova Status: New => In Progress -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1516652 Title: 'lxd' is an unsupported hypervisor type To manage notifications about this bug go to: https://bugs.launchpad.net/nova/+bug/1516652/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1374999] Change abandoned on nova (master)
Change abandoned by Michael Still (mi...@stillhq.com) on branch: master Review: https://review.openstack.org/135382 Reason: It sounds like this patch is now obsolete. Please restore it if that isn't the case. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1374999 Title: iSCSI volume detach does not correctly remove the multipath device descriptors To manage notifications about this bug go to: https://bugs.launchpad.net/nova/+bug/1374999/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1498370] Re: DHCP agent: interface unplug leads to exception
Reviewed: https://review.openstack.org/242003 Committed: https://git.openstack.org/cgit/openstack/neutron/commit/?id=a27b30d7263aefce0ffbae95316e4e5cd48165a5 Submitter: Jenkins Branch:stable/kilo commit a27b30d7263aefce0ffbae95316e4e5cd48165a5 Author: Gary KottonDate: Sun Sep 27 00:24:31 2015 -0700 DHCP: protect against case when device name is None There are edge cases when the agent attempts to unplug an interface and the device does not exist. Closes-bug: #1498370 (cherry picked from commit caebc8fb8e8d9782746c3cc3ddc86f786342c819) (cherry picked from commit 0b07910f33ed26fbdd13530eafbdefd74104424d) Change-Id: I6917ec94f685f3dd3bff6aa1d43dc56aab76274a ** Tags added: in-stable-kilo -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1498370 Title: DHCP agent: interface unplug leads to exception To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1498370/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1398999] Re: Block migrate with attached volumes copies volumes to themselves
** Changed in: nova Assignee: Bartosz Fic (bartosz-fic) => Pawel Koniszewski (pawel-koniszewski) -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1398999 Title: Block migrate with attached volumes copies volumes to themselves To manage notifications about this bug go to: https://bugs.launchpad.net/nova/+bug/1398999/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1501772] Fix proposed to neutron (master)
Fix proposed to branch: master Review: https://review.openstack.org/235300 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1501772 Title: Metadata proxy process errors with binary user_data To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1501772/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1501703] Fix proposed to neutron (master)
Fix proposed to branch: master Review: https://review.openstack.org/235300 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1501703 Title: unit test failures on 32 bit architectures To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1501703/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1501703] Fix merged to neutron (master)
Reviewed: https://review.openstack.org/235300 Committed: https://git.openstack.org/cgit/openstack/neutron/commit/?id=140ccc36d172bead2605968b3d61b36cca8a0040 Submitter: Jenkins Branch:master commit 6dcfe3a9362ae5fcf18e5cfb59663e43446cd59c Author: Kevin BentonDate: Tue Oct 6 19:28:47 2015 -0700 Mock oslo policy HTTPCheck instead of urllib We were mocking internal behavior of oslo policy by patching urllib. This will break with the upcoming oslo release that switches to requests. This patch changes the mock to the HTTPCheck level and we can leave implementation details testing up to oslo_policy. Change-Id: I07957f01307e25f1547197c720eea6e3e7f0ef5a Closes-Bug: #1503890 (cherry picked from commit a0f1d9d6de1560be91d3001c8ac9f880a7a5a7e0) Add testresources used by oslo.db fixture If we use oslo.db fixtures, we'll need the package or the next version of oslo.db release will break us. Closes-Bug: #1503501 Change-Id: I7dfbf240333095d91a414ba15a439bdc4804eb25 (cherry picked from commit 86ad967e40c2c6752ec0fb46cfd3098ede0c7178) Fix functional test_server tests Now oslo.service 0.10.0 no longer sends SIGHUP to parent and children services. This was a chance introduced by 286a6ea, and since it invalidated the very logic under test, this must be revised. (cherry picked from commit 090fe713592c2b6398d999bfa03b80cbb2054609) Change-Id: I18a11283925369bc91800244f196010a1bc3 Closes-bug: #1505438 (cherry picked from commit 090fe713592c2b6398d999bfa03b80cbb2054609) Make test_server work with older versions of oslo.service Change I18a11283925369bc91800244f196010a1bc3 fixed the test for oslo.service >= 0.10.0, but it also broke it for older versions of oslo.service. Since the library has minimal version of >= 0.7.0 in requirements.txt, test should pass for those versions too. Now, instead of validating that either reset() or restart() of workers are triggered on SIGHUP, just validate that .start() is triggered the expected number of times (either way, no matter how oslo.service decide to clean up the children, they exit and then are respawned). Change-Id: I41f9d3af780b3178b075bc1e7084f417a2bd1378 Closes-Bug: #1505645 (cherry picked from commit 7bb40921660cf29beb68e338e205499efd6ffa36) Fixed multiple py34 gate issues 1. Scope mock of 'open' to module By mocking 'open' at the module level, we can avoid affecting 'open' calls from other modules. 2. Stop using LOG.exception in contexts with no sys.exc_info set Python 3.4 logger fills in record.exc_info with sys.exc_info() result [1], and then it uses it to determine the current exception [2] to append to the log message. Since there is no exception, exc_info[1] is None, and we get AttributeError inside traceback module. It's actually a bug in Python interpreter that it attempt to access the attribute when there is no exception. It turns out that it's fixed in latest master of cPython [3] (the intent of the patch does not seem relevant, but it removes the offending code while reshuffling the code). Note that now cPython correctly checks the exception value before accessing its attributes [4]. The patch in cPython that resulted in the failure is [5] and is present since initial Python 3k releases. The patch in fixtures that broke us is [6]. [1]: https://hg.python.org/cpython/file/tip/Lib/logging/__init__.py#l1412 [2]: https://hg.python.org/cpython/file/tip/Lib/logging/__init__.py#l575 [3]: https://hg.python.org/cpython/rev/73afda5a4e4c [4]: https://hg.python.org/cpython/rev/73afda5a4e4c#l6.484 [5]: https://hg.python.org/cpython/rev/2ee09afee126 [6]: https://github.com/testing-cabal/fixtures/commit/67dd2956943261e845a866dab155208c51da937e Closes-Bug: #1503847 Closes-Bug: #1504053 Co-Authored-By: Ihar Hrachyshka Change-Id: I456b7846b8a53e4d3f8c91583685e0e1eaa84719 (cherry picked from commit 8f58bbf38f5984e70d6e0be7427deb99d7782d1d) commit 0b07910f33ed26fbdd13530eafbdefd74104424d Author: Gary Kotton Date: Sun Sep 27 00:24:31 2015 -0700 DHCP: protect against case when device name is None There are edge cases when the agent attempts to unplug an interface and the device does not exist. Change-Id: I6917ec94f685f3dd3bff6aa1d43dc56aab76274a Closes-bug: #1498370 (cherry picked from commit caebc8fb8e8d9782746c3cc3ddc86f786342c819) commit fb40dbbce9ac17ee43d8921aa62c28f1ea723fba Author: shihanzhang Date: Fri Sep 18 10:38:43 2015 +0800 Execute ipset command using check_exit_code When l2 agent execute ipset command, we should pass parameter
[Bug 1501772] Fix merged to neutron (master)
Reviewed: https://review.openstack.org/235300 Committed: https://git.openstack.org/cgit/openstack/neutron/commit/?id=140ccc36d172bead2605968b3d61b36cca8a0040 Submitter: Jenkins Branch:master commit 6dcfe3a9362ae5fcf18e5cfb59663e43446cd59c Author: Kevin BentonDate: Tue Oct 6 19:28:47 2015 -0700 Mock oslo policy HTTPCheck instead of urllib We were mocking internal behavior of oslo policy by patching urllib. This will break with the upcoming oslo release that switches to requests. This patch changes the mock to the HTTPCheck level and we can leave implementation details testing up to oslo_policy. Change-Id: I07957f01307e25f1547197c720eea6e3e7f0ef5a Closes-Bug: #1503890 (cherry picked from commit a0f1d9d6de1560be91d3001c8ac9f880a7a5a7e0) Add testresources used by oslo.db fixture If we use oslo.db fixtures, we'll need the package or the next version of oslo.db release will break us. Closes-Bug: #1503501 Change-Id: I7dfbf240333095d91a414ba15a439bdc4804eb25 (cherry picked from commit 86ad967e40c2c6752ec0fb46cfd3098ede0c7178) Fix functional test_server tests Now oslo.service 0.10.0 no longer sends SIGHUP to parent and children services. This was a chance introduced by 286a6ea, and since it invalidated the very logic under test, this must be revised. (cherry picked from commit 090fe713592c2b6398d999bfa03b80cbb2054609) Change-Id: I18a11283925369bc91800244f196010a1bc3 Closes-bug: #1505438 (cherry picked from commit 090fe713592c2b6398d999bfa03b80cbb2054609) Make test_server work with older versions of oslo.service Change I18a11283925369bc91800244f196010a1bc3 fixed the test for oslo.service >= 0.10.0, but it also broke it for older versions of oslo.service. Since the library has minimal version of >= 0.7.0 in requirements.txt, test should pass for those versions too. Now, instead of validating that either reset() or restart() of workers are triggered on SIGHUP, just validate that .start() is triggered the expected number of times (either way, no matter how oslo.service decide to clean up the children, they exit and then are respawned). Change-Id: I41f9d3af780b3178b075bc1e7084f417a2bd1378 Closes-Bug: #1505645 (cherry picked from commit 7bb40921660cf29beb68e338e205499efd6ffa36) Fixed multiple py34 gate issues 1. Scope mock of 'open' to module By mocking 'open' at the module level, we can avoid affecting 'open' calls from other modules. 2. Stop using LOG.exception in contexts with no sys.exc_info set Python 3.4 logger fills in record.exc_info with sys.exc_info() result [1], and then it uses it to determine the current exception [2] to append to the log message. Since there is no exception, exc_info[1] is None, and we get AttributeError inside traceback module. It's actually a bug in Python interpreter that it attempt to access the attribute when there is no exception. It turns out that it's fixed in latest master of cPython [3] (the intent of the patch does not seem relevant, but it removes the offending code while reshuffling the code). Note that now cPython correctly checks the exception value before accessing its attributes [4]. The patch in cPython that resulted in the failure is [5] and is present since initial Python 3k releases. The patch in fixtures that broke us is [6]. [1]: https://hg.python.org/cpython/file/tip/Lib/logging/__init__.py#l1412 [2]: https://hg.python.org/cpython/file/tip/Lib/logging/__init__.py#l575 [3]: https://hg.python.org/cpython/rev/73afda5a4e4c [4]: https://hg.python.org/cpython/rev/73afda5a4e4c#l6.484 [5]: https://hg.python.org/cpython/rev/2ee09afee126 [6]: https://github.com/testing-cabal/fixtures/commit/67dd2956943261e845a866dab155208c51da937e Closes-Bug: #1503847 Closes-Bug: #1504053 Co-Authored-By: Ihar Hrachyshka Change-Id: I456b7846b8a53e4d3f8c91583685e0e1eaa84719 (cherry picked from commit 8f58bbf38f5984e70d6e0be7427deb99d7782d1d) commit 0b07910f33ed26fbdd13530eafbdefd74104424d Author: Gary Kotton Date: Sun Sep 27 00:24:31 2015 -0700 DHCP: protect against case when device name is None There are edge cases when the agent attempts to unplug an interface and the device does not exist. Change-Id: I6917ec94f685f3dd3bff6aa1d43dc56aab76274a Closes-bug: #1498370 (cherry picked from commit caebc8fb8e8d9782746c3cc3ddc86f786342c819) commit fb40dbbce9ac17ee43d8921aa62c28f1ea723fba Author: shihanzhang Date: Fri Sep 18 10:38:43 2015 +0800 Execute ipset command using check_exit_code When l2 agent execute ipset command, we should pass parameter
[Bug 1501772] Fix proposed to neutron (stable/juno)
Fix proposed to branch: stable/juno Review: https://review.openstack.org/233546 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1501772 Title: Metadata proxy process errors with binary user_data To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1501772/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1501772] Change abandoned on neutron (stable/juno)
Change abandoned by Ihar Hrachyshka (ihrac...@redhat.com) on branch: stable/juno Review: https://review.openstack.org/233546 Reason: Actually, we don't use oslo.log, neither py34 in Juno, so no need for the change. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1501772 Title: Metadata proxy process errors with binary user_data To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1501772/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1501772] Re: Metadata proxy process errors with binary user_data
Reviewed: https://review.openstack.org/233136 Committed: https://git.openstack.org/cgit/openstack/neutron/commit/?id=118a76fd651c19ad098cdee9d0a122a00ddc4e3b Submitter: Jenkins Branch:stable/kilo commit 118a76fd651c19ad098cdee9d0a122a00ddc4e3b Author: Ihar HrachyshkaDate: Thu Oct 1 17:13:25 2015 +0200 metadata: don't crash proxy on non-unicode user data We attempt to log every successful metadata response with LOG.debug. But as per oslo.log docs [1], we should make sure that what we pass into the library is unicode. Http.request returns a tuple of Response object and a string, which is bytes in Python 2.x [2]. That's why we need to convert the response content to unicode before passing it into oslo.log. To achieve it, we utilize encodeutils.safe_decode with 'replace' errors handling strategy, so that we don't get exceptions on input that does not conform unicode. For the unit test case, we pass a string that is not expected to convert to unicode with errors='strict' strategy or similar, and check that we still don't crash. While at it, we remove a check for the number of log calls being triggered, because it's something that we should avoid validating in test cases, and it cannot trigger a real bug. The mock that was used to count the number would also hide the bug that we try to reproduce. Note that the bug does not require debug to be set because the crash occurs before oslo.log machinery decides it should not log the message. [1]: http://docs.openstack.org/developer/oslo.log/usage.html#no-more-implicit-conversion-to-unicode-str [2]: http://bitworking.org/projects/httplib2/doc/html/libhttplib2.html#httplib2.Http.request Conflicts: neutron/agent/metadata/namespace_proxy.py neutron/tests/unit/agent/metadata/test_namespace_proxy.py Closes-Bug: #1501772 Change-Id: I6a32c40ff117fae43913386134c8981539697ce8 (cherry picked from commit 80e3d9be4923ecad17377b1d15c8392b8a43dac6) ** Tags added: in-stable-kilo -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1501772 Title: Metadata proxy process errors with binary user_data To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1501772/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1501772] Fix proposed to neutron (stable/kilo)
Fix proposed to branch: stable/kilo Review: https://review.openstack.org/233136 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1501772 Title: Metadata proxy process errors with binary user_data To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1501772/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1422046] Re: cinder backup-list is always listing all tenants's bug for admin
Reviewed: https://review.openstack.org/227911 Committed: https://git.openstack.org/cgit/stackforge/ospurge/commit/?id=b97992d5099ce8aa9371a5b78461d11faacbea5a Submitter: Jenkins Branch:master commit b97992d5099ce8aa9371a5b78461d11faacbea5a Author: Yves-Gwenael BourhisDate: Fri Sep 25 17:23:06 2015 +0200 Do not list cinder backups as admin with cinderclient<1.4.0 Due to the following bug: https://bugs.launchpad.net/python-cinderclient/+bug/1422046 We do not attempt to list cinder backups as admin if cinderclient's version is lower than 1.4.0 Change-Id: I570971391cff80e1d6a484c330e80f901f5210b3 Closes-Bug: #1422046 ** Changed in: ospurge Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to python-cinderclient in Ubuntu. https://bugs.launchpad.net/bugs/1422046 Title: cinder backup-list is always listing all tenants's bug for admin To manage notifications about this bug go to: https://bugs.launchpad.net/ospurge/+bug/1422046/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1418590] Re: Instance is left in ACTIVE state even if rescue fails
Reviewed: https://review.openstack.org/155120 Committed: https://git.openstack.org/cgit/openstack/nova/commit/?id=a9e4e2c9a5aaa4d675057790816aa395bc27e9bc Submitter: Jenkins Branch:master commit a9e4e2c9a5aaa4d675057790816aa395bc27e9bc Author: George ShuklinDate: Fri May 1 17:57:00 2015 +0300 If rescue failed set instance to ERROR The compute API will allow attempting to rescue an instance that is in active/stopped/error state. The compute manager will power off the instance before calling driver.rescue. If the rescue call fails in the virt driver, we should set the instance to ERROR state since we (1) know the instance is definitely not active since the compute manager powered it off and (2) we don't know what failed in the virt driver, so punting and putting the instance into ERROR state is better than leaving it broken and not signaling that with the vm_state. Co-Authored-By: Matt Riedemann Closes-Bug: 1418590 Change-Id: Ia1054d3f9193f876803f8b5a26d00bd9d5d66c12 ** Changed in: nova Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1418590 Title: Instance is left in ACTIVE state even if rescue fails To manage notifications about this bug go to: https://bugs.launchpad.net/nova/+bug/1418590/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1501703] Re: unit test failures on 32 bit architectures
Fix proposed to branch: stable/liberty Review: https://review.openstack.org/230523 ** Changed in: neutron/liberty Status: New => In Progress ** Changed in: neutron/liberty Assignee: (unassigned) => Kyle Mestery (mestery) -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1501703 Title: unit test failures on 32 bit architectures To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1501703/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1501772] Re: Metadata proxy process errors with binary user_data
Fix proposed to branch: stable/liberty Review: https://review.openstack.org/230513 ** Changed in: neutron/liberty Status: New => In Progress ** Changed in: neutron/liberty Assignee: (unassigned) => Kyle Mestery (mestery) -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1501772 Title: Metadata proxy process errors with binary user_data To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1501772/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1501772] Re: Metadata proxy process errors with binary user_data
Reviewed: https://review.openstack.org/230513 Committed: https://git.openstack.org/cgit/openstack/neutron/commit/?id=13b6d76da361178ea0b84baf4831a4c7f53e29c7 Submitter: Jenkins Branch:stable/liberty commit 13b6d76da361178ea0b84baf4831a4c7f53e29c7 Author: Ihar HrachyshkaDate: Thu Oct 1 17:13:25 2015 +0200 metadata: don't crash proxy on non-unicode user data We attempt to log every successful metadata response with LOG.debug. But as per oslo.log docs [1], we should make sure that what we pass into the library is unicode. Http.request returns a tuple of Response object and a string, which is bytes in Python 2.x [2]. That's why we need to convert the response content to unicode before passing it into oslo.log. To achieve it, we utilize encodeutils.safe_decode with 'replace' errors handling strategy, so that we don't get exceptions on input that does not conform unicode. For the unit test case, we pass a string that is not expected to convert to unicode with errors='strict' strategy or similar, and check that we still don't crash. While at it, we remove a check for the number of log calls being triggered, because it's something that we should avoid validating in test cases, and it cannot trigger a real bug. The mock that was used to count the number would also hide the bug that we try to reproduce. Note that the bug does not require debug to be set because the crash occurs before oslo.log machinery decides it should not log the message. [1]: http://docs.openstack.org/developer/oslo.log/usage.html#no-more-implicit-conversion-to-unicode-str [2]: http://bitworking.org/projects/httplib2/doc/html/libhttplib2.html#httplib2.Http.request Closes-Bug: #1501772 Change-Id: I6a32c40ff117fae43913386134c8981539697ce8 (cherry picked from commit 80e3d9be4923ecad17377b1d15c8392b8a43dac6) ** Tags added: in-stable-liberty -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1501772 Title: Metadata proxy process errors with binary user_data To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1501772/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1501703] Re: unit test failures on 32 bit architectures
Reviewed: https://review.openstack.org/230523 Committed: https://git.openstack.org/cgit/openstack/neutron/commit/?id=18344140bd0aae61dd6f50667d719cd9cfe149cb Submitter: Jenkins Branch:stable/liberty commit 18344140bd0aae61dd6f50667d719cd9cfe149cb Author: James PageDate: Thu Oct 1 11:54:28 2015 +0100 Use format to convert ints to strings This ensures that on 32bit architectures, where sometimes an implicit long is created, the resulting string does not contain a 'L' suffix as generated by the hex function. Change-Id: I264f90d68009963fe7a217c2170e1cf2f46ae2bb Closes-Bug: 1501703 (cherry picked from commit 49883f1b2bfc9a4f06b1d336553d7f0ab4289a0d) ** Tags added: in-stable-liberty -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1501703 Title: unit test failures on 32 bit architectures To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1501703/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1501703] Fix proposed to neutron (master)
Fix proposed to branch: master Review: https://review.openstack.org/229819 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1501703 Title: unit test failures on 32 bit architectures To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1501703/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1501772] Re: Metadata proxy process errors with binary user_data
Fix proposed to branch: master Review: https://review.openstack.org/229958 ** Changed in: neutron Status: Confirmed => In Progress -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1501772 Title: Metadata proxy process errors with binary user_data To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1501772/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1501703] Re: unit test failures on 32 bit architectures
Reviewed: https://review.openstack.org/229819 Committed: https://git.openstack.org/cgit/openstack/neutron/commit/?id=49883f1b2bfc9a4f06b1d336553d7f0ab4289a0d Submitter: Jenkins Branch:master commit 49883f1b2bfc9a4f06b1d336553d7f0ab4289a0d Author: James PageDate: Thu Oct 1 11:54:28 2015 +0100 Use format to convert ints to strings This ensures that on 32bit architectures, where sometimes an implicit long is created, the resulting string does not contain a 'L' suffix as generated by the hex function. Change-Id: I264f90d68009963fe7a217c2170e1cf2f46ae2bb Closes-Bug: 1501703 ** Changed in: neutron Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1501703 Title: unit test failures on 32 bit architectures To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1501703/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1501772] Re: Metadata proxy process errors with binary user_data
** Changed in: neutron Assignee: Ihar Hrachyshka (ihar-hrachyshka) => Cedric Brandily (cbrandily) -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1501772 Title: Metadata proxy process errors with binary user_data To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1501772/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1501772] Re: Metadata proxy process errors with binary user_data
** Changed in: neutron Assignee: Cedric Brandily (cbrandily) => Henry Gessau (gessau) -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1501772 Title: Metadata proxy process errors with binary user_data To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1501772/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1501772] Re: Metadata proxy process errors with binary user_data
Reviewed: https://review.openstack.org/229958 Committed: https://git.openstack.org/cgit/openstack/neutron/commit/?id=80e3d9be4923ecad17377b1d15c8392b8a43dac6 Submitter: Jenkins Branch:master commit 80e3d9be4923ecad17377b1d15c8392b8a43dac6 Author: Ihar HrachyshkaDate: Thu Oct 1 17:13:25 2015 +0200 metadata: don't crash proxy on non-unicode user data We attempt to log every successful metadata response with LOG.debug. But as per oslo.log docs [1], we should make sure that what we pass into the library is unicode. Http.request returns a tuple of Response object and a string, which is bytes in Python 2.x [2]. That's why we need to convert the response content to unicode before passing it into oslo.log. To achieve it, we utilize encodeutils.safe_decode with 'replace' errors handling strategy, so that we don't get exceptions on input that does not conform unicode. For the unit test case, we pass a string that is not expected to convert to unicode with errors='strict' strategy or similar, and check that we still don't crash. While at it, we remove a check for the number of log calls being triggered, because it's something that we should avoid validating in test cases, and it cannot trigger a real bug. The mock that was used to count the number would also hide the bug that we try to reproduce. Note that the bug does not require debug to be set because the crash occurs before oslo.log machinery decides it should not log the message. [1]: http://docs.openstack.org/developer/oslo.log/usage.html#no-more-implicit-conversion-to-unicode-str [2]: http://bitworking.org/projects/httplib2/doc/html/libhttplib2.html#httplib2.Http.request Closes-Bug: #1501772 Change-Id: I6a32c40ff117fae43913386134c8981539697ce8 ** Changed in: neutron Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1501772 Title: Metadata proxy process errors with binary user_data To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1501772/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1497309] Re: l3-agent unable to parse output from ip netns list (iproute2 >= 4.0)
Reviewed: https://review.openstack.org/225206 Committed: https://git.openstack.org/cgit/openstack/neutron/commit/?id=3aefdf4de76fdcdc02093bc631e339f9ecd4c707 Submitter: Jenkins Branch:master commit 3aefdf4de76fdcdc02093bc631e339f9ecd4c707 Author: James PageDate: Fri Sep 18 16:38:47 2015 +0100 Add compatibility with iproute2 >= 4.0 The ip netns list command adds additional id data in more recent versions of iproute2 of the format: qdhcp-35fc068a-750d-4add-b1d2-af392dbd8790 (id: 1) Update parsing to deal with old and new formats. Change-Id: I0d3fc4262284172f5ad31e4f2f78ae1fb33b4228 Closes-Bug: 1497309 ** Changed in: neutron Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1497309 Title: l3-agent unable to parse output from ip netns list (iproute2 >= 4.0) To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1497309/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1422046] Re: cinder backup-list is always listing all tenants's bug for admin
Fix proposed to branch: master Review: https://review.openstack.org/227911 ** Changed in: ospurge Status: Confirmed => In Progress -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to python-cinderclient in Ubuntu. https://bugs.launchpad.net/bugs/1422046 Title: cinder backup-list is always listing all tenants's bug for admin To manage notifications about this bug go to: https://bugs.launchpad.net/ospurge/+bug/1422046/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1398999] Re: Block migrate with attached volumes copies volumes to themselves
Fix proposed to branch: master Review: https://review.openstack.org/227278 ** Changed in: nova Status: Confirmed => In Progress ** Changed in: nova Assignee: Chris St. Pierre (stpierre) => Bartosz Fic (bartosz-fic) -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1398999 Title: Block migrate with attached volumes copies volumes to themselves To manage notifications about this bug go to: https://bugs.launchpad.net/nova/+bug/1398999/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1497309] Re: l3-agent unable to parse output from ip netns list (iproute2 >= 4.0)
Fix proposed to branch: master Review: https://review.openstack.org/225206 ** Changed in: neutron Status: New => In Progress -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1497309 Title: l3-agent unable to parse output from ip netns list (iproute2 >= 4.0) To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1497309/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1483159] Change abandoned on nova (master)
Change abandoned by James Page (james.p...@canonical.com) on branch: master Review: https://review.openstack.org/211041 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1483159 Title: Canonical naming for non-x86 architectures To manage notifications about this bug go to: https://bugs.launchpad.net/nova/+bug/1483159/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1488815] Re: Kernel traces with skb_warn_bad_offload showing up during an AIO deployment on Ubuntu 14.04
Reviewed: https://review.openstack.org/223292 Committed: https://git.openstack.org/cgit/openstack/openstack-ansible/commit/?id=cdcfa92b8e9604b82c7c3f8aca6fb3776df56552 Submitter: Jenkins Branch:kilo commit cdcfa92b8e9604b82c7c3f8aca6fb3776df56552 Author: Matthew KassawaraDate: Tue Sep 1 09:12:50 2015 -0500 Disable scatter-gather offload on host bridges Disable scatter-gather offload on host bridges to eliminate kernel traces that may impact container connectivity. Only addressing AIO interfaces for now as host configuration for actual deployments resides in documentation. Change-Id: Ia66b2bb64b9ace66f5fa3ca8edcc9909af54a4f2 Partial-Bug: #1488815 Co-Authored-By: Evan Callicoat (cherry picked from commit 6f6a37fce832be1b3acf0d6a1702ffcee4a33e85) ** Tags added: in-kilo -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to qemu-kvm in Ubuntu. https://bugs.launchpad.net/bugs/1488815 Title: Kernel traces with skb_warn_bad_offload showing up during an AIO deployment on Ubuntu 14.04 To manage notifications about this bug go to: https://bugs.launchpad.net/openstack-ansible/+bug/1488815/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1353939] Fix proposed to nova (stable/juno)
Fix proposed to branch: stable/juno Review: https://review.openstack.org/221529 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1353939 Title: Rescue fails with 'Failed to terminate process: Device or resource busy' in the n-cpu log To manage notifications about this bug go to: https://bugs.launchpad.net/nova/+bug/1353939/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1449056] Change abandoned on devstack (master)
Change abandoned by Mathieu Rohon (mathieu.ro...@gmail.com) on branch: master Review: https://review.openstack.org/177785 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to rabbitmq-server in Ubuntu. https://bugs.launchpad.net/bugs/1449056 Title: rabbitmq not ready after restart To manage notifications about this bug go to: https://bugs.launchpad.net/devstack/+bug/1449056/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1457517] Re: Unable to boot from volume when flavor disk too small
Reviewed: https://review.openstack.org/213308 Committed: https://git.openstack.org/cgit/openstack/nova/commit/?id=8794b938dcb983b7c918718807c2396cb255b4ce Submitter: Jenkins Branch:stable/kilo commit 8794b938dcb983b7c918718807c2396cb255b4ce Author: Matthew BoothDate: Wed Jul 22 14:56:52 2015 +0100 Don't check flavor disk size when booting from volume When creating a volume from an image, cinder copies the image metadata into volume properties. When booting from the volume, we read this metadata from the volume and use it as image metadata once again. While fixing the check against min_ram, change I861a78b5c7efa71e4bf7206d388b8d0d8048c78e introduced a regression which prevents a user from booting a volume which is larger than the flavor's disk. As we are not creating this disk, this check does not make sense. Similarly, it checks the image metadata's min_disk against the flavor disk size, which is not being used. This change leaves the image metadata check unaltered when creating a flavor disk. When booting from a volume, we check min_disk from image metadata against the actual size of the volume. We don't check the volume size at all. The check against min_ram is retained unaltered. Closes-Bug: #1457517 Closes-Bug: #1459491 Closes-Bug: #1466305 Change-Id: I264493172da20b664df571e32876030246c2a87c (cherry picked from commit 642c986f0636d52a9ba279c87e25082b4aa9b3b8) ** Tags added: in-stable-kilo -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1457517 Title: Unable to boot from volume when flavor disk too small To manage notifications about this bug go to: https://bugs.launchpad.net/nova/+bug/1457517/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1485694] Re: Keystone raises an exception when it receives incorrectly encoded parameters
Reviewed: https://review.openstack.org/213796 Committed: https://git.openstack.org/cgit/openstack/keystone/commit/?id=ef5f60305ce756a0832106ffa98a2314435a402d Submitter: Jenkins Branch:master commit ef5f60305ce756a0832106ffa98a2314435a402d Author: Sean Perry sean.pe...@hp.com Date: Mon Aug 17 10:25:22 2015 -0700 Prevent exception for invalidly encoded parameters An exception occurs in the WebOb library when it tries to decode a parameter that is not valid UTF8. To avoid this let's wrap the section using the WebOb code and raise a ValidationError so the user gets proper feedback instead of a UnknownError and a server 500 response. Change-Id: I6781770a6c5b317eaef84064ef61b9c838d22bc2 Closes-Bug: 1485694 ** Changed in: keystone Status: In Progress = Fix Committed -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to keystone in Ubuntu. https://bugs.launchpad.net/bugs/1485694 Title: Keystone raises an exception when it receives incorrectly encoded parameters To manage notifications about this bug go to: https://bugs.launchpad.net/keystone/+bug/1485694/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1485694] Re: Keystone raises an exception when it receives incorrectly encoded parameters
** Changed in: keystone Status: Confirmed = In Progress ** Changed in: keystone Assignee: (unassigned) = Sean Perry (sean-perry-a) -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to keystone in Ubuntu. https://bugs.launchpad.net/bugs/1485694 Title: Keystone raises an exception when it receives incorrectly encoded parameters To manage notifications about this bug go to: https://bugs.launchpad.net/keystone/+bug/1485694/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1418187] Change abandoned on nova (master)
Change abandoned by Michael Still (mi...@stillhq.com) on branch: master Review: https://review.openstack.org/160905 Reason: This patch as been WIP'ed for a very long time, so I am going to abandon it to keep the review queue sane. Please restore the change when its ready for review. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1418187 Title: _get_host_numa_topology assumes numa cell has memory To manage notifications about this bug go to: https://bugs.launchpad.net/nova/+bug/1418187/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1418187] Change abandoned on nova (master)
Change abandoned by Michael Still (mi...@stillhq.com) on branch: master Review: https://review.openstack.org/160906 Reason: This patch as been WIP'ed for a very long time, so I am going to abandon it to keep the review queue sane. Please restore the change when its ready for review. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1418187 Title: _get_host_numa_topology assumes numa cell has memory To manage notifications about this bug go to: https://bugs.launchpad.net/nova/+bug/1418187/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1483159] Re: Canonical naming for non-x86 architectures
** Changed in: nova Status: New = In Progress ** Changed in: nova Assignee: (unassigned) = James Page (james-page) -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1483159 Title: Canonical naming for non-x86 architectures To manage notifications about this bug go to: https://bugs.launchpad.net/nova/+bug/1483159/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1459046] Change abandoned on nova (stable/juno)
Change abandoned by Edward Hope-Morley (edward.hope-mor...@canonical.com) on branch: stable/juno Review: https://review.openstack.org/193110 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1459046 Title: nova-* services do not start if rsyslog is not yet started To manage notifications about this bug go to: https://bugs.launchpad.net/nova/+bug/1459046/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1459046] Change abandoned on nova (stable/icehouse)
Change abandoned by Jeremy Stanley (fu...@yuggoth.org) on branch: stable/icehouse Review: https://review.openstack.org/193215 Reason: This branch has reached end of life and is being deleted. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1459046 Title: nova-* services do not start if rsyslog is not yet started To manage notifications about this bug go to: https://bugs.launchpad.net/nova/+bug/1459046/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1459046] Change abandoned on nova (stable/icehouse)
Change abandoned by Jeremy Stanley (fu...@yuggoth.org) on branch: stable/icehouse Review: https://review.openstack.org/193105 Reason: This branch has reached end of life and is being deleted. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1459046 Title: nova-* services do not start if rsyslog is not yet started To manage notifications about this bug go to: https://bugs.launchpad.net/nova/+bug/1459046/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1459046] Change abandoned on nova (stable/icehouse)
Change abandoned by Jeremy Stanley (fu...@yuggoth.org) on branch: stable/icehouse Review: https://review.openstack.org/193214 Reason: This branch has reached end of life and is being deleted. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1459046 Title: nova-* services do not start if rsyslog is not yet started To manage notifications about this bug go to: https://bugs.launchpad.net/nova/+bug/1459046/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1459046] Change abandoned on nova (stable/icehouse)
Change abandoned by Jeremy Stanley (fu...@yuggoth.org) on branch: stable/icehouse Review: https://review.openstack.org/193209 Reason: This branch has reached end of life and is being deleted. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1459046 Title: nova-* services do not start if rsyslog is not yet started To manage notifications about this bug go to: https://bugs.launchpad.net/nova/+bug/1459046/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1470570] Change abandoned on keystone (master)
*** This bug is a duplicate of bug 1468000 *** https://bugs.launchpad.net/bugs/1468000 Change abandoned by Hans Feldt (hans.fe...@ericsson.com) on branch: master Review: https://review.openstack.org/197650 Reason: duplicate -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to keystone in Ubuntu. https://bugs.launchpad.net/bugs/1470570 Title: role assignment to group fails: Bad search filter To manage notifications about this bug go to: https://bugs.launchpad.net/keystone/+bug/1470570/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1470570] Re: role assignment to group fails: Bad search filter
** Changed in: keystone Status: New = In Progress -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to keystone in Ubuntu. https://bugs.launchpad.net/bugs/1470570 Title: role assignment to group fails: Bad search filter To manage notifications about this bug go to: https://bugs.launchpad.net/keystone/+bug/1470570/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1385295] Re: use_syslog=True does not log to syslog via /dev/log anymore
Reviewed: https://review.openstack.org/193633 Committed: https://git.openstack.org/cgit/openstack/oslo.log/commit/?id=9a6c22663b57b7f2d9071767dadf28e59075a75e Submitter: Jenkins Branch:stable/kilo commit 9a6c22663b57b7f2d9071767dadf28e59075a75e Author: Julien Danjou jul...@danjou.info Date: Mon Nov 24 18:35:36 2014 +0100 Replace RFCSysLogHandler by a syslog() based one Rather than using the Python provided logging module that reimplents the whole syslog protocol and pointing it to /dev/log (which is not portable), we use the system calls from the syslog module, which are portable and default to the behaviour we actually want. Closes-Bug: 1385295 Closes-Bug: 1391428 Partial-Bug: 1459046 (cherry picked from commit 33f5c6f94d94d5464fea38229d880f177b05aff7) Conflicts: oslo_log/log.py requirements.txt Change-Id: I2e47c896841cbd43d1f5504f2b8b897fc432cd0b ** Tags added: in-stable-kilo -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1385295 Title: use_syslog=True does not log to syslog via /dev/log anymore To manage notifications about this bug go to: https://bugs.launchpad.net/oslo.log/+bug/1385295/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1459046] Re: nova-* services do not start if rsyslog is not yet started
Reviewed: https://review.openstack.org/193633 Committed: https://git.openstack.org/cgit/openstack/oslo.log/commit/?id=9a6c22663b57b7f2d9071767dadf28e59075a75e Submitter: Jenkins Branch:stable/kilo commit 9a6c22663b57b7f2d9071767dadf28e59075a75e Author: Julien Danjou jul...@danjou.info Date: Mon Nov 24 18:35:36 2014 +0100 Replace RFCSysLogHandler by a syslog() based one Rather than using the Python provided logging module that reimplents the whole syslog protocol and pointing it to /dev/log (which is not portable), we use the system calls from the syslog module, which are portable and default to the behaviour we actually want. Closes-Bug: 1385295 Closes-Bug: 1391428 Partial-Bug: 1459046 (cherry picked from commit 33f5c6f94d94d5464fea38229d880f177b05aff7) Conflicts: oslo_log/log.py requirements.txt Change-Id: I2e47c896841cbd43d1f5504f2b8b897fc432cd0b ** Tags added: in-stable-kilo -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1459046 Title: nova-* services do not start if rsyslog is not yet started To manage notifications about this bug go to: https://bugs.launchpad.net/nova/+bug/1459046/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1385295] Fix proposed to oslo.log (stable/kilo)
Fix proposed to branch: stable/kilo Review: https://review.openstack.org/193633 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1385295 Title: use_syslog=True does not log to syslog via /dev/log anymore To manage notifications about this bug go to: https://bugs.launchpad.net/oslo.log/+bug/1385295/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1459046] Fix proposed to nova (stable/icehouse)
Fix proposed to branch: stable/icehouse Review: https://review.openstack.org/193215 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1459046 Title: nova-* services do not start if rsyslog is not yet started To manage notifications about this bug go to: https://bugs.launchpad.net/nova/+bug/1459046/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1459046] Fix proposed to nova (stable/icehouse)
Fix proposed to branch: stable/icehouse Review: https://review.openstack.org/193214 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1459046 Title: nova-* services do not start if rsyslog is not yet started To manage notifications about this bug go to: https://bugs.launchpad.net/nova/+bug/1459046/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1449056] Re: rabbitmq not ready after restart
Reviewed: https://review.openstack.org/186641 Committed: https://git.openstack.org/cgit/openstack-dev/devstack/commit/?id=6bc905c3488a93fa87776bcd0af7e362a90b082f Submitter: Jenkins Branch:master commit 6bc905c3488a93fa87776bcd0af7e362a90b082f Author: Tony Breeds t...@bakeyournoodle.com Date: Fri May 15 12:51:43 2015 +1000 Change the restart_rpc_backend loop to accomodate async rabbitmq Some distros have converted to systemd for starting RabbitMQ. This has resulted in: --- [Call Trace] ./stack.sh:904:restart_rpc_backend /home/stack/projects/openstack/openstack-dev/devstack/lib/rpc_backend:201:die [ERROR] /home/stack/projects/openstack/openstack-dev/devstack/lib/rpc_backend:201 Failed to set rabbitmq password Error on exit World dumping... see /opt/stack/logs/worlddump-2015-05-29-031618.txt for details --- Because 'restart_service rabbitmq-server' returns before the server is ready to accept connections. Alter the retry loop to only restart the rabbitmq-server every second time through the loop. Allowing time for the slow rabbit to start. Closes-Bug: 1449056 Change-Id: Ibb291c1ecfd109f9ed10b5f194933364985cc1ce ** Changed in: devstack Status: In Progress = Fix Released -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to rabbitmq-server in Ubuntu. https://bugs.launchpad.net/bugs/1449056 Title: rabbitmq not ready after restart To manage notifications about this bug go to: https://bugs.launchpad.net/devstack/+bug/1449056/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1449056] Re: rabbitmq not ready after restart
** Changed in: devstack Assignee: Dr. Jens Rosenboom (j-rosenboom-j) = Tony Breeds (o-tony) -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to rabbitmq-server in Ubuntu. https://bugs.launchpad.net/bugs/1449056 Title: rabbitmq not ready after restart To manage notifications about this bug go to: https://bugs.launchpad.net/devstack/+bug/1449056/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1449056] Re: rabbitmq not ready after restart
** Changed in: devstack Assignee: Tony Breeds (o-tony) = Dr. Jens Rosenboom (j-rosenboom-j) -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to rabbitmq-server in Ubuntu. https://bugs.launchpad.net/bugs/1449056 Title: rabbitmq not ready after restart To manage notifications about this bug go to: https://bugs.launchpad.net/devstack/+bug/1449056/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1449742] Re: InvalidUUID exception after vifs plug failed
Reviewed: https://review.openstack.org/178603 Committed: https://git.openstack.org/cgit/openstack/nova/commit/?id=378a8d4aeb87cc037127ccab49bcced71e93c88e Submitter: Jenkins Branch:stable/icehouse commit 378a8d4aeb87cc037127ccab49bcced71e93c88e Author: jichenjc jiche...@cn.ibm.com Date: Wed Apr 15 20:15:29 2015 +0800 Use instance.uuid instead of instance commit e9cf07b96f57fed0d9f46bd8f24aac491b6cb976 was ported to Icehouse but the commit 6b06e45dca465ae3f457b70c1126a8aadd5ccbbc was not ported to Icehouse, The function _set_instance_error_state is still expecting a string with the instance uuid as argument instead of an instance object. So this patch partially changed the cherry-picked commit e9cf07b96f57fed0d9f46bd8f24aac491b6cb976 Change-Id: I3bdd32d29d37ba375eb5af52758b93d08f387663 Closes-Bug: #1449742 ** Tags added: in-stable-icehouse -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1449742 Title: InvalidUUID exception after vifs plug failed To manage notifications about this bug go to: https://bugs.launchpad.net/nova/+bug/1449742/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1426324] Re: VFS blkid calls need to handle 0 or 2 return codes
Reviewed: https://review.openstack.org/182716 Committed: https://git.openstack.org/cgit/openstack/nova/commit/?id=1b941f1d61ed830cc43aa99b105a1c5629ceab42 Submitter: Jenkins Branch:stable/kilo commit 1b941f1d61ed830cc43aa99b105a1c5629ceab42 Author: James Page james.p...@ubuntu.com Date: Fri Feb 27 11:27:30 2015 + Handle return code 2 from blkid calls blkid returns code 2 if the requested TYPE key is not found for the specified device. Ensure that this situation is handled correctly; blkid will not return any data, so the return value will be empty. Change-Id: I38cd7b53cdfd694c0eba1b6054d8e4c33759b0b8 Closes-Bug: #1426324 (cherry picked from commit 051fced477cdead4e307c23fc343da427beb6c81) ** Tags added: in-stable-kilo -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1426324 Title: VFS blkid calls need to handle 0 or 2 return codes To manage notifications about this bug go to: https://bugs.launchpad.net/cloud-archive/+bug/1426324/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1426324] Fix proposed to nova (stable/kilo)
Fix proposed to branch: stable/kilo Review: https://review.openstack.org/182716 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1426324 Title: VFS blkid calls need to handle 0 or 2 return codes To manage notifications about this bug go to: https://bugs.launchpad.net/cloud-archive/+bug/1426324/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1388077] Change abandoned on nova (master)
Change abandoned by Joe Gordon (joe.gord...@gmail.com) on branch: master Review: https://review.openstack.org/132263 Reason: This review is 4 weeks without comment, and failed Jenkins the last time it was checked. We are abandoning this for now. Feel free to reactivate the review by pressing the restore button and leaving a 'recheck' comment to get fresh test results. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1388077 Title: Parallel periodic instance power state reporting from compute nodes has high impact on conductors and message broker To manage notifications about this bug go to: https://bugs.launchpad.net/nova/+bug/1388077/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1374999] Re: iSCSI volume detach does not correctly remove the multipath device descriptors
** Changed in: nova Assignee: Jorge Niedbalski (niedbalski) = Felipe Reyes (freyes) -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1374999 Title: iSCSI volume detach does not correctly remove the multipath device descriptors To manage notifications about this bug go to: https://bugs.launchpad.net/nova/+bug/1374999/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1426324] Re: VFS blkid calls need to handle 0 or 2 return codes
Reviewed: https://review.openstack.org/159797 Committed: https://git.openstack.org/cgit/openstack/nova/commit/?id=051fced477cdead4e307c23fc343da427beb6c81 Submitter: Jenkins Branch:master commit 051fced477cdead4e307c23fc343da427beb6c81 Author: James Page james.p...@ubuntu.com Date: Fri Feb 27 11:27:30 2015 + Handle return code 2 from blkid calls blkid returns code 2 if the requested TYPE key is not found for the specified device. Ensure that this situation is handled correctly; blkid will not return any data, so the return value will be empty. Change-Id: I38cd7b53cdfd694c0eba1b6054d8e4c33759b0b8 Closes-Bug: #1426324 ** Changed in: nova Status: In Progress = Fix Committed -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1426324 Title: VFS blkid calls need to handle 0 or 2 return codes To manage notifications about this bug go to: https://bugs.launchpad.net/cloud-archive/+bug/1426324/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1368815] Change abandoned on cinder (master)
Change abandoned by Mike Perez (thin...@gmail.com) on branch: master Review: https://review.openstack.org/143575 Reason: No activity for over a month. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to qemu in Ubuntu. https://bugs.launchpad.net/bugs/1368815 Title: qemu-img convert intermittently corrupts output images To manage notifications about this bug go to: https://bugs.launchpad.net/cinder/+bug/1368815/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1374999] Re: iSCSI volume detach does not correctly remove the multipath device descriptors
** Changed in: nova Assignee: Felipe Reyes (freyes) = Jorge Niedbalski (niedbalski) -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1374999 Title: iSCSI volume detach does not correctly remove the multipath device descriptors To manage notifications about this bug go to: https://bugs.launchpad.net/nova/+bug/1374999/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1451134] Change abandoned on trove (master)
Change abandoned by Emilien Macchi (emil...@redhat.com) on branch: master Review: https://review.openstack.org/179626 Reason: I think this is something that needs to be solved in packaging. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to openstack-trove in Ubuntu. https://bugs.launchpad.net/bugs/1451134 Title: Default connection parameters fails when running dbsync To manage notifications about this bug go to: https://bugs.launchpad.net/trove/+bug/1451134/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1304333] Re: [SRU] Instance left stuck in transitional POWERING state
Reviewed: https://review.openstack.org/176234 Committed: https://git.openstack.org/cgit/openstack/nova/commit/?id=d8853eef181fabebc13bdfdaa98818cfcef318be Submitter: Jenkins Branch:stable/icehouse commit d8853eef181fabebc13bdfdaa98818cfcef318be Author: David McNally dave.mcna...@hp.com Date: Fri Nov 22 16:18:53 2013 + Recover from POWERING-* state on compute manager start-up If a compute manager is stopped / fails during POWERING-ON or POWERING-OFF operations then the instance will be left stuck in a transitional task_state. This change handles both these states by simply either retriggering the power on or power off request on start-up of the compute manager. If the operation had previously completed then retrying will essentially be a no-op so it is safe to handle instances in this state in this way. Closes bug: #1304333 (cherry picked from commit 8f7056f48c115ee0939c76ce08531dab0f14e354) Change-Id: I262be6b13a764bc1355be34cdc0180e8e87f260b ** Tags added: in-stable-icehouse -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1304333 Title: [SRU] Instance left stuck in transitional POWERING state To manage notifications about this bug go to: https://bugs.launchpad.net/nova/+bug/1304333/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1449742] Fix proposed to nova (stable/icehouse)
Fix proposed to branch: stable/icehouse Review: https://review.openstack.org/178603 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1449742 Title: InvalidUUID exception after vifs plug failed To manage notifications about this bug go to: https://bugs.launchpad.net/nova/+bug/1449742/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1446174] Re: test suite failures under i386
Reviewed: https://review.openstack.org/175362 Committed: https://git.openstack.org/cgit/openstack/trove/commit/?id=66c48ba1735b359e0eb8ecefa2c04d962a70a7f1 Submitter: Jenkins Branch:master commit 66c48ba1735b359e0eb8ecefa2c04d962a70a7f1 Author: James Page james.p...@ubuntu.com Date: Mon Apr 20 12:39:36 2015 +0100 Support testing on 32 bit systems Under a 32 bit OS, the type of max/min is long, not int. Allow both long and int as valid types for these parameters. Change-Id: If0ae44090229e2bf77405d81f06698e75ac54b97 Closes-Bug: #1446174 ** Changed in: trove Status: In Progress = Fix Committed -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to openstack-trove in Ubuntu. https://bugs.launchpad.net/bugs/1446174 Title: test suite failures under i386 To manage notifications about this bug go to: https://bugs.launchpad.net/trove/+bug/1446174/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1446174] Re: test suite failures under i386
Fix proposed to branch: master Review: https://review.openstack.org/175362 ** Changed in: trove Status: New = In Progress ** Changed in: trove Assignee: (unassigned) = James Page (james-page) -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to openstack-trove in Ubuntu. https://bugs.launchpad.net/bugs/1446174 Title: test suite failures under i386 To manage notifications about this bug go to: https://bugs.launchpad.net/trove/+bug/1446174/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1418187] Re: _get_host_numa_topology assumes numa cell has memory
Reviewed: https://review.openstack.org/166004 Committed: https://git.openstack.org/cgit/openstack/nova/commit/?id=34f029e68d607c7154adcb6d6616da8da0db3650 Submitter: Jenkins Branch:stable/juno commit 34f029e68d607c7154adcb6d6616da8da0db3650 Author: Sahid Orentino Ferdjaoui sahid.ferdja...@redhat.com Date: Tue Mar 3 05:00:40 2015 -0500 libvirt: make default value of numa cell memory to 0 when not defined Some arch can have cells without memory or cpus defined and libvirt will return an XML without these elements. Our object defintion of the fields cpus and memory cannot let us to make them to None when not defined but currently the config representation of a NUMA make it to None. This patch fix the default value of config memory to 0 when libvirt does not return memory element for a cell. Also this cannot be considered come a fix for bug 1418187 since we have to handle these cases (cpus or memory not defined) during scheduling. thse case can be addressed when using distances which will be addressed in a next serie of patches. Conflicts: nova/tests/unit/virt/libvirt/test_config.py nova/virt/libvirt/config.py NOTE(mriedem): The conflict in config.py is due to the mempages code added on master with commit 3283e2a42 that's not in juno. The test conflict was due to moving the tests in kilo. Related-Bug: #1418187 Change-Id: Iac08d1221341a86c081d5e905c704fb1c9dca276 (cherry picked from commit 291c1a1db1ab3ceccfac7a3c8312b6fdce3aaa84) ** Tags added: in-stable-juno -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1418187 Title: _get_host_numa_topology assumes numa cell has memory To manage notifications about this bug go to: https://bugs.launchpad.net/nova/+bug/1418187/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1418187] Related fix merged to nova (master)
Reviewed: https://review.openstack.org/160904 Committed: https://git.openstack.org/cgit/openstack/nova/commit/?id=291c1a1db1ab3ceccfac7a3c8312b6fdce3aaa84 Submitter: Jenkins Branch:master commit 291c1a1db1ab3ceccfac7a3c8312b6fdce3aaa84 Author: Sahid Orentino Ferdjaoui sahid.ferdja...@redhat.com Date: Tue Mar 3 05:00:40 2015 -0500 libvirt: make default value of numa cell memory to 0 when not defined Some arch can have cells without memory or cpus defined and libvirt will return an XML without these elements. Our object defintion of the fields cpus and memory cannot let us to make them to None when not defined but currently the config representation of a NUMA make it to None. This patch fix the default value of config memory to 0 when libvirt does not return memory element for a cell. Also this cannot be considered come a fix for bug 1418187 since we have to handle these cases (cpus or memory not defined) during scheduling. thse case can be addressed when using distances which will be addressed in a next serie of patches. Related-Bug: #1418187 Change-Id: Iac08d1221341a86c081d5e905c704fb1c9dca276 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nova in Ubuntu. https://bugs.launchpad.net/bugs/1418187 Title: _get_host_numa_topology assumes numa cell has memory To manage notifications about this bug go to: https://bugs.launchpad.net/nova/+bug/1418187/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs