[Yahoo-eng-team] [Bug 1432373] [NEW] Horizon: port create missing options

2015-03-15 Thread Danny Choi
Public bug reported:

nova-manage version: 2015.1

In Horizon, port create is missing options compared to CLI:
 --tenant-id
 --mac-address
 --fixed-ip
 --security-group
 --no-security-groups
 --extra-dhcp-opt

*
ubuntu@trusty1:~/devstack$ neutron help port-create
usage: neutron port-create [-h] [-f {html,json,shell,table,value,yaml}]
   [-c COLUMN] [--max-width integer]
   [--prefix PREFIX] [--request-format {json,xml}]
   [--tenant-id TENANT_ID] [--name NAME]
   [--admin-state-down] [--mac-address MAC_ADDRESS]
   [--device-id DEVICE_ID]
   [--fixed-ip subnet_id=SUBNET,ip_address=IP_ADDR]
   [--security-group SECURITY_GROUP | 
--no-security-groups]
   [--extra-dhcp-opt EXTRA_DHCP_OPTS]
   NETWORK

Create a port for a given tenant.

positional arguments:
  NETWORK   Network ID or name this port belongs to.

optional arguments:
  -h, --helpshow this help message and exit
  --request-format {json,xml}
The XML or JSON request format.
  --tenant-id TENANT_ID
The owner tenant ID.
  --name NAME   Name of this port.
  --admin-state-downSet admin state up to false.
  --mac-address MAC_ADDRESS
MAC address of this port.
  --device-id DEVICE_ID
Device ID of this port.
  --fixed-ip subnet_id=SUBNET,ip_address=IP_ADDR
Desired IP and/or subnet for this port:
subnet_id=name_or_id,ip_address=ip.You can repeat
this option.
  --security-group SECURITY_GROUP
Security group associated with the port. You can
repeat this option.
  --no-security-groups  Associate no security groups with the port.
  --extra-dhcp-opt EXTRA_DHCP_OPTS
Extra dhcp options to be assigned to this port:
opt_name=dhcp_option_name,opt_value=value. You can
repeat this option.

*

Steps to repro:
1. Log in Horizon as admin.
2. At left panel, Admin-System-Networks.
3. Select a network by clicking on the Network Name.
4. Ports-Create Port

** Affects: horizon
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1432373

Title:
  Horizon: port create missing options

Status in OpenStack Dashboard (Horizon):
  New

Bug description:
  nova-manage version: 2015.1

  In Horizon, port create is missing options compared to CLI:
   --tenant-id
   --mac-address
   --fixed-ip
   --security-group
   --no-security-groups
   --extra-dhcp-opt

  *
  ubuntu@trusty1:~/devstack$ neutron help port-create
  usage: neutron port-create [-h] [-f {html,json,shell,table,value,yaml}]
 [-c COLUMN] [--max-width integer]
 [--prefix PREFIX] [--request-format {json,xml}]
 [--tenant-id TENANT_ID] [--name NAME]
 [--admin-state-down] [--mac-address MAC_ADDRESS]
 [--device-id DEVICE_ID]
 [--fixed-ip subnet_id=SUBNET,ip_address=IP_ADDR]
 [--security-group SECURITY_GROUP | 
--no-security-groups]
 [--extra-dhcp-opt EXTRA_DHCP_OPTS]
 NETWORK

  Create a port for a given tenant.

  positional arguments:
NETWORK   Network ID or name this port belongs to.

  optional arguments:
-h, --helpshow this help message and exit
--request-format {json,xml}
  The XML or JSON request format.
--tenant-id TENANT_ID
  The owner tenant ID.
--name NAME   Name of this port.
--admin-state-downSet admin state up to false.
--mac-address MAC_ADDRESS
  MAC address of this port.
--device-id DEVICE_ID
  Device ID of this port.
--fixed-ip subnet_id=SUBNET,ip_address=IP_ADDR
  Desired IP and/or subnet for this port:
  subnet_id=name_or_id,ip_address=ip.You can repeat
  this option.
--security-group SECURITY_GROUP
  Security group associated with the port. You can
  repeat this option.
--no-security-groups  Associate no security 

[Yahoo-eng-team] [Bug 1430405] Re: Nova volume-delete does not accept display name as input to remove volume

2015-03-15 Thread ugvddm
Thanks for your remind.

** Changed in: nova
 Assignee: ugvddm (271025598-9) = (unassigned)

** Changed in: nova
   Status: Confirmed = Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1430405

Title:
  Nova volume-delete does not accept display name as input to remove
  volume

Status in OpenStack Compute (Nova):
  Invalid

Bug description:
  Issue: can not use the display name to delete a volume through the
  nova volume-delete {display name}.

  
   ± nova volume-list
  
++--+--+---+-+---+
  | ID  
  | Status | Display Name | Size   | Volume Type | Attached to |
  
++--+-+-++---+
  | dcc3c310-4187-49d7-b78e-3690b38bddb8 | available | test3a   | 1 
| dot3a   | |
  
++--+-+-++---+
  ± nova volume-delete test3a
  Delete for volume test3a failed: No volume with a name or ID of 'test3a' 
exists.
  ± nova volume-delete dcc3c310-4187-49d7-b78e-3690b38bddb8
  ± nova volume-list
  
++--+-+--+-+---+
  | ID | Status | Display Name | Size | Volume Type | Attached to |
  
++--+-+--+-+---+
  
++--+-+--+-+---+

  Version; Kilo/trunk

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1430405/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1432401] [NEW] New Launch instance wizard should not display networks when neutron is not enabled.

2015-03-15 Thread Travis Tripp
Public bug reported:

New Launch instance wizard should not display networks when neutron is
not enabled.

See: https://review.openstack.org/#/c/164359/

** Affects: horizon
 Importance: Undecided
 Assignee: Travis Tripp (travis-tripp)
 Status: In Progress

** Changed in: horizon
   Status: New = In Progress

** Changed in: horizon
 Assignee: (unassigned) = Travis Tripp (travis-tripp)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1432401

Title:
  New Launch instance wizard should not display networks when neutron is
  not enabled.

Status in OpenStack Dashboard (Horizon):
  In Progress

Bug description:
  New Launch instance wizard should not display networks when neutron is
  not enabled.

  See: https://review.openstack.org/#/c/164359/

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1432401/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1432393] [NEW] Neutron: port-create missing help info for the option: --binding

2015-03-15 Thread Danny Choi
Public bug reported:

nova-manage version: 2015.1

Issue: Neutron port-create missing help info for the option: --binding:vnic-type
Valid inputs are 'normal', 'direct' and 'macvtap'. 

ubuntu@trusty1:~/devstack$ neutron port-create --name sriov-mactap 
--binding:vnic-type=mactap private
Invalid input for binding:vnic_type. Reason: 'mactap' is not in ['normal', 
'direct', 'macvtap'].

ubuntu@trusty1:~/devstack$ neutron help port-create
usage: neutron port-create [-h] [-f {html,json,shell,table,value,yaml}]
   [-c COLUMN] [--max-width integer]
   [--prefix PREFIX] [--request-format {json,xml}]
   [--tenant-id TENANT_ID] [--name NAME]
   [--admin-state-down] [--mac-address MAC_ADDRESS]
   [--device-id DEVICE_ID]
   [--fixed-ip subnet_id=SUBNET,ip_address=IP_ADDR]
   [--security-group SECURITY_GROUP | 
--no-security-groups]
   [--extra-dhcp-opt EXTRA_DHCP_OPTS]
   NETWORK

** Affects: neutron
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1432393

Title:
  Neutron: port-create missing help info for the option: --binding

Status in OpenStack Neutron (virtual network service):
  New

Bug description:
  nova-manage version: 2015.1

  Issue: Neutron port-create missing help info for the option: 
--binding:vnic-type
  Valid inputs are 'normal', 'direct' and 'macvtap'. 

  ubuntu@trusty1:~/devstack$ neutron port-create --name sriov-mactap 
--binding:vnic-type=mactap private
  Invalid input for binding:vnic_type. Reason: 'mactap' is not in ['normal', 
'direct', 'macvtap'].

  ubuntu@trusty1:~/devstack$ neutron help port-create
  usage: neutron port-create [-h] [-f {html,json,shell,table,value,yaml}]
 [-c COLUMN] [--max-width integer]
 [--prefix PREFIX] [--request-format {json,xml}]
 [--tenant-id TENANT_ID] [--name NAME]
 [--admin-state-down] [--mac-address MAC_ADDRESS]
 [--device-id DEVICE_ID]
 [--fixed-ip subnet_id=SUBNET,ip_address=IP_ADDR]
 [--security-group SECURITY_GROUP | 
--no-security-groups]
 [--extra-dhcp-opt EXTRA_DHCP_OPTS]
 NETWORK

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1432393/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1432441] [NEW] do away with PROTOCOL_SSLv3

2015-03-15 Thread ToniMueller
Public bug reported:

In Debian Testing, Python 2.7 does no longer include the symbols
PROTOCOL_SSLv2 and PROTOCOL_SSLv3. The attached patch fixes this against
Nova trunk.

Unrelated: The following command, run from /opt/stack in a devstack
environment, did not yield any call to the function
validate_ssl_version(), which is the only user of the affected data
structure:

find . -name '*.py' -type f |xargs grep -nF validate_ssl_version

The nova version, according to the PKG-INFO file, is 2015.1.dev70.

** Affects: nova
 Importance: Undecided
 Status: New

** Patch added: disarm old SSL protocol imports, and import new symbols
   
https://bugs.launchpad.net/bugs/1432441/+attachment/4346561/+files/nova.openstack.common.sslutils.py.patch

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1432441

Title:
  do away with PROTOCOL_SSLv3

Status in OpenStack Compute (Nova):
  New

Bug description:
  In Debian Testing, Python 2.7 does no longer include the symbols
  PROTOCOL_SSLv2 and PROTOCOL_SSLv3. The attached patch fixes this
  against Nova trunk.

  Unrelated: The following command, run from /opt/stack in a devstack
  environment, did not yield any call to the function
  validate_ssl_version(), which is the only user of the affected data
  structure:

  find . -name '*.py' -type f |xargs grep -nF validate_ssl_version

  The nova version, according to the PKG-INFO file, is 2015.1.dev70.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1432441/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1432460] [NEW] neutron unit test fails with unexpected keyword retry_on_request

2015-03-15 Thread watanabe.isao
Public bug reported:

Now(2015,03,16) all neutron unit test fails, and export the following error.
===
Failed to import test module: 
neutron.tests.unit.test_extension_extended_attribute
Traceback (most recent call last):
  File /usr/local/lib/python2.7/dist-packages/unittest2/loader.py, line 445, 
in _find_test_path
module = self._get_module_from_name(name)
  File /usr/local/lib/python2.7/dist-packages/unittest2/loader.py, line 384, 
in _get_module_from_name
__import__(name)
  File 
/home/stack/neutron/neutron/tests/unit/test_extension_extended_attribute.py, 
line 29, in module
from neutron.plugins.ml2 import plugin as ml2_plugin
  File /home/stack/neutron/neutron/plugins/ml2/plugin.py, line 89, in module
extradhcpopt_db.ExtraDhcpOptMixin):
  File /home/stack/neutron/neutron/plugins/ml2/plugin.py, line 591, in 
Ml2Plugin
retry_on_request=True)
TypeError: __init__() got an unexpected keyword argument 'retry_on_request'
==

This is due to the following fix:
https://review.openstack.org/#/c/149261/

In neutron/plugins/ml2/plugin.py
Line 602
retry_on_request is added.

** Affects: neutron
 Importance: Undecided
 Assignee: watanabe.isao (watanabe.isao)
 Status: New

** Changed in: neutron
 Assignee: (unassigned) = watanabe.isao (watanabe.isao)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1432460

Title:
  neutron unit test fails with unexpected keyword retry_on_request

Status in OpenStack Neutron (virtual network service):
  New

Bug description:
  Now(2015,03,16) all neutron unit test fails, and export the following error.
  ===
  Failed to import test module: 
neutron.tests.unit.test_extension_extended_attribute
  Traceback (most recent call last):
    File /usr/local/lib/python2.7/dist-packages/unittest2/loader.py, line 
445, in _find_test_path
  module = self._get_module_from_name(name)
    File /usr/local/lib/python2.7/dist-packages/unittest2/loader.py, line 
384, in _get_module_from_name
  __import__(name)
    File 
/home/stack/neutron/neutron/tests/unit/test_extension_extended_attribute.py, 
line 29, in module
  from neutron.plugins.ml2 import plugin as ml2_plugin
    File /home/stack/neutron/neutron/plugins/ml2/plugin.py, line 89, in 
module
  extradhcpopt_db.ExtraDhcpOptMixin):
    File /home/stack/neutron/neutron/plugins/ml2/plugin.py, line 591, in 
Ml2Plugin
  retry_on_request=True)
  TypeError: __init__() got an unexpected keyword argument 'retry_on_request'
  ==

  This is due to the following fix:
  https://review.openstack.org/#/c/149261/

  In neutron/plugins/ml2/plugin.py
  Line 602
  retry_on_request is added.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1432460/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1432455] [NEW] non-admin user can't add new fixed ip to the VM by os-multinic api

2015-03-15 Thread Alex Xu
Public bug reported:

When non-admin user add new nic to the vm by:

alex@hp-pc:/opt/stack/nova$ nova --debug add-fixed-ip vm1 12d4bedb-77fb-
44da-b6d6-6c52e7606c02


will get error as below:

2015-03-16 09:23:18.306 TRACE oslo_messaging.rpc.dispatcher Traceback (most 
recent call last):
2015-03-16 09:23:18.306 TRACE oslo_messaging.rpc.dispatcher   File 
/usr/local/lib/python2.7/dist-packages/oslo_messaging/rpc/dispatcher.py, line 
142, in _dispatch_and_reply
2015-03-16 09:23:18.306 TRACE oslo_messaging.rpc.dispatcher 
executor_callback))
2015-03-16 09:23:18.306 TRACE oslo_messaging.rpc.dispatcher   File 
/usr/local/lib/python2.7/dist-packages/oslo_messaging/rpc/dispatcher.py, line 
186, in _dispatch
2015-03-16 09:23:18.306 TRACE oslo_messaging.rpc.dispatcher 
executor_callback)
2015-03-16 09:23:18.306 TRACE oslo_messaging.rpc.dispatcher   File 
/usr/local/lib/python2.7/dist-packages/oslo_messaging/rpc/dispatcher.py, line 
130, in _do_dispatch
2015-03-16 09:23:18.306 TRACE oslo_messaging.rpc.dispatcher result = 
func(ctxt, **new_args)
2015-03-16 09:23:18.306 TRACE oslo_messaging.rpc.dispatcher   File 
/opt/stack/nova/nova/network/manager.py, line 778, in add_fixed_ip_to_instance
2015-03-16 09:23:18.306 TRACE oslo_messaging.rpc.dispatcher 
self._allocate_fixed_ips(context, instance_id, host, [network])
2015-03-16 09:23:18.306 TRACE oslo_messaging.rpc.dispatcher   File 
/opt/stack/nova/nova/network/manager.py, line 194, in _allocate_fixed_ips
2015-03-16 09:23:18.306 TRACE oslo_messaging.rpc.dispatcher vpn=vpn, 
address=address)
2015-03-16 09:23:18.306 TRACE oslo_messaging.rpc.dispatcher   File 
/opt/stack/nova/nova/network/manager.py, line 1938, in allocate_fixed_ip
2015-03-16 09:23:18.306 TRACE oslo_messaging.rpc.dispatcher address = 
fip.address
2015-03-16 09:23:18.306 TRACE oslo_messaging.rpc.dispatcher   File 
/opt/stack/nova/nova/objects/base.py, line 161, in wrapper
2015-03-16 09:23:18.306 TRACE oslo_messaging.rpc.dispatcher args, kwargs)
2015-03-16 09:23:18.306 TRACE oslo_messaging.rpc.dispatcher   File 
/opt/stack/nova/nova/conductor/rpcapi.py, line 365, in object_class_action
2015-03-16 09:23:18.306 TRACE oslo_messaging.rpc.dispatcher objver=objver, 
args=args, kwargs=kwargs)
2015-03-16 09:23:18.306 TRACE oslo_messaging.rpc.dispatcher   File 
/usr/local/lib/python2.7/dist-packages/oslo_messaging/rpc/client.py, line 
156, in call
2015-03-16 09:23:18.306 TRACE oslo_messaging.rpc.dispatcher 
retry=self.retry)
2015-03-16 09:23:18.306 TRACE oslo_messaging.rpc.dispatcher   File 
/usr/local/lib/python2.7/dist-packages/oslo_messaging/transport.py, line 90, 
in _send
2015-03-16 09:23:18.306 TRACE oslo_messaging.rpc.dispatcher 
timeout=timeout, retry=retry)
2015-03-16 09:23:18.306 TRACE oslo_messaging.rpc.dispatcher   File 
/usr/local/lib/python2.7/dist-packages/oslo_messaging/_drivers/amqpdriver.py, 
line 349, in send
2015-03-16 09:23:18.306 TRACE oslo_messaging.rpc.dispatcher retry=retry)
2015-03-16 09:23:18.306 TRACE oslo_messaging.rpc.dispatcher   File 
/usr/local/lib/python2.7/dist-packages/oslo_messaging/_drivers/amqpdriver.py, 
line 340, in _send
2015-03-16 09:23:18.306 TRACE oslo_messaging.rpc.dispatcher raise result
2015-03-16 09:23:18.306 TRACE oslo_messaging.rpc.dispatcher 
AdminRequired_Remote: User does not have admin privileges
2015-03-16 09:23:18.306 TRACE oslo_messaging.rpc.dispatcher Traceback (most 
recent call last):
2015-03-16 09:23:18.306 TRACE oslo_messaging.rpc.dispatcher
2015-03-16 09:23:18.306 TRACE oslo_messaging.rpc.dispatcher   File 
/opt/stack/nova/nova/conductor/manager.py, line 420, in _object_dispatch
2015-03-16 09:23:18.306 TRACE oslo_messaging.rpc.dispatcher Perform a 
classmethod action on an object.
2015-03-16 09:23:18.306 TRACE oslo_messaging.rpc.dispatcher
2015-03-16 09:23:18.306 TRACE oslo_messaging.rpc.dispatcher   File 
/opt/stack/nova/nova/objects/base.py, line 163, in wrapper
2015-03-16 09:23:18.306 TRACE oslo_messaging.rpc.dispatcher result = 
fn(cls, context, *args, **kwargs)
2015-03-16 09:23:18.306 TRACE oslo_messaging.rpc.dispatcher
2015-03-16 09:23:18.306 TRACE oslo_messaging.rpc.dispatcher   File 
/opt/stack/nova/nova/objects/fixed_ip.py, line 160, in associate_pool
2015-03-16 09:23:18.306 TRACE oslo_messaging.rpc.dispatcher host=host)
2015-03-16 09:23:18.306 TRACE oslo_messaging.rpc.dispatcher
2015-03-16 09:23:18.306 TRACE oslo_messaging.rpc.dispatcher   File 
/opt/stack/nova/nova/db/api.py, line 509, in fixed_ip_associate_pool
2015-03-16 09:23:18.306 TRACE oslo_messaging.rpc.dispatcher instance_uuid, 
host)
2015-03-16 09:23:18.306 TRACE oslo_messaging.rpc.dispatcher
2015-03-16 09:23:18.306 TRACE oslo_messaging.rpc.dispatcher   File 
/opt/stack/nova/nova/db/sqlalchemy/api.py, line 127, in wrapper
2015-03-16 09:23:18.306 TRACE oslo_messaging.rpc.dispatcher
2015-03-16 09:23:18.306 TRACE oslo_messaging.rpc.dispatcher   File 
/opt/stack/nova/nova/context.py, line 235, in require_admin_context

[Yahoo-eng-team] [Bug 1432465] [NEW] nova detach interface will get inconsistent if hypervisor failed to detach a port

2015-03-15 Thread Eli Qiao
Public bug reported:

Currently, in compute api, detach_interface will delete neutron port
first then calls hypervisor driver to do detach_interface on the guest.
If the driver does detach_interface failed, in case of the driver raise
an exception.InterfaceDetachFailed or other NovaExcptions, there is no
   handler for them. Besides this is an asyn rpc call, so nova-api will not
notice this exception. End user will find the port has been deleted
in neutron side, but guest still can see this port on guest, this is
inconsistent.

** Affects: nova
 Importance: Undecided
 Assignee: Eli Qiao (taget-9)
 Status: In Progress

** Changed in: nova
 Assignee: (unassigned) = Eli Qiao (taget-9)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1432465

Title:
  nova detach interface will get inconsistent if hypervisor failed to
  detach a port

Status in OpenStack Compute (Nova):
  In Progress

Bug description:
  Currently, in compute api, detach_interface will delete neutron port
  first then calls hypervisor driver to do detach_interface on the guest.
  If the driver does detach_interface failed, in case of the driver raise
  an exception.InterfaceDetachFailed or other NovaExcptions, there is no
 handler for them. Besides this is an asyn rpc call, so nova-api will not
  notice this exception. End user will find the port has been deleted
  in neutron side, but guest still can see this port on guest, this is
  inconsistent.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1432465/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1391806] Re: 'neutron port-list' is missing binding:vnic_type filter

2015-03-15 Thread Numan Siddique
** Changed in: neutron
 Assignee: Numan Siddique (numansiddique) = (unassigned)

** Changed in: neutron
   Status: In Progress = Opinion

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1391806

Title:
  'neutron port-list' is missing binding:vnic_type filter

Status in OpenStack Neutron (virtual network service):
  Opinion

Bug description:
  An example usage would be to filter the ports that have 
binding:vnic_type=direct
  # neutron port-list --binding:vnic_type=direct

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1391806/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1391806] Re: 'neutron port-list' is missing binding:vnic_type filter

2015-03-15 Thread Numan Siddique
** Changed in: neutron
   Status: Opinion = Invalid

** Changed in: neutron
   Status: Invalid = New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1391806

Title:
  'neutron port-list' is missing binding:vnic_type filter

Status in OpenStack Neutron (virtual network service):
  New

Bug description:
  An example usage would be to filter the ports that have 
binding:vnic_type=direct
  # neutron port-list --binding:vnic_type=direct

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1391806/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1432490] [NEW] TestEncryptedCinderVolumes cryptsetup name is too long

2015-03-15 Thread Mike Perez
Public bug reported:

When running Datera storage with Cinder and the following
TestEncryptedCinderVolumes tests:

{0} 
tempest.scenario.test_encrypted_cinder_volumes.TestEncryptedCinderVolumes.test_encrypted_cinder_volumes_cryptsetup
 
{0} 
tempest.scenario.test_encrypted_cinder_volumes.TestEncryptedCinderVolumes.test_encrypted_cinder_volumes_luks

cryptsetup complains about the name being too long:

http://paste.openstack.org/show/192537

Nova uses the device name that's in /dev/disk-by-path, which in this
case is the returned iqn from the backend:

ip-172.30.128.2:3260-iscsi-iqn.2013-05.com.daterainc:OpenStack-
TestEncryptedCinderVolumes-676292884:01:sn:aef6a6f1cd84768f-lun-0

Already started talking Matt Treinish about this on IRC last week.
Unsure where the fix should actual go into. While I understand this is
not reproducible with the reference implementation LVM, this seems like
a unknown limitation today since we're not enforcing any length on the
IQN or recommending anything.

** Affects: cinder
 Importance: Undecided
 Status: New

** Affects: nova
 Importance: Undecided
 Status: New

** Affects: tempest
 Importance: Undecided
 Status: New

** Also affects: cinder
   Importance: Undecided
   Status: New

** Also affects: nova
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1432490

Title:
  TestEncryptedCinderVolumes cryptsetup name is too long

Status in Cinder:
  New
Status in OpenStack Compute (Nova):
  New
Status in Tempest:
  New

Bug description:
  When running Datera storage with Cinder and the following
  TestEncryptedCinderVolumes tests:

  {0} 
tempest.scenario.test_encrypted_cinder_volumes.TestEncryptedCinderVolumes.test_encrypted_cinder_volumes_cryptsetup
 
  {0} 
tempest.scenario.test_encrypted_cinder_volumes.TestEncryptedCinderVolumes.test_encrypted_cinder_volumes_luks

  cryptsetup complains about the name being too long:

  http://paste.openstack.org/show/192537

  Nova uses the device name that's in /dev/disk-by-path, which in this
  case is the returned iqn from the backend:

  ip-172.30.128.2:3260-iscsi-iqn.2013-05.com.daterainc:OpenStack-
  TestEncryptedCinderVolumes-676292884:01:sn:aef6a6f1cd84768f-lun-0

  Already started talking Matt Treinish about this on IRC last week.
  Unsure where the fix should actual go into. While I understand this is
  not reproducible with the reference implementation LVM, this seems
  like a unknown limitation today since we're not enforcing any length
  on the IQN or recommending anything.

To manage notifications about this bug go to:
https://bugs.launchpad.net/cinder/+bug/1432490/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1412930] Re: CPU feature request is not respected when create VM

2015-03-15 Thread Park
from Daniel P.Berrange(berra...@redhat.com)

If you set  'cpu_mode=host-model' or 'cpu_mode=host-passthrough'
then it will take effect, as the guest will see the full CPU model
of the host that is picked. IMHO the capabilities:cpu_info:features
filter only makes sense when using those two cpu modes. If you
left the default cpu_mode=None or set cpu_mode=custom, then this
capabilities feature is meaningless from a conceptual POV. So the
fact that it has no effect on the guest CPU is not a bug it is
by design.
---
so this  is not a bug it is by design. I will close it...

** Changed in: nova
   Status: Confirmed = Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1412930

Title:
  CPU feature request is not respected when create VM

Status in OpenStack Compute (Nova):
  Invalid

Bug description:
  When creating a VM requiring some specific CPU features, although the
  guest will be scheduled to a host with the capability, but such
  information is not  always exposed to guest.

a) started devstack by default, (means nova configuration 
libvirt.cpu_mode=none), the compute node has the SSE4.1 support
  b) create flavor with {capabilities:cpu_info:features: in 
sse4.1} extra spec, i.e. requiring SSE4.1.
c) launch an instance with the flavor.
  d) ssh to instance and 'cat /proc/cpuinfo'.

  The SSE4.1 is not presented in guest.

  I think the reason is because when libvirt.cpu_mode is none, libvirt
  will not specify the feature request in the guest  vcpu config.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1412930/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1432460] Re: neutron unit test fails with unexpected keyword retry_on_request

2015-03-15 Thread watanabe.isao
sudo pip install oslo.db --upgrade

After the above upgrade, oslo_db/api.py will be updated to the upstream.
And the bug is no longer happened.

** Changed in: neutron
   Status: New = Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1432460

Title:
  neutron unit test fails with unexpected keyword retry_on_request

Status in OpenStack Neutron (virtual network service):
  Invalid

Bug description:
  Now(2015,03,16) all neutron unit test fails, and export the following error.
  ===
  Failed to import test module: 
neutron.tests.unit.test_extension_extended_attribute
  Traceback (most recent call last):
    File /usr/local/lib/python2.7/dist-packages/unittest2/loader.py, line 
445, in _find_test_path
  module = self._get_module_from_name(name)
    File /usr/local/lib/python2.7/dist-packages/unittest2/loader.py, line 
384, in _get_module_from_name
  __import__(name)
    File 
/home/stack/neutron/neutron/tests/unit/test_extension_extended_attribute.py, 
line 29, in module
  from neutron.plugins.ml2 import plugin as ml2_plugin
    File /home/stack/neutron/neutron/plugins/ml2/plugin.py, line 89, in 
module
  extradhcpopt_db.ExtraDhcpOptMixin):
    File /home/stack/neutron/neutron/plugins/ml2/plugin.py, line 591, in 
Ml2Plugin
  retry_on_request=True)
  TypeError: __init__() got an unexpected keyword argument 'retry_on_request'
  ==

  This is due to the following fix:
  https://review.openstack.org/#/c/149261/

  In neutron/plugins/ml2/plugin.py
  Line 602
  retry_on_request is added.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1432460/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp