[Yahoo-eng-team] [Bug 1528468] [NEW] can create a security group rule with icmp option while ipv6 ether type is set

2015-12-21 Thread ibm-cloud-qa
Public bug reported:

[Summary]
can create a security group rule with icmp option while ipv6 ether type is set

[Topo]
devstack all-in-one

[Description and expect result]
should return an error if create a security group rule with icmp option
 while ipv6 ether type is set

[Reproduceable or not]
reproduceable 

[Recreate Steps]
1) create a security group rule as below:
root@45-59:/opt/stack/devstack# neutron security-group-rule-create 
--protocol icmp --ethertype ipv6 sg1
Created a new security_group_rule:
+---+--+
| Field | Value|
+---+--+
| direction | ingress  |
| ethertype | IPv6 |
| id| 303c6aa8-0937-4ed9-89d5-2733febe72a0 |
| port_range_max|  |
| port_range_min|  |
| protocol  | icmp |
| remote_group_id   |  |
| remote_ip_prefix  |  |
| security_group_id | 4fd891e1-4de0-42aa-8fcd-3fd34a978d0e |
| tenant_id | fb3af4173e8e42bca61dca2175ec3774 |
+---+--+

2)for reference, when create a security group rule with icmpv6 option 
while ipv4 ether type is set, an error message returned:
root@45-59:/opt/stack/devstack# neutron security-group-rule-create 
--protocol icmpv6 --ethertype ipv4 sg1
Invalid ethertype IPv4 for protocol icmpv6.
root@45-59:/opt/stack/devstack# 

[Configration]
reproduceable bug, no need

[logs]
reproduceable bug, no need

[Root cause anlyze or debug inf]
reproduceable bug

[Attachment]
None

** Affects: neutron
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1528468

Title:
  can create a security group rule with icmp option while ipv6 ether
  type is set

Status in neutron:
  New

Bug description:
  [Summary]
  can create a security group rule with icmp option while ipv6 ether type is set

  [Topo]
  devstack all-in-one

  [Description and expect result]
  should return an error if create a security group rule with icmp option
   while ipv6 ether type is set

  [Reproduceable or not]
  reproduceable 

  [Recreate Steps]
  1) create a security group rule as below:
  root@45-59:/opt/stack/devstack# neutron security-group-rule-create 
  --protocol icmp --ethertype ipv6 sg1
  Created a new security_group_rule:
  +---+--+
  | Field | Value|
  +---+--+
  | direction | ingress  |
  | ethertype | IPv6 |
  | id| 303c6aa8-0937-4ed9-89d5-2733febe72a0 |
  | port_range_max|  |
  | port_range_min|  |
  | protocol  | icmp |
  | remote_group_id   |  |
  | remote_ip_prefix  |  |
  | security_group_id | 4fd891e1-4de0-42aa-8fcd-3fd34a978d0e |
  | tenant_id | fb3af4173e8e42bca61dca2175ec3774 |
  +---+--+

  2)for reference, when create a security group rule with icmpv6 option 
  while ipv4 ether type is set, an error message returned:
  root@45-59:/opt/stack/devstack# neutron security-group-rule-create 
  --protocol icmpv6 --ethertype ipv4 sg1
  Invalid ethertype IPv4 for protocol icmpv6.
  root@45-59:/opt/stack/devstack# 

  [Configration]
  reproduceable bug, no need

  [logs]
  reproduceable bug, no need

  [Root cause anlyze or debug inf]
  reproduceable bug

  [Attachment]
  None

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1528468/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1528467] [NEW] can create a security group rule with icmp option while ipv6 ether type is set

2015-12-21 Thread hgan...@cn.ibm.com
Public bug reported:

[Summary]
can create a security group rule with icmp option while ipv6 ether type is set

[Topo]
devstack all-in-one

[Description and expect result]
should return an error if create a security group rule with icmp option
 while ipv6 ether type is set

[Reproduceable or not]
reproduceable 

[Recreate Steps]
1) create a security group rule as below:
root@45-59:/opt/stack/devstack# neutron security-group-rule-create 
--protocol icmp --ethertype ipv6 sg1
Created a new security_group_rule:
+---+--+
| Field | Value|
+---+--+
| direction | ingress  |
| ethertype | IPv6 |
| id| 303c6aa8-0937-4ed9-89d5-2733febe72a0 |
| port_range_max|  |
| port_range_min|  |
| protocol  | icmp |
| remote_group_id   |  |
| remote_ip_prefix  |  |
| security_group_id | 4fd891e1-4de0-42aa-8fcd-3fd34a978d0e |
| tenant_id | fb3af4173e8e42bca61dca2175ec3774 |
+---+--+

2)for reference, when create a security group rule with icmpv6 option 
while ipv4 ether type is set, an error message returned:
root@45-59:/opt/stack/devstack# neutron security-group-rule-create 
--protocol icmpv6 --ethertype ipv4 sg1
Invalid ethertype IPv4 for protocol icmpv6.
root@45-59:/opt/stack/devstack# 


[Configration]
reproduceable bug, no need

[logs]
reproduceable bug, no need

[Root cause anlyze or debug inf]
reproduceable bug

[Attachment]
None

** Affects: neutron
 Importance: Undecided
 Status: Invalid

** Changed in: neutron
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1528467

Title:
  can create a security group rule with icmp option while ipv6 ether
  type is set

Status in neutron:
  Invalid

Bug description:
  [Summary]
  can create a security group rule with icmp option while ipv6 ether type is set

  [Topo]
  devstack all-in-one

  [Description and expect result]
  should return an error if create a security group rule with icmp option
   while ipv6 ether type is set

  [Reproduceable or not]
  reproduceable 

  [Recreate Steps]
  1) create a security group rule as below:
  root@45-59:/opt/stack/devstack# neutron security-group-rule-create 
  --protocol icmp --ethertype ipv6 sg1
  Created a new security_group_rule:
  +---+--+
  | Field | Value|
  +---+--+
  | direction | ingress  |
  | ethertype | IPv6 |
  | id| 303c6aa8-0937-4ed9-89d5-2733febe72a0 |
  | port_range_max|  |
  | port_range_min|  |
  | protocol  | icmp |
  | remote_group_id   |  |
  | remote_ip_prefix  |  |
  | security_group_id | 4fd891e1-4de0-42aa-8fcd-3fd34a978d0e |
  | tenant_id | fb3af4173e8e42bca61dca2175ec3774 |
  +---+--+

  2)for reference, when create a security group rule with icmpv6 option 
  while ipv4 ether type is set, an error message returned:
  root@45-59:/opt/stack/devstack# neutron security-group-rule-create 
  --protocol icmpv6 --ethertype ipv4 sg1
  Invalid ethertype IPv4 for protocol icmpv6.
  root@45-59:/opt/stack/devstack# 


  [Configration]
  reproduceable bug, no need

  [logs]
  reproduceable bug, no need

  [Root cause anlyze or debug inf]
  reproduceable bug

  [Attachment]
  None

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1528467/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1528465] [NEW] dashboard project network column display duplicate default public network randomly

2015-12-21 Thread ibm-cloud-qa
Public bug reported:

dashboard project network column display duplicate default public
network randomly. this occurs randomly

setup:
devstack

reproduce:
yes

steps:
1.check default public network we have
stack@45-59:~/devstack$ neutron net-list
+--+-+--+
| id   | name| subnets  
|
+--+-+--+
| 1931775c-4459-4c18-9910-53b1ffbe4d31 | private | 
9b1a99a3-e7ae-4a7d-b9d2-e035077d4e5e 10.0.0.0/24 |
|  | | 
3ebaa37a-2b80-4186-9357-dd8b1202d542 fd7e:7e2b:56d0::/64 |
| b9cedb82-6835-499b-885d-7646416ac93f | public  | 
aea6ea63-b70c-49fe-9bf5-3f593015a07d 172.24.4.0/24   |
|  | | 
146a2d03-52e0-4c7d-ba77-a9a2df99da7f 2001:db8::/64   |

2.check this on dashborad, we find that it displays two duplicate public
network.  this occurs randomly

** Affects: horizon
 Importance: Undecided
 Status: New

** Summary changed:

- dashboard project network column display duplicate default public network
+ dashboard project network column display duplicate default public network 
randomly

** Description changed:

  dashboard project network column display duplicate default public
- network. this occurs randomly
+ network randomly. this occurs randomly
  
  setup:
  devstack
  
  reproduce:
  yes
  
  steps:
  1.check default public network we have
  stack@45-59:~/devstack$ neutron net-list
  
+--+-+--+
  | id   | name| subnets
  |
  
+--+-+--+
  | 1931775c-4459-4c18-9910-53b1ffbe4d31 | private | 
9b1a99a3-e7ae-4a7d-b9d2-e035077d4e5e 10.0.0.0/24 |
  |  | | 
3ebaa37a-2b80-4186-9357-dd8b1202d542 fd7e:7e2b:56d0::/64 |
  | b9cedb82-6835-499b-885d-7646416ac93f | public  | 
aea6ea63-b70c-49fe-9bf5-3f593015a07d 172.24.4.0/24   |
  |  | | 
146a2d03-52e0-4c7d-ba77-a9a2df99da7f 2001:db8::/64   |
  
- 
- 2.check this on dashborad, we find that it displays two duplicate public 
network.  this occurs randomly
+ 2.check this on dashborad, we find that it displays two duplicate public
+ network.  this occurs randomly

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1528465

Title:
  dashboard project network column display duplicate default public
  network randomly

Status in OpenStack Dashboard (Horizon):
  New

Bug description:
  dashboard project network column display duplicate default public
  network randomly. this occurs randomly

  setup:
  devstack

  reproduce:
  yes

  steps:
  1.check default public network we have
  stack@45-59:~/devstack$ neutron net-list
  
+--+-+--+
  | id   | name| subnets
  |
  
+--+-+--+
  | 1931775c-4459-4c18-9910-53b1ffbe4d31 | private | 
9b1a99a3-e7ae-4a7d-b9d2-e035077d4e5e 10.0.0.0/24 |
  |  | | 
3ebaa37a-2b80-4186-9357-dd8b1202d542 fd7e:7e2b:56d0::/64 |
  | b9cedb82-6835-499b-885d-7646416ac93f | public  | 
aea6ea63-b70c-49fe-9bf5-3f593015a07d 172.24.4.0/24   |
  |  | | 
146a2d03-52e0-4c7d-ba77-a9a2df99da7f 2001:db8::/64   |

  2.check this on dashborad, we find that it displays two duplicate
  public network.  this occurs randomly

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1528465/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1528455] [NEW] can launch an instance with fixed ipv4 address using v6-fixed-ip option

2015-12-21 Thread ibm-cloud-qa
Public bug reported:

[Summary]
can launch an instance with fixed ipv4 address using v6-fixed-ip option

[Topo]
devstack all-in-one node

[Description and expect result]
should return an error if launch an instance with fixed ipv4 address using 
v6-fixed-ip option

[Reproduceable or not]
reproduceable 

[Recreate Steps]
1) create a subnet :
root@45-59:/opt/stack/devstack# nova  boot  --flavor 1 --image  
cirros-0.3.4-x86_64-uec  --availability-zone nova --nic 
net-id=1b72073d-e7c0-4bbd-b9f0-f834e5ff1fa7,v6-fixed-ip=1.0.0.100  instance-1
+--++
| Property | Value  
|
+--++
| OS-DCF:diskConfig| MANUAL 
|
| OS-EXT-AZ:availability_zone  | nova   
|
| OS-EXT-STS:power_state   | 0  
|
| OS-EXT-STS:task_state| scheduling 
|
| OS-EXT-STS:vm_state  | building   
|
| OS-SRV-USG:launched_at   | -  
|
| OS-SRV-USG:terminated_at | -  
|
| accessIPv4   |
|
| accessIPv6   |
|
| adminPass| i8VQC4fZSsMp   
|
| config_drive |
|
| created  | 2015-12-22T14:15:22Z   
|
| flavor   | m1.tiny (1)
|
| hostId   |
|
| id   | 03e248ee-821a-4b37-81e0-5692102956fb   
|
| image| cirros-0.3.4-x86_64-uec 
(e3e3fd4e-ea26-47d6-b442-76d36ff7d283) |
| key_name | -  
|
| metadata | {} 
|
| name | instance-1 
|
| os-extended-volumes:volumes_attached | [] 
|
| progress | 0  
|
| security_groups  | default
|
| status   | BUILD  
|
| tenant_id| fb3af4173e8e42bca61dca2175ec3774   
|
| updated  | 2015-12-22T14:15:23Z   
|
| user_id  | e266d2b5fd004f71b6ffadb37cc38813   
|
+--++
root@45-59:/opt/stack/devstack#

root@45-59:/opt/stack/devstack# nova list
+--++++-++
| ID   | Name   | Status | Task State | 
Power State | Networks   |
+--++++-++
| 03e248ee-821a-4b37-81e0-5692102956fb | instance-1 | ACTIVE | -  | 
Running | net1=1.0.0.100 |
+--++++-++
root@45-59:/opt/stack/devstack# 


[Configration]
reproduceable bug, no need

[logs]
reproduceable bug, no need

[Root cause anlyze or debug inf]
reproduceable bug

[Attachment]
None

** Affects: nova
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1528455

Title:
  can launch an instance with fixed ipv4 address using v6-fixed-ip
  option

Status in OpenStack Compute (nova):
  New

Bug description:
  [Summary]
  can launch an instance with fixed ipv4 address 

[Yahoo-eng-team] [Bug 1528453] [NEW] Provide a ranking mechanism for glance-api to order locations

2015-12-21 Thread Jake Yip
Public bug reported:

We have a setup consisting of multiple cells with their own glance-api
servers. We have a global swift store that holds all the images, and we
are exploring having local stores to increase efficiency. This can be
done using image-locations in glance. (Thanks!)

However, currently it is not possible for each cell to specify their
custom ordering of image locations. The store_type location strategy
does not work because more than one cell can have the same type of
backend.

If this is made possible, each cell can return the closest location for
each glance image, and also do copy-on-write for local stores like RBD.
This can be achieved by having another location_strategy that orders
based on a ranking key in metadata.

Opening a bug but I'll like this classified as a wishlist. Comments and
suggestions are welcome!

** Affects: glance
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Glance.
https://bugs.launchpad.net/bugs/1528453

Title:
  Provide a ranking mechanism for glance-api to order locations

Status in Glance:
  New

Bug description:
  We have a setup consisting of multiple cells with their own glance-api
  servers. We have a global swift store that holds all the images, and
  we are exploring having local stores to increase efficiency. This can
  be done using image-locations in glance. (Thanks!)

  However, currently it is not possible for each cell to specify their
  custom ordering of image locations. The store_type location strategy
  does not work because more than one cell can have the same type of
  backend.

  If this is made possible, each cell can return the closest location
  for each glance image, and also do copy-on-write for local stores like
  RBD. This can be achieved by having another location_strategy that
  orders based on a ranking key in metadata.

  Opening a bug but I'll like this classified as a wishlist. Comments
  and suggestions are welcome!

To manage notifications about this bug go to:
https://bugs.launchpad.net/glance/+bug/1528453/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1528439] [NEW] Rebuild instance do not rebuild cinder ceph volumes

2015-12-21 Thread prescolt
Public bug reported:

When I exec function Rebuild instance ==> chose image for rebuild
After function complete I check and I see cinder volumes do not rebuild as 
image that I chosen , just same as before
Rebuild work as my expect when instance create and boot from image, if boot 
from image and create volume, rebuild do not work as expect.
Please help me fix this, thank
My system  is 
- Openstack Kilo latest build
-  Ceph 0.94 hammer
- Ubuntu 14.04

** Affects: cinder
 Importance: Undecided
 Status: New

** Affects: nova
 Importance: Undecided
 Status: New


** Tags: cinder

** Also affects: cinder
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1528439

Title:
  Rebuild instance do not rebuild cinder ceph volumes

Status in Cinder:
  New
Status in OpenStack Compute (nova):
  New

Bug description:
  When I exec function Rebuild instance ==> chose image for rebuild
  After function complete I check and I see cinder volumes do not rebuild as 
image that I chosen , just same as before
  Rebuild work as my expect when instance create and boot from image, if boot 
from image and create volume, rebuild do not work as expect.
  Please help me fix this, thank
  My system  is 
  - Openstack Kilo latest build
  -  Ceph 0.94 hammer
  - Ubuntu 14.04

To manage notifications about this bug go to:
https://bugs.launchpad.net/cinder/+bug/1528439/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1527661] Re: Create new instance boot from rbd image failed (no image created in VMS pools), after upgrade lastest kilo build

2015-12-21 Thread prescolt
edit, I find problem cause by  NFS file system  can not lock file,  reboot NFS 
service have no luck, I must reboot NFS server
Now it worked correctly.
This problem cause by update NFS service

** Changed in: nova
   Status: New => Invalid

** Changed in: nova (Ubuntu)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1527661

Title:
  Create new instance  boot from rbd image failed (no image created in
  VMS pools),after upgrade lastest kilo build

Status in OpenStack Compute (nova):
  Invalid
Status in nova package in Ubuntu:
  Invalid

Bug description:
  After upgrade to the lastest version of openstack kilo, when i boot new 
instance from image the instance started failed with error message below.  I 
see nova do not create RBD volumes of glance image to Ceph VMS pool, this 
affect to swap and Ephemeral disk too my system worked correctly before. Please 
check my attach file for detail
  ===
  2015-12-18 22:07:56.590 1620300 DEBUG nova.virt.libvirt.rbd_utils 
[req-eab9562d-484f-432d-a9d7-0ab32ec99c23 0690b97b2bea47a8aeb4777856f473b2 
767b2f8a8b08403884269836420d34f0 - - -] rbd image 
352eb808-f7c3-405d-92b4-c29bf07a46f0_disk does not exist __init__ 
/usr/lib/python2.7/dist-packages/nova/virt/libvirt/rbd_utils.py:60
  2015-12-18 22:07:56.641 1620300 DEBUG nova.virt.libvirt.rbd_utils 
[req-eab9562d-484f-432d-a9d7-0ab32ec99c23 0690b97b2bea47a8aeb4777856f473b2 
767b2f8a8b08403884269836420d34f0 - - -] rbd image 
352eb808-f7c3-405d-92b4-c29bf07a46f0_disk does not exist __init__ 
/usr/lib/python2.7/dist-packages/nova/virt/libvirt/rbd_utils.py:60
  2015-12-18 22:15:12.033 1620300 DEBUG nova.virt.libvirt.rbd_utils 
[req-c07f3a3b-82de-41b5-9f91-e52a2295b0fa 0690b97b2bea47a8aeb4777856f473b2 
767b2f8a8b08403884269836420d34f0 - - -] rbd image 
40df5d10-6af1-49ea-bb5f-37a5e6ffa053_disk does not exist __init__ 
/usr/lib/python2.7/dist-packages/nova/virt/libvirt/rbd_utils.py:60
  2015-12-18 22:15:12.093 1620300 DEBUG nova.virt.libvirt.rbd_utils 
[req-c07f3a3b-82de-41b5-9f91-e52a2295b0fa 0690b97b2bea47a8aeb4777856f473b2 
767b2f8a8b08403884269836420d34f0 - - -] rbd image 
40df5d10-6af1-49ea-bb5f-37a5e6ffa053_disk does not exist __init__ 
/usr/lib/python2.7/dist-packages/nova/virt/libvirt/rbd_utils.py:60
  #

  2015-12-18 22:27:48.308 1623512 TRACE nova.compute.manager [instance: 
3bf19259-4a86-4b9e-b358-15e59470231d] do_log=False, semaphores=semaphores, 
delay=delay):
  2015-12-18 22:27:48.308 1623512 TRACE nova.compute.manager [instance: 
3bf19259-4a86-4b9e-b358-15e59470231d]   File 
"/usr/lib/python2.7/contextlib.py", line 17, in __ent
  er__
  2015-12-18 22:27:48.308 1623512 TRACE nova.compute.manager [instance: 
3bf19259-4a86-4b9e-b358-15e59470231d] return self.gen.next()
  2015-12-18 22:27:48.308 1623512 TRACE nova.compute.manager [instance: 
3bf19259-4a86-4b9e-b358-15e59470231d]   File 
"/usr/lib/python2.7/dist-packages/oslo_concurrency/lo
  ckutils.py", line 395, in lock
  2015-12-18 22:27:48.308 1623512 TRACE nova.compute.manager [instance: 
3bf19259-4a86-4b9e-b358-15e59470231d] ext_lock.acquire(delay=delay)
  2015-12-18 22:27:48.308 1623512 TRACE nova.compute.manager [instance: 
3bf19259-4a86-4b9e-b358-15e59470231d]   File 
"/usr/lib/python2.7/dist-packages/oslo_concurrency/lo
  ckutils.py", line 209, in acquire
  2015-12-18 22:27:48.308 1623512 TRACE nova.compute.manager [instance: 
3bf19259-4a86-4b9e-b358-15e59470231d] do_acquire()
  2015-12-18 22:27:48.308 1623512 TRACE nova.compute.manager [instance: 
3bf19259-4a86-4b9e-b358-15e59470231d]   File 
"/usr/lib/python2.7/dist-packages/oslo_concurrency/lo
  ckutils.py", line 158, in wrapper
  2015-12-18 22:27:48.308 1623512 TRACE nova.compute.manager [instance: 
3bf19259-4a86-4b9e-b358-15e59470231d] return r.call(func, *args, **kwargs)
  2015-12-18 22:27:48.308 1623512 TRACE nova.compute.manager [instance: 
3bf19259-4a86-4b9e-b358-15e59470231d]   File 
"/usr/lib/python2.7/dist-packages/retrying.py", line
  222, in call
  2015-12-18 22:27:48.308 1623512 TRACE nova.compute.manager [instance: 
3bf19259-4a86-4b9e-b358-15e59470231d] if not self.should_reject(attempt):
  2015-12-18 22:27:48.308 1623512 TRACE nova.compute.manager [instance: 
3bf19259-4a86-4b9e-b358-15e59470231d]   File 
"/usr/lib/python2.7/dist-packages/retrying.py", line
  206, in should_reject
  2015-12-18 22:27:48.308 1623512 TRACE nova.compute.manager [instance: 
3bf19259-4a86-4b9e-b358-15e59470231d] reject |= 
self._retry_on_exception(attempt.value[1])
  2015-12-18 22:27:48.308 1623512 TRACE nova.compute.manager [instance: 
3bf19259-4a86-4b9e-b358-15e59470231d]   File 
"/usr/lib/python2.7/dist-packages/oslo_concurrency/lockutils.py", line 130, in 
retry_on_exception
  2015-12-18 22:27:48.308 1623512 TRACE nova.compute.manager [instance: 
3bf19259-4a86-4b9e-b358-15e59470231d] '

[Yahoo-eng-team] [Bug 1528435] [NEW] The gate test of VPNaaS is failing with AttributeError

2015-12-21 Thread Kengo Hobo
Public bug reported:

When I run git review command on today(AM 10:00), the gate test of VPNaaS is 
failing with following error.
There are 5 errors and all of errors are AttributeError.

I guess that following recent modification affects
https://github.com/openstack/neutron/commit/dd5f5716c9a32634caa2a44d362cd77461ba873d

*Error details
 Traceback (most recent call last):
  File 
"/home/ubuntu/for_commit/midonet/.tox/py27/local/lib/python2.7/site-packages/oslo_db/api.py",
 line 137, in wrapper
return f(*args, **kwargs)
  File 
"/home/ubuntu/for_commit/midonet/.tox/py27/src/neutron/neutron/api/v2/base.py", 
line 414, in create
allow_bulk=self._allow_bulk)
  File 
"/home/ubuntu/for_commit/midonet/.tox/py27/src/neutron/neutron/api/v2/base.py", 
line 680, in prepare_request_body
attributes.convert_value(attr_info, res_dict, webob.exc.HTTPBadRequest)
  File 
"/home/ubuntu/for_commit/midonet/.tox/py27/src/neutron/neutron/api/v2/attributes.py",
 line 919, in convert_value
res = validators[rule](res_dict[attr], attr_vals['validate'][rule])
  File 
"/home/ubuntu/for_commit/midonet/.tox/py27/src/neutron-vpnaas/neutron_vpnaas/extensions/vpnaas.py",
 line 167, in _validate_subnet_list_or_none
attr._validate_subnet_list(data, key_specs)
AttributeError: 'module' object has no attribute '_validate_subnet_list'
2015-12-22 02:24:21,828ERROR [neutron.api.v2.resource] create failed
Traceback (most recent call last):
  File 
"/home/ubuntu/for_commit/midonet/.tox/py27/src/neutron/neutron/api/v2/resource.py",
 line 83, in resource
result = method(request=request, **args)
  File 
"/home/ubuntu/for_commit/midonet/.tox/py27/local/lib/python2.7/site-packages/oslo_db/api.py",
 line 152, in wrapper
ectxt.value = e.inner_exc
  File 
"/home/ubuntu/for_commit/midonet/.tox/py27/local/lib/python2.7/site-packages/oslo_utils/excutils.py",
 line 204, in __exit__
six.reraise(self.type_, self.value, self.tb)
  File 
"/home/ubuntu/for_commit/midonet/.tox/py27/local/lib/python2.7/site-packages/oslo_db/api.py",
 line 137, in wrapper
return f(*args, **kwargs)
  File 
"/home/ubuntu/for_commit/midonet/.tox/py27/src/neutron/neutron/api/v2/base.py", 
line 414, in create
allow_bulk=self._allow_bulk)
  File 
"/home/ubuntu/for_commit/midonet/.tox/py27/src/neutron/neutron/api/v2/base.py", 
line 680, in prepare_request_body
attributes.convert_value(attr_info, res_dict, webob.exc.HTTPBadRequest)
  File 
"/home/ubuntu/for_commit/midonet/.tox/py27/src/neutron/neutron/api/v2/attributes.py",
 line 919, in convert_value
res = validators[rule](res_dict[attr], attr_vals['validate'][rule])
  File 
"/home/ubuntu/for_commit/midonet/.tox/py27/src/neutron-vpnaas/neutron_vpnaas/extensions/vpnaas.py",
 line 167, in _validate_subnet_list_or_none
attr._validate_subnet_list(data, key_specs)
AttributeError: 'module' object has no attribute '_validate_subnet_list'

** Affects: neutron
 Importance: Undecided
 Status: Confirmed

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1528435

Title:
  The gate test of VPNaaS is failing with AttributeError

Status in neutron:
  Confirmed

Bug description:
  When I run git review command on today(AM 10:00), the gate test of VPNaaS is 
failing with following error.
  There are 5 errors and all of errors are AttributeError.

  I guess that following recent modification affects
  
https://github.com/openstack/neutron/commit/dd5f5716c9a32634caa2a44d362cd77461ba873d

  *Error details
   Traceback (most recent call last):
File 
"/home/ubuntu/for_commit/midonet/.tox/py27/local/lib/python2.7/site-packages/oslo_db/api.py",
 line 137, in wrapper
  return f(*args, **kwargs)
File 
"/home/ubuntu/for_commit/midonet/.tox/py27/src/neutron/neutron/api/v2/base.py", 
line 414, in create
  allow_bulk=self._allow_bulk)
File 
"/home/ubuntu/for_commit/midonet/.tox/py27/src/neutron/neutron/api/v2/base.py", 
line 680, in prepare_request_body
  attributes.convert_value(attr_info, res_dict, 
webob.exc.HTTPBadRequest)
File 
"/home/ubuntu/for_commit/midonet/.tox/py27/src/neutron/neutron/api/v2/attributes.py",
 line 919, in convert_value
  res = validators[rule](res_dict[attr], attr_vals['validate'][rule])
File 
"/home/ubuntu/for_commit/midonet/.tox/py27/src/neutron-vpnaas/neutron_vpnaas/extensions/vpnaas.py",
 line 167, in _validate_subnet_list_or_none
  attr._validate_subnet_list(data, key_specs)
  AttributeError: 'module' object has no attribute '_validate_subnet_list'
  2015-12-22 02:24:21,828ERROR [neutron.api.v2.resource] create failed
  Traceback (most recent call last):
File 
"/home/ubuntu/for_commit/midonet/.tox/py27/src/neutron/neutron/api/v2/resource.py",
 line 8

[Yahoo-eng-team] [Bug 1509121] Re: [UI] job_binaries Exception Value: too many values to unpack

2015-12-21 Thread Richard Jones
The UI bug is not in Horizon, it's in the Sahara Dashboard which is
external to Horizon now. I'm marking the horizon aspect of this bug
invalid, but can't actually reassign that to Sahara because Launchpad
already has a Sahara component on this bug report (I think).

** Changed in: horizon
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1509121

Title:
  [UI] job_binaries Exception Value: too many values to unpack

Status in OpenStack Dashboard (Horizon):
  Invalid
Status in Sahara:
  Fix Released

Bug description:
  I accidentally created a Sahara EDP Job Binary, in RDO Kilo, with the
  following properties:

  Name
  Binary
  ID
  c1fa1a5b-2458-43cc-9fbc-52a54fe74009
  URL
  swift://swift://container.sahara/Test-Private-Container/
  Description
  None

  When I try to "Delete the Job Binary" the Dashboard displays a full-
  page exception. Here is the Traceback:

  Environment:

  Request Method: POST
  Request URL: https://my.org/dashboard/project/data_processing/job_binaries/

  Django Version: 1.8.3
  Python Version: 2.7.5
  Installed Applications:
  ['openstack_dashboard.dashboards.project',
   'openstack_dashboard.dashboards.admin',
   'openstack_dashboard.dashboards.identity',
   'openstack_dashboard.dashboards.settings',
   'openstack_dashboard',
   'django.contrib.contenttypes',
   'django.contrib.auth',
   'django.contrib.sessions',
   'django.contrib.messages',
   'django.contrib.staticfiles',
   'django.contrib.humanize',
   'django_pyscss',
   'openstack_dashboard.django_pyscss_fix',
   'compressor',
   'horizon',
   'openstack_auth']
  Installed Middleware:
  ('django.middleware.common.CommonMiddleware',
   'django.middleware.csrf.CsrfViewMiddleware',
   'django.contrib.sessions.middleware.SessionMiddleware',
   'django.contrib.auth.middleware.AuthenticationMiddleware',
   'django.contrib.messages.middleware.MessageMiddleware',
   'django.contrib.auth.middleware.SessionAuthenticationMiddleware',
   'horizon.middleware.HorizonMiddleware',
   'django.middleware.locale.LocaleMiddleware',
   'django.middleware.clickjacking.XFrameOptionsMiddleware')

  Traceback:
  File "/usr/lib/python2.7/site-packages/django/core/handlers/base.py" in 
get_response
    132. response = wrapped_callback(request, 
*callback_args, **callback_kwargs)
  File "/usr/lib/python2.7/site-packages/horizon/decorators.py" in dec
    36. return view_func(request, *args, **kwargs)
  File "/usr/lib/python2.7/site-packages/horizon/decorators.py" in dec
    52. return view_func(request, *args, **kwargs)
  File "/usr/lib/python2.7/site-packages/horizon/decorators.py" in dec
    36. return view_func(request, *args, **kwargs)
  File "/usr/lib/python2.7/site-packages/horizon/decorators.py" in dec
    84. return view_func(request, *args, **kwargs)
  File "/usr/lib/python2.7/site-packages/django/views/generic/base.py" in view
    71. return self.dispatch(request, *args, **kwargs)
  File "/usr/lib/python2.7/site-packages/django/views/generic/base.py" in 
dispatch
    89. return handler(request, *args, **kwargs)
  File "/usr/lib/python2.7/site-packages/horizon/tables/views.py" in post
    223. return self.get(request, *args, **kwargs)
  File "/usr/lib/python2.7/site-packages/horizon/tables/views.py" in get
    159. handled = self.construct_tables()
  File "/usr/lib/python2.7/site-packages/horizon/tables/views.py" in 
construct_tables
    150. handled = self.handle_table(table)
  File "/usr/lib/python2.7/site-packages/horizon/tables/views.py" in 
handle_table
    125. handled = self._tables[name].maybe_handle()
  File "/usr/lib/python2.7/site-packages/horizon/tables/base.py" in maybe_handle
    1640. return self.take_action(action_name, obj_id)
  File "/usr/lib/python2.7/site-packages/horizon/tables/base.py" in take_action
    1482. response = action.multiple(self, self.request, 
obj_ids)
  File "/usr/lib/python2.7/site-packages/horizon/tables/actions.py" in multiple
    302. return self.handle(data_table, request, object_ids)
  File "/usr/lib/python2.7/site-packages/horizon/tables/actions.py" in handle
    827. exceptions.handle(request, ignore=ignore)
  File "/usr/lib/python2.7/site-packages/horizon/exceptions.py" in handle
    364. six.reraise(exc_type, exc_value, exc_traceback)
  File "/usr/lib/python2.7/site-packages/horizon/tables/actions.py" in handle
    811. self.action(request, datum_id)
  File "/usr/lib/python2.7/site-packages/horizon/tables/actions.py" in action
    926. return self.delete(request, obj_id)
  File 
"/usr/share/openstack-dashboard/openstack_dashboard/wsgi/../../openstack_dashboard/dashboards/project/data_processing/job_binaries/tab

[Yahoo-eng-team] [Bug 1287851] Re: Under heavy load, neutron keeps retrying to connect to RabbitMQ

2015-12-21 Thread Launchpad Bug Tracker
[Expired for neutron because there has been no activity for 60 days.]

** Changed in: neutron
   Status: Incomplete => Expired

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1287851

Title:
  Under heavy load, neutron keeps retrying to connect to RabbitMQ

Status in neutron:
  Expired

Bug description:
  Under heavy load on Neutron, we observed that Neutron keeps retrying
  to connect to RabbitMQ. This behavior can be reproduced by having a
  lot of get ports/networks requests on Neutron and sneaking in any
  request (such as create port) that results in a notification message
  sent to RabbitMQ in-between. In the logs, we see a lot of ‘AMQP server
  on hostname:port is unreachable’ messages.

  This could be a bug with kombu in oslo, I'm not sure.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1287851/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1177106] Re: get_sync_data should not be part of the db class for the l3 API

2015-12-21 Thread Launchpad Bug Tracker
[Expired for neutron because there has been no activity for 60 days.]

** Changed in: neutron
   Status: Incomplete => Expired

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1177106

Title:
  get_sync_data should not be part of the db class for the l3 API

Status in neutron:
  Expired

Bug description:
  get_sync_data collects information to be sent to the l3 agent for 
synchronizing logical router state.
  However, several quantum plugins, which use this mixin, do not leverage the 
l3 agent.

  This code should therefore be moved away from the db class, ensuring
  on the other hand that the routine is still called by every plugin
  which uses the l3 agent.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1177106/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1409774] Re: sqlalchemy session needs to be rolled back after catching a db exception

2015-12-21 Thread Launchpad Bug Tracker
[Expired for neutron because there has been no activity for 60 days.]

** Changed in: neutron
   Status: Incomplete => Expired

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1409774

Title:
  sqlalchemy session needs to be rolled back after catching a db
  exception

Status in neutron:
  Expired

Bug description:
  To avoid errors like this:

  sqlalchemy.exc.InvalidRequestError: This Session's transaction has
  been rolled back by a nested rollback() call.  To begin a new
  transaction, issue Session.rollback() first

  the sqlalchemy session needs to be rolled back after catching a db
  exception in a transaction, see sqlalchemy faq
  http://docs.sqlalchemy.org/en/rel_0_8/faq.html#this-session-s
  -transaction-has-been-rolled-back-due-to-a-previous-exception-during-
  flush-or-similar . There are places in Neutron code where a db
  exception is caught and the session is not properly rolled back. As
  explained in the sqlalchemy faq, this is the right way:

  try:
  
  session.commit()
  except:
  session.rollback()
  raise
  finally:
  session.close() # optional, depends on use case

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1409774/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1498288] Re: Low throughput with LBaaS(haproxy)

2015-12-21 Thread Launchpad Bug Tracker
[Expired for neutron because there has been no activity for 60 days.]

** Changed in: neutron
   Status: Incomplete => Expired

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1498288

Title:
  Low throughput with LBaaS(haproxy)

Status in neutron:
  Expired

Bug description:
  We have a Juno based openstack cloud build using Packstack. Controller
  node, network node and computes nodes each are running on a bare metal
  servers with LBaaS agent running on the network node.

  We are noticing a low throughput of 1G - 1.2G with HAproxy on a 10G
  link.

  We are measuring the throughput using iperf tool for the HAProxy. We
  have client on one compute node and the servers on different compute
  nodes which are linked via 10G . We changed the MTU size from 1400 to
  9000 but received the same throughput.

  client  10G > LB namespace(HAproxy) - 10G ---> servers

  root@instance-0098:/# iperf -c 20.1.1.200  -i 1 -t 5 -M 1400
  WARNING: attempt to set TCP maximum segment size to 1400, but got 536
  
  Client connecting to 20.1.1.200, TCP port 5001
  TCP window size: 22.0 KByte (default)
  
  [  3] local 20.1.1.108 port 54438 connected with 20.1.1.200 port 5001
  [ ID] Interval   Transfer Bandwidth
  [  3]  0.0- 1.0 sec   120 MBytes  1.01 Gbits/sec
  [  3]  1.0- 2.0 sec   140 MBytes  1.17 Gbits/sec
  [  3]  2.0- 3.0 sec   138 MBytes  1.16 Gbits/sec
  [  3]  3.0- 4.0 sec   135 MBytes  1.13 Gbits/sec

  Please let me know if we can tweet any parameter to increase the
  throughput.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1498288/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1528425] [NEW] memoized decorator not safe constructing a neutronclient in neutron api

2015-12-21 Thread liuyuan
Public bug reported:

in /horizon/openstack_dashboard/api/neutron.py: 
@memoized
def neutronclient(request):


@memoized only take the request's fileds as key to index cache, but if a filed 
has a different descendant filed, cache will still hit.
when we reuse the request with new parameters when calling neutron api, return 
same responses unexpectedly.

** Affects: horizon
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1528425

Title:
   memoized decorator not safe constructing a neutronclient  in neutron
  api

Status in OpenStack Dashboard (Horizon):
  New

Bug description:
  in /horizon/openstack_dashboard/api/neutron.py: 
  @memoized
  def neutronclient(request):

  
  @memoized only take the request's fileds as key to index cache, but if a 
filed has a different descendant filed, cache will still hit.
  when we reuse the request with new parameters when calling neutron api, 
return same responses unexpectedly.

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1528425/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1528420] [NEW] netowrk information missed in dashboard network column

2015-12-21 Thread ibm-cloud-qa
Public bug reported:


setup inforamtion:
devstack


reproduce:
yes


steps:
1.install one devstack.
source accrc/admin/admin 

2.check devstack default netowrk inforamtion by using command. we have two 
network.
stack@45-59:~/devstack$ neutron net-list
+--+-+--+
| id   | name| subnets  
|
+--+-+--+
| b9cedb82-6835-499b-885d-7646416ac93f | public  | 
146a2d03-52e0-4c7d-ba77-a9a2df99da7f 2001:db8::/64   |
|  | | 
aea6ea63-b70c-49fe-9bf5-3f593015a07d 172.24.4.0/24   |
| 1931775c-4459-4c18-9910-53b1ffbe4d31 | private | 
9b1a99a3-e7ae-4a7d-b9d2-e035077d4e5e 10.0.0.0/24 |
|  | | 
3ebaa37a-2b80-4186-9357-dd8b1202d542 fd7e:7e2b:56d0::/64 |
+--+-+--+


3.we can create instance with these network by using command.


4.check devstack dashboard gui. I find that we can't display private network. 
only public network is listed on the network column. but in admin column, we 
can see networks are all there.
   when try to launch a instance, we only can see  network named public listed 
to be chosen for instance.


5.create a new private network by using command. we can see the created network 
linwwu. 
(neutron) net-create --prefix 192.168.1.0/24 linwwu
Created a new network:
+---+--+
| Field | Value|
+---+--+
| admin_state_up| True |
| availability_zone_hints   | []   |
| id| 000505b3-5498-4a9f-b269-5d165192474b |
| mtu   | 0|
| name  | linwwu   |
| port_security_enabled | True |
| provider:network_type | vxlan|
| provider:physical_network |  |
| provider:segmentation_id  | 1023 |
| router:external   | False|
| shared| False|
| status| ACTIVE   |
| subnets   |  |
| tenant_id | 4d2c7b5c5e2d4d7584ec5dac8e49343d |
+---+--+


summary:
we can't see default network named privated in dashboard gui, which should be 
displayed in network column. and when creating instance, we also can't see and 
choose the default private network.

** Affects: horizon
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1528420

Title:
  netowrk information missed in dashboard network column

Status in OpenStack Dashboard (Horizon):
  New

Bug description:

  setup inforamtion:
  devstack

  
  reproduce:
  yes

  
  steps:
  1.install one devstack.
  source accrc/admin/admin 

  2.check devstack default netowrk inforamtion by using command. we have two 
network.
  stack@45-59:~/devstack$ neutron net-list
  
+--+-+--+
  | id   | name| subnets
  |
  
+--+-+--+
  | b9cedb82-6835-499b-885d-7646416ac93f | public  | 
146a2d03-52e0-4c7d-ba77-a9a2df99da7f 2001:db8::/64   |
  |  | | 
aea6ea63-b70c-49fe-9bf5-3f593015a07d 172.24.4.0/24   |
  | 1931775c-4459-4c18-9910-53b1ffbe4d31 | private | 
9b1a99a3-e7ae-4a7d-b9d2-e035077d4e5e 10.0.0.0/24 |
  |  | | 
3ebaa37a-2b80-4186-9357-dd8b1202d542 fd7e:7e2b:56d0::/64 |
  
+--+-+--+

  
  3.we can create instance with these network by using command.

  
  4.check devstack dashboard gui. I find that we can't display private network. 
only public network is listed on the network column. but in admin column, we 
can see networks are all there.
 when try to launch a instance, we only can see  network named public 

[Yahoo-eng-team] [Bug 1528397] [NEW] Style: Material Design: Alerts should have a box-shadow

2015-12-21 Thread Diana Whitten
Public bug reported:

Material Design is ALL about a stack of 3-D elements, so the upper
toasts in the corner should really reflect that.

** Affects: horizon
 Importance: Undecided
 Assignee: Diana Whitten (hurgleburgler)
 Status: New

** Changed in: horizon
 Assignee: (unassigned) => Diana Whitten (hurgleburgler)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1528397

Title:
  Style: Material Design: Alerts should have a box-shadow

Status in OpenStack Dashboard (Horizon):
  New

Bug description:
  Material Design is ALL about a stack of 3-D elements, so the upper
  toasts in the corner should really reflect that.

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1528397/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1528393] [NEW] signature_utils tests fail on Fedora/RHEL/CentOS because not all ECC curves are available

2015-12-21 Thread Mark McLoughlin
Public bug reported:

Not all ECC curves we use in signature_utils are available on all
platforms - e.g.

On RHEL 7.2

  $ openssl ecparam -list_curves
  secp384r1 : NIST/SECG curve over a 384 bit prime field
  secp521r1 : NIST/SECG curve over a 521 bit prime field
  prime256v1: X9.62/SECG curve over a 256 bit prime field

On Fedora 23 ...

  $ openssl ecparam -list_curves
  secp256k1 : SECG curve over a 256 bit prime field
  secp384r1 : NIST/SECG curve over a 384 bit prime field
  secp521r1 : NIST/SECG curve over a 521 bit prime field
  prime256v1: X9.62/SECG curve over a 256 bit prime field

There's a long history surrounding the lack of ECC support in openssl in
Fedora, RHEL, and CentOS because of legal issues - see
https://bugzilla.redhat.com/show_bug.cgi?id=319901

Some ECC curves are now available, but each additional one requested
will be considered individually - there is a tracker bug for this:
https://bugzilla.redhat.com/showdependencytree.cgi?id=1019390&hide_resolved=0

This is the failure I'm seeing since
https://review.openstack.org/#/c/256069/ was merged

nova.tests.unit.test_signature_utils.TestSignatureUtils.test_verify_signature_ECC
-

Captured traceback:
~~~
Traceback (most recent call last):
  File 
"/home/markmc/git/openstack/nova/.tox/py27/lib/python2.7/site-packages/mock/mock.py",
 line 1305, in patched
return func(*args, **keywargs)
  File "nova/tests/unit/test_signature_utils.py", line 178, in 
test_verify_signature_ECC
default_backend())
  File 
"/home/markmc/git/openstack/nova/.tox/py27/lib/python2.7/site-packages/cryptography/hazmat/primitives/asymmetric/ec.py",
 line 241, in generate_private_key
return backend.generate_elliptic_curve_private_key(curve)
  File 
"/home/markmc/git/openstack/nova/.tox/py27/lib/python2.7/site-packages/cryptography/hazmat/backends/multibackend.py",
 line 247, in generate_elliptic_curve_private_key
_Reasons.UNSUPPORTED_ELLIPTIC_CURVE
cryptography.exceptions.UnsupportedAlgorithm: This backend does not support 
this elliptic curve.

** Affects: nova
 Importance: Undecided
 Assignee: Mark McLoughlin (markmc)
 Status: In Progress

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1528393

Title:
  signature_utils tests fail on Fedora/RHEL/CentOS because not all ECC
  curves are available

Status in OpenStack Compute (nova):
  In Progress

Bug description:
  Not all ECC curves we use in signature_utils are available on all
  platforms - e.g.

  On RHEL 7.2

$ openssl ecparam -list_curves
secp384r1 : NIST/SECG curve over a 384 bit prime field
secp521r1 : NIST/SECG curve over a 521 bit prime field
prime256v1: X9.62/SECG curve over a 256 bit prime field

  On Fedora 23 ...

$ openssl ecparam -list_curves
secp256k1 : SECG curve over a 256 bit prime field
secp384r1 : NIST/SECG curve over a 384 bit prime field
secp521r1 : NIST/SECG curve over a 521 bit prime field
prime256v1: X9.62/SECG curve over a 256 bit prime field

  There's a long history surrounding the lack of ECC support in openssl
  in Fedora, RHEL, and CentOS because of legal issues - see
  https://bugzilla.redhat.com/show_bug.cgi?id=319901

  Some ECC curves are now available, but each additional one requested
  will be considered individually - there is a tracker bug for this:
  https://bugzilla.redhat.com/showdependencytree.cgi?id=1019390&hide_resolved=0

  This is the failure I'm seeing since
  https://review.openstack.org/#/c/256069/ was merged

  
nova.tests.unit.test_signature_utils.TestSignatureUtils.test_verify_signature_ECC
  
-

  Captured traceback:
  ~~~
  Traceback (most recent call last):
File 
"/home/markmc/git/openstack/nova/.tox/py27/lib/python2.7/site-packages/mock/mock.py",
 line 1305, in patched
  return func(*args, **keywargs)
File "nova/tests/unit/test_signature_utils.py", line 178, in 
test_verify_signature_ECC
  default_backend())
File 
"/home/markmc/git/openstack/nova/.tox/py27/lib/python2.7/site-packages/cryptography/hazmat/primitives/asymmetric/ec.py",
 line 241, in generate_private_key
  return backend.generate_elliptic_curve_private_key(curve)
File 
"/home/markmc/git/openstack/nova/.tox/py27/lib/python2.7/site-packages/cryptography/hazmat/backends/multibackend.py",
 line 247, in generate_elliptic_curve_private_key
  _Reasons.UNSUPPORTED_ELLIPTIC_CURVE
  cryptography.exceptions.UnsupportedAlgorithm: This backend does not 
support this elliptic curve.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1528393/+subscriptions

-- 
Mailing list: https://launch

[Yahoo-eng-team] [Bug 1527719] Re: Adding a VNIC type for physical functions

2015-12-21 Thread Atsushi SAKAI
** Also affects: openstack-api-site
   Importance: Undecided
   Status: New

** Changed in: openstack-api-site
 Assignee: (unassigned) => Atsushi SAKAI (sakaia)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1527719

Title:
  Adding a VNIC type for physical functions

Status in neutron:
  Fix Released
Status in openstack-api-site:
  New
Status in openstack-manuals:
  New

Bug description:
  https://review.openstack.org/246923
  Dear bug triager. This bug was created since a commit was marked with 
DOCIMPACT.
  Your project "openstack/neutron" is set up so that we directly report the 
documentation bugs against it. If this needs changing, the docimpact-group 
option needs to be added for the project. You can ask the OpenStack infra team 
(#openstack-infra on freenode) for help if you need to.

  commit 2c60278992d5a21724105ed0ca6e1d2f3e5c
  Author: Brent Eagles 
  Date:   Mon Nov 9 09:26:53 2015 -0330

  Adding a VNIC type for physical functions
  
  This change adds a new VNIC type to distinguish between virtual and
  physical functions in SR-IOV.
  
  The new VNIC type 'direct-physical' deviates from the behavior of
  'direct' VNICs for virtual functions. While neutron tracks the resource
  as a port, it does not currently perform any management functions.
  Future changes may extend the segment mapping functionality that is
  currently based on agent configuration to include direct types.
  However, the direct-physical VNICs will not have functional parity with
  the other SR-IOV VNIC types in that quality of service and port security
  functionality is not available.
  
  APIImpact
  DocImpact: Add description for new 'direct-physical' VNIC type.
  
  Closes-Bug: #1500993
  
  Change-Id: If1ab969c2002c649a3d51635ca2765c262e2d37f

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1527719/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1528382] [NEW] default theme's warning color is not readable

2015-12-21 Thread Diana Whitten
Public bug reported:

Its far too light:

https://www.dropbox.com/s/f6cl12jfdxd4llr/Screenshot%202015-12-21%2016.26.48.png?dl=0

** Affects: horizon
 Importance: Undecided
 Assignee: Diana Whitten (hurgleburgler)
 Status: In Progress

** Changed in: horizon
 Assignee: (unassigned) => Diana Whitten (hurgleburgler)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1528382

Title:
  default theme's warning color is not readable

Status in OpenStack Dashboard (Horizon):
  In Progress

Bug description:
  Its far too light:

  
https://www.dropbox.com/s/f6cl12jfdxd4llr/Screenshot%202015-12-21%2016.26.48.png?dl=0

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1528382/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1528372] [NEW] H2 should not be manually overridden

2015-12-21 Thread Diana Whitten
Public bug reported:

H2 styles are manually set in horizon.scss

This has adverse side effects to other themes:

https://www.dropbox.com/s/q78kq58n4bjeo6p/Screenshot%202015-12-21%2015.36.01.png?dl=0

** Affects: horizon
 Importance: Undecided
 Assignee: Diana Whitten (hurgleburgler)
 Status: New

** Changed in: horizon
 Assignee: (unassigned) => Diana Whitten (hurgleburgler)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1528372

Title:
  H2 should not be manually overridden

Status in OpenStack Dashboard (Horizon):
  New

Bug description:
  H2 styles are manually set in horizon.scss

  This has adverse side effects to other themes:

  
https://www.dropbox.com/s/q78kq58n4bjeo6p/Screenshot%202015-12-21%2015.36.01.png?dl=0

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1528372/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1528369] [NEW] Theme Preview Pages should use Font Awesome

2015-12-21 Thread Diana Whitten
Public bug reported:

Horizon converted all class='caret' to class='fa fa-caret-down'.  The
theme preview page should reflect this as well.

** Affects: horizon
 Importance: Undecided
 Assignee: Diana Whitten (hurgleburgler)
 Status: New

** Changed in: horizon
 Assignee: (unassigned) => Diana Whitten (hurgleburgler)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1528369

Title:
  Theme Preview Pages should use Font Awesome

Status in OpenStack Dashboard (Horizon):
  New

Bug description:
  Horizon converted all class='caret' to class='fa fa-caret-down'.  The
  theme preview page should reflect this as well.

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1528369/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1464259] Re: Volumes tests fails often with rbd backend

2015-12-21 Thread Matt Riedemann
Flavio, there is a backport to stable/liberty proposed.

** Also affects: nova/liberty
   Importance: Undecided
   Status: New

** Changed in: nova/liberty
   Status: New => In Progress

** Changed in: nova/liberty
 Assignee: (unassigned) => Matt Riedemann (mriedem)

** Changed in: nova/liberty
   Importance: Undecided => High

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1464259

Title:
  Volumes tests fails often with rbd backend

Status in Cinder:
  Triaged
Status in OpenStack Compute (nova):
  Fix Released
Status in OpenStack Compute (nova) liberty series:
  In Progress
Status in tempest:
  Invalid

Bug description:
  http://logs.openstack.org/02/173802/5/check/check-tempest-dsvm-full-
  ceph/a72aac1/logs/screen-n-api.txt.gz?level=TRACE#_2015-06-11_09_04_19_511

  2015-06-11 09:04:19.511 ERROR nova.api.ec2 
[req-0ac81d78-2717-4dd2-80e2-d94363b55ac8 EC2VolumesTest-442487008 
EC2VolumesTest-1066393631] Unexpected InvalidInput raised: Invalid input 
received: Invalid volume: Volume still has 1 dependent snapshots. (HTTP 400) 
(Request-ID: req-4586b5d2-7212-4ddd-af79-43ad8ba7ea58)
  2015-06-11 09:04:19.511 ERROR nova.api.ec2 
[req-0ac81d78-2717-4dd2-80e2-d94363b55ac8 EC2VolumesTest-442487008 
EC2VolumesTest-1066393631] Environment: {"HTTP_AUTHORIZATION": 
"AWS4-HMAC-SHA256 
Credential=a5e9253350ce4a249ddce8b7c1c798c2/20150611/0/127/aws4_request,SignedHeaders=host;x-amz-date,Signature=304830ed947f7fba3143887b08d1e47faa18d4b59782c0992727cb7593f586b4",
 "SCRIPT_NAME": "", "REQUEST_METHOD": "POST", "HTTP_X_AMZ_DATE": 
"20150611T090418Z", "PATH_INFO": "/", "SERVER_PROTOCOL": "HTTP/1.0", 
"CONTENT_LENGTH": "60", "HTTP_USER_AGENT": "Boto/2.38.0 Python/2.7.6 
Linux/3.13.0-53-generic", "RAW_PATH_INFO": "/", "REMOTE_ADDR": "127.0.0.1", 
"wsgi.url_scheme": "http", "SERVER_PORT": "8773", "CONTENT_TYPE": 
"application/x-www-form-urlencoded; charset=UTF-8", "HTTP_HOST": 
"127.0.0.1:8773", "SERVER_NAME": "127.0.0.1", "GATEWAY_INTERFACE": "CGI/1.1", 
"REMOTE_PORT": "45819", "HTTP_ACCEPT_ENCODING": "identity"}

  
http://logstash.openstack.org/#eyJzZWFyY2giOiJtZXNzYWdlOlwiRUMyVm9sdW1lc1Rlc3RcIiBBTkQgbWVzc2FnZTpcIlVuZXhwZWN0ZWQgSW52YWxpZElucHV0IHJhaXNlZDogSW52YWxpZCBpbnB1dCByZWNlaXZlZDogSW52YWxpZCB2b2x1bWU6IFZvbHVtZSBzdGlsbCBoYXMgMSBkZXBlbmRlbnQgc25hcHNob3RzXCIgQU5EIHRhZ3M6XCJzY3JlZW4tbi1hcGkudHh0XCIiLCJmaWVsZHMiOltdLCJvZmZzZXQiOjAsInRpbWVmcmFtZSI6IjYwNDgwMCIsImdyYXBobW9kZSI6ImNvdW50IiwidGltZSI6eyJ1c2VyX2ludGVydmFsIjowfSwic3RhbXAiOjE0MzQwMzAyMTUwODd9

  10 hits in 7 days, check and gate, hitting on the ceph and glusterfs
  jobs.

To manage notifications about this bug go to:
https://bugs.launchpad.net/cinder/+bug/1464259/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1528368] [NEW] Material Theme: Large Button has rounded corners

2015-12-21 Thread Diana Whitten
Public bug reported:

All buttons in 'material' need to have 0 border radius:
https://www.dropbox.com/s/9z27cjpua72o381/Screenshot%202015-12-21%2015.24.28.png?dl=0

** Affects: horizon
 Importance: Undecided
 Assignee: Diana Whitten (hurgleburgler)
 Status: New

** Changed in: horizon
 Assignee: (unassigned) => Diana Whitten (hurgleburgler)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1528368

Title:
  Material Theme: Large Button has rounded corners

Status in OpenStack Dashboard (Horizon):
  New

Bug description:
  All buttons in 'material' need to have 0 border radius:
  
https://www.dropbox.com/s/9z27cjpua72o381/Screenshot%202015-12-21%2015.24.28.png?dl=0

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1528368/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1528349] [NEW] Nova and Glance contain a near-identical signature_utils module

2015-12-21 Thread Mark McLoughlin
Public bug reported:

It appears that https://review.openstack.org/256069 took the
signature_utils modules from Glance and modified it in fairly
superficial ways based on review feedback:

  $ diff -u nova/nova/signature_utils.py 
glance/glance/common/signature_utils.py  | diffstat
  signature_utils.py |  182 
-
  1 file changed, 83 insertions(+), 99 deletions(-)

The Oslo project was created to avoid this sort of short-sighted cut-
and-pasting. This code should really be in a python library that both
Glance and Nova could use directly.

Perhaps the code could be moved to a new library in the Glance project,
or a new library in the Oslo project, or into the cryptography library
itself?

** Affects: glance
 Importance: Undecided
 Status: New

** Affects: nova
 Importance: Undecided
 Status: New

** Also affects: glance
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1528349

Title:
  Nova and Glance contain a near-identical signature_utils module

Status in Glance:
  New
Status in OpenStack Compute (nova):
  New

Bug description:
  It appears that https://review.openstack.org/256069 took the
  signature_utils modules from Glance and modified it in fairly
  superficial ways based on review feedback:

$ diff -u nova/nova/signature_utils.py 
glance/glance/common/signature_utils.py  | diffstat
signature_utils.py |  182 
-
1 file changed, 83 insertions(+), 99 deletions(-)

  The Oslo project was created to avoid this sort of short-sighted cut-
  and-pasting. This code should really be in a python library that both
  Glance and Nova could use directly.

  Perhaps the code could be moved to a new library in the Glance
  project, or a new library in the Oslo project, or into the
  cryptography library itself?

To manage notifications about this bug go to:
https://bugs.launchpad.net/glance/+bug/1528349/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1214341] Re: Not all db.sqal.session methods are wrapped by wrap_db_error

2015-12-21 Thread Ivan Kolodyazhny
** Changed in: cinder
   Status: Triaged => Fix Released

** Changed in: cinder
 Assignee: (unassigned) => Ivan Kolodyazhny (e0ne)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1214341

Title:
  Not all db.sqal.session methods are wrapped by wrap_db_error

Status in Cinder:
  Fix Released
Status in Ironic:
  Fix Released
Status in OpenStack Identity (keystone):
  Fix Released
Status in oslo-incubator:
  Fix Released

Bug description:
  first(), all(), begin(), commit() and other public methods could
  produce amount of exceptions, that should be wrapped in exception in
  any case.

To manage notifications about this bug go to:
https://bugs.launchpad.net/cinder/+bug/1214341/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1528325] [NEW] instance with explicit "small" pages treated different from implicit

2015-12-21 Thread Chris Friesen
Public bug reported:

In numa_get_constraints() we call

pagesize = _numa_get_pagesize_constraints(flavor, image_meta)

then later we have

if nodes or pagesize:

[setattr(c, 'pagesize', pagesize) for c in numa_topology.cells]


This ends up treating an instance which doesn't specify pagesize (which results 
in 4K pages) differently from an instance that explicitly specifies 4K pages.  
In the first case the instance may not have a numa topology specified, while in 
the second case it does.

In _get_guest_numa_config() we check whether the guest has a numa
topology, and if it does we restrict it to a single NUMA node rather
than letting it float across the whole host.  This unexpectedly results
in different CPU and memory affinity depending on whether an instance
implicitly assumes 4K pages or explicitly specifies them.

** Affects: nova
 Importance: Undecided
 Status: New


** Tags: compute numa

** Summary changed:

- explicit "small" pages treated different from implicit
+ instance with explicit "small" pages treated different from implicit

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1528325

Title:
  instance with explicit "small" pages treated different from implicit

Status in OpenStack Compute (nova):
  New

Bug description:
  In numa_get_constraints() we call

  pagesize = _numa_get_pagesize_constraints(flavor, image_meta)

  then later we have

  if nodes or pagesize:
  
  [setattr(c, 'pagesize', pagesize) for c in numa_topology.cells]

  
  This ends up treating an instance which doesn't specify pagesize (which 
results in 4K pages) differently from an instance that explicitly specifies 4K 
pages.  In the first case the instance may not have a numa topology specified, 
while in the second case it does.

  In _get_guest_numa_config() we check whether the guest has a numa
  topology, and if it does we restrict it to a single NUMA node rather
  than letting it float across the whole host.  This unexpectedly
  results in different CPU and memory affinity depending on whether an
  instance implicitly assumes 4K pages or explicitly specifies them.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1528325/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1526660] Re: enable os-inherit by default

2015-12-21 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/257580
Committed: 
https://git.openstack.org/cgit/openstack/keystone/commit/?id=5ae155a3dea38612f7f57228424f306ec9bded3c
Submitter: Jenkins
Branch:master

commit 5ae155a3dea38612f7f57228424f306ec9bded3c
Author: Ken'ichi Ohmichi 
Date:   Mon Dec 14 22:14:40 2015 +

Enable os_inherit of Keystone v3 API

os_inherit extension has been implemented since 2 years ago, and the
API doc[1] also contains it. However os_inherit extension is disabled
on the default. So it is nice to enable the extension for productions,
development and testing.
This patch comes from the discussion[2].

NOTE: This patch removes a test class which tests the enabled os_inherit
  because os_inherit becomes enabled on the default.

[1]: 
http://developer.openstack.org/api-ref-identity-v3-ext.html#identity_v3_OS-INHERIT-ext
[2]: 
http://lists.openstack.org/pipermail/openstack-dev/2015-December/081822.html

Closes-Bug: 1526660

Change-Id: Ifac71f7415f21c402f6e00c5264e972b0e80388c


** Changed in: keystone
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1526660

Title:
  enable os-inherit by default

Status in OpenStack Identity (keystone):
  Fix Released

Bug description:
  The OS-INHERIT 'extension' has been around since Icehouse. It was
  always disabled by default. But with bp move-extensions bringing in
  all the extensions and enabling them by default, we should enable this
  one too.

  Note that OS-INHERIT does not have any database migrations, and it's
  code all lives in the assignment package, so there is much less work
  to migrate it over compared to the other extensions.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1526660/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1508106] Re: For wrong ethertype exception message is hard coded

2015-12-21 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/258971
Committed: 
https://git.openstack.org/cgit/openstack/neutron/commit/?id=be14e905419f0927539e939c1f979430a6e44d42
Submitter: Jenkins
Branch:master

commit be14e905419f0927539e939c1f979430a6e44d42
Author: Sreekumar S 
Date:   Thu Dec 17 02:34:33 2015 +0530

Corrected wrong ethertype exception message

This patch resolves the issue where wrong message was being
shown when ethertype input parameter was not amongst one of
the types supported. New message made akin to other input
parameters like 'protocol'.

Change-Id: I5636f3582c9d9877dad4d091a374284b656923f4
Closes-Bug: #1508106


** Changed in: neutron
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1508106

Title:
  For wrong ethertype exception message is hard coded

Status in neutron:
  Fix Released

Bug description:
  if you give any wrong ethertype while creating security group rule. 
  it will always mention reason None in exception message

  Invalid input for ethertype. Reason: 'None' is not in ['IPv4',
  'IPv6'].

  try

  neutron security-group-rule-create --ethertype ip  --protocol icmp
  

  it will print 
  Invalid input for ethertype. Reason: 'None' is not in ['IPv4', 'IPv6'].

  but actually it should be Invalid input for ethertype. Reason: 'ip' is
  not in ['IPv4', 'IPv6'].

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1508106/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1527113] Re: Code duplication in neutron/api/v2attribute.py

2015-12-21 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/258867
Committed: 
https://git.openstack.org/cgit/openstack/neutron/commit/?id=dd5f5716c9a32634caa2a44d362cd77461ba873d
Submitter: Jenkins
Branch:master

commit dd5f5716c9a32634caa2a44d362cd77461ba873d
Author: Hong Hui Xiao 
Date:   Thu Dec 17 03:26:56 2015 -0500

Remove duplicated code in attribute.py

The _validate_XXX_list functions in [1] are mostly duplicated, this
patch will use one function to validate list of items and remove
others.

[1] neutron/api/v2/attributes.py

Change-Id: I86905018914becb64451941f0ecb06be30f2c740
Closes-Bug: #1527113


** Changed in: neutron
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1527113

Title:
  Code duplication in neutron/api/v2attribute.py

Status in neutron:
  Fix Released

Bug description:
  Found this when reviewing code.

  neutron/api/v2attribute.py may validate list of items, there are
  different functions to validate list of different items. The code are
  mostly duplicated in [1-3]. And more can be expected in future.




  [1] 
https://github.com/openstack/neutron/blob/b8d281a303ca12440aebb55895ebb192d25cecf8/neutron/api/v2/attributes.py#L121
  [2] 
https://github.com/openstack/neutron/blob/b8d281a303ca12440aebb55895ebb192d25cecf8/neutron/api/v2/attributes.py#L350
  [3] 
https://github.com/openstack/neutron/blob/b8d281a303ca12440aebb55895ebb192d25cecf8/neutron/api/v2/attributes.py#L411

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1527113/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1479838] Re: 500 error when using fernet tokens and not providing a token in the request.

2015-12-21 Thread Boris Bobrov
*** This bug is a duplicate of bug 1526976 ***
https://bugs.launchpad.net/bugs/1526976

** This bug is no longer a duplicate of bug 1474942
   Missing either X-Auth-Token or X-Subject-Token in fernet token gives HTTP 
500 code.
** This bug has been marked a duplicate of bug 1526976
   Any operation without token fails with internal server error for fernet token

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1479838

Title:
  500 error when using fernet tokens and not providing a token in the
  request.

Status in OpenStack Identity (keystone):
  In Progress

Bug description:
  Change keystone.conf to use Fernet tokens and issue any api call.

  curl http://localhost:5000/v3/users/xyz

  This is because the token is not checked for null value in the Fernet
  token provider code.

  The fix should be straight forward though. I will create a patch for
  this.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1479838/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1508421] Re: Projects dropdown fails due to incomplete Keystone endpoint URL

2015-12-21 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/238419
Committed: 
https://git.openstack.org/cgit/openstack/django_openstack_auth/commit/?id=58ce9d7edeac81dbd7e7f77efde33c97e8d1e00c
Submitter: Jenkins
Branch:master

commit 58ce9d7edeac81dbd7e7f77efde33c97e8d1e00c
Author: Johannes Grassler 
Date:   Wed Oct 21 17:43:35 2015 +0200

Add API version to identity endpoint URLs

This change adds the Keystone API version to the identity endpoint URL
retrieved from Keystone's endpoint list. This is neccessary in Kilo and
later, since identity endpoint URLs retrieved from Keystone no longer
contain the API version path they used to contain until Juno. See
https://bugs.launchpad.net/horizon/+bug/1508421 for a detailed analysis
of the problem.

Change-Id: Ieff5a6cdd1ad352a9731d46785802e8c36adcdd1
Closes-Bug: 1508421


** Changed in: django-openstack-auth
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1508421

Title:
  Projects dropdown fails due to incomplete Keystone endpoint URL

Status in django-openstack-auth:
  Fix Released
Status in OpenStack Dashboard (Horizon):
  In Progress

Bug description:
  Problem Description
  ===

  The 'Projects' dropdown in our Horizon dashboard (the one on the top
  left) is empty since we switched to Openstack Kilo. We investigated the
  issue and found the following error message in horizon.log:

AuthorizationFailure: Authorization Failed: The resource could not
  be found. (HTTP 404) http://10.0.81.10:5000

  [You will find a full stack trace in stacktrace.txt in the attached
  tarball.]

  Further investigation (see keystone.pcap in the attached tarball for a
  packet trace) revealed that horizon is trying to access
  http://10.0.81.10:5000/tokens (as opposed to the correct URL,
  http://10.0.81.10:5000/v2.0/tokens). We found the problem could be
  worked around by appending missing versioning information in backend.py
  (see below), but it should be possible to fix this in a cleaner manner.

  
  Environment
  ===

  We are running Openstack Kilo with the Ubuntu Cloud packages, some of
  them modified locally with backported bugfixes. You will find these
  packages at https://launchpad.net/~syseleven-platform/+archive/ubuntu/kilo. 
  In particular, we are running the following Horizon package:

  https://launchpad.net/~syseleven-platform/+archive/ubuntu/kilo

  
  Configuration
  =

  You will find our full Horizon configuration in local_settings.py in the
  attached tarball. Relevant points:

  * OPENSTACK_KEYSTONE_URL is http://10.0.81.10:5000/v2.0
  * OPENSTACK_API_VERSIONS is configured for Keystone 2.0
  * The identity endpoints as reported by Keystone itself do not contain
versioning information (the way it is supposed to be as of Kilo).

  
  Steps to reproduce
  ==

  * Run Horizon/Kilo (with the Ubuntu Cloud packages or our modified
packages; both should exhibit this problem)
  * Configure the end points and OPENSTACK_KEYSTONE_URL as described under
"Configuration"
  * Log into the web interface.

  This should yield an empty Projects dropdown list and the stacktrace in
  stacktrace.txt in /var/log/horizon/horizon.log).

  
  Workaround
  ==

  I modified /usr/lib/python2.7/dist-packages/openstack_auth/backend.py to
  append versioning information to the endpoint URL if it is missing. This
  can be used to work around the problem in a pinch, but I do not consider
  it a clean fix.

  
  Files
  =

  I attached a couple of files to illustrate the problem (you will find
  all of these in horizon-projects-dropdown.tar):

  backend.py  The modified backend.py described under "Workaround"
  endpoints.txt   A list of identity endpoints as reported by Keystone
  keystone.pcap   A packet capture of Horizon's interactions with
  Keystone
  local_settings.py   Our Horizon configuration
  stacktrace.txt  The stack trace that appears in 
  /var/log/horizon/horizon.log

To manage notifications about this bug go to:
https://bugs.launchpad.net/django-openstack-auth/+bug/1508421/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1528267] [NEW] There is an error "NoSuchMethod: Endpoint does not support RPC method add_shard_cluster" when add a shard to mongodb cluster

2015-12-21 Thread alex
Public bug reported:

When i add a shard to mongodb cluster. The trove-taskmanager has an error.
The error message is as follow.
2015-12-21 23:44:33.225 16857 ERROR oslo_messaging.rpc.dispatcher [-] Exception 
during message handling: Endpoint does not support RPC method add_shard_cluster
2015-12-21 23:44:33.225 16857 ERROR oslo_messaging.rpc.dispatcher Traceback 
(most recent call last):
2015-12-21 23:44:33.225 16857 ERROR oslo_messaging.rpc.dispatcher   File 
"/usr/lib/python2.7/site-packages/oslo_messaging/rpc/dispatcher.py", line 142, 
in _dispatch_and_reply
2015-12-21 23:44:33.225 16857 ERROR oslo_messaging.rpc.dispatcher 
executor_callback))
2015-12-21 23:44:33.225 16857 ERROR oslo_messaging.rpc.dispatcher   File 
"/usr/lib/python2.7/site-packages/oslo_messaging/rpc/dispatcher.py", line 193, 
in _dispatch
2015-12-21 23:44:33.225 16857 ERROR oslo_messaging.rpc.dispatcher raise 
NoSuchMethod(method)
2015-12-21 23:44:33.225 16857 ERROR oslo_messaging.rpc.dispatcher NoSuchMethod: 
Endpoint does not support RPC method add_shard_cluster

** Affects: keystone
 Importance: Undecided
 Assignee: alex (chinabjalex)
 Status: New

** Changed in: keystone
 Assignee: (unassigned) => alex (chinabjalex)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1528267

Title:
  There is an error "NoSuchMethod: Endpoint does not support RPC method
  add_shard_cluster" when add a shard to mongodb cluster

Status in OpenStack Identity (keystone):
  New

Bug description:
  When i add a shard to mongodb cluster. The trove-taskmanager has an error.
  The error message is as follow.
  2015-12-21 23:44:33.225 16857 ERROR oslo_messaging.rpc.dispatcher [-] 
Exception during message handling: Endpoint does not support RPC method 
add_shard_cluster
  2015-12-21 23:44:33.225 16857 ERROR oslo_messaging.rpc.dispatcher Traceback 
(most recent call last):
  2015-12-21 23:44:33.225 16857 ERROR oslo_messaging.rpc.dispatcher   File 
"/usr/lib/python2.7/site-packages/oslo_messaging/rpc/dispatcher.py", line 142, 
in _dispatch_and_reply
  2015-12-21 23:44:33.225 16857 ERROR oslo_messaging.rpc.dispatcher 
executor_callback))
  2015-12-21 23:44:33.225 16857 ERROR oslo_messaging.rpc.dispatcher   File 
"/usr/lib/python2.7/site-packages/oslo_messaging/rpc/dispatcher.py", line 193, 
in _dispatch
  2015-12-21 23:44:33.225 16857 ERROR oslo_messaging.rpc.dispatcher raise 
NoSuchMethod(method)
  2015-12-21 23:44:33.225 16857 ERROR oslo_messaging.rpc.dispatcher 
NoSuchMethod: Endpoint does not support RPC method add_shard_cluster

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1528267/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1528266] [NEW] Enable secure_proxy_ssl_header by default in keystone.conf

2015-12-21 Thread Stanislaw Bogatkin
*** This bug is a duplicate of bug 1528258 ***
https://bugs.launchpad.net/bugs/1528258

Public bug reported:

Currently, keystone.conf has a option named secure_proxy_ssl_header
which set to None by default. I suppose it should be set to
HTTP_X_FORWARDED_PROTO by default, as X-Forwarded-Proto  is a default
header for this. Also, this doesn't break anything by default, as if
this header will be unset - code related to it will be never used. Today
2 steps should be done if we have SSL terminator before keystone - we
should configure keystone special way for this and also configure
terminator some special way. It leads to troubles, misunderstanding how
keystone works and false-positive bug reports, so much nicer would be
have this option enabled by default.

** Affects: keystone
 Importance: Undecided
 Status: New

** This bug has been marked a duplicate of bug 1528258
   secure_proxy_ssl_header should default to HTTP_X_FORWARDED_PROTO

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1528266

Title:
  Enable secure_proxy_ssl_header by default in keystone.conf

Status in OpenStack Identity (keystone):
  New

Bug description:
  Currently, keystone.conf has a option named secure_proxy_ssl_header
  which set to None by default. I suppose it should be set to
  HTTP_X_FORWARDED_PROTO by default, as X-Forwarded-Proto  is a default
  header for this. Also, this doesn't break anything by default, as if
  this header will be unset - code related to it will be never used.
  Today 2 steps should be done if we have SSL terminator before keystone
  - we should configure keystone special way for this and also configure
  terminator some special way. It leads to troubles, misunderstanding
  how keystone works and false-positive bug reports, so much nicer would
  be have this option enabled by default.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1528266/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1528258] [NEW] secure_proxy_ssl_header should default to HTTP_X_FORWARDED_PROTO

2015-12-21 Thread Matthew Mosesohn
Public bug reported:

https://bugs.launchpad.net/keystone/+bug/1370022 resulted in
https://review.openstack.org/132235 which added secure_proxy_ssl_header
option being added to keystone. It works if it's correctly set, but
there is no valid reason why you would not want to enable this feature
by default. It adds an extra burden to configuration managers when
there's exactly 1 ideal default value (even specified in the comment for
the option).

I propose that we have default/secure_proxy_ssl_header =
"HTTP_X_FORWARDED_PROTO" instead of default/secure_proxy_ssl_header =
 instated as default in the package.

** Affects: keystone
 Importance: Undecided
 Assignee: Boris Bobrov (bbobrov)
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1528258

Title:
  secure_proxy_ssl_header should default to HTTP_X_FORWARDED_PROTO

Status in OpenStack Identity (keystone):
  New

Bug description:
  https://bugs.launchpad.net/keystone/+bug/1370022 resulted in
  https://review.openstack.org/132235 which added
  secure_proxy_ssl_header option being added to keystone. It works if
  it's correctly set, but there is no valid reason why you would not
  want to enable this feature by default. It adds an extra burden to
  configuration managers when there's exactly 1 ideal default value
  (even specified in the comment for the option).

  I propose that we have default/secure_proxy_ssl_header =
  "HTTP_X_FORWARDED_PROTO" instead of default/secure_proxy_ssl_header =
   instated as default in the package.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1528258/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1526244] Re: Able to create objects by admin in the particular domain, for incorrect domain Id field name "domain-id".

2015-12-21 Thread Tristan Cacqueray
According to VMT taxonomy, this is a class E.

** Changed in: ossa
   Status: Incomplete => Won't Fix

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1526244

Title:
  Able to create objects by admin in the particular domain, for
  incorrect domain Id field name "domain-id".

Status in OpenStack Identity (keystone):
  In Progress
Status in OpenStack Security Advisory:
  Won't Fix

Bug description:
  Admin is able to create objects(user,group,.) in a particular domain,
  though field name is misspelt as "domain-id" instead of "domain_id".

  Step Followed: User creation by admin with incorrect field name
  "domain-id"

  ubuntu@ubuntu:~$ curl -i -k -X POST -H "Content-Type: application/json" -H 
"X-AUTH-TOKEN:ae5ed453cf444969953850532cb9b581" /v3/users -d '{
  > "user":
  > {
  > "name":"User Pwr Ranger 50",
  > "password":"pwd",
  > "description":"User Creation in another domain",
  > "domain-id":"37a09709db404e7d97f8a211ebebc93f"
  > }
  > }'
  HTTP/1.1 201 Created
  Date: Fri, 13 Nov 2015 12:38:22 GMT
  Server: Apache/2.4.7 (Ubuntu)
  Vary: X-Auth-Token
  x-openstack-request-id: req-1cc05a23-065f-4a25-9fcd-90fa827722d3
  Content-Length: 290
  Content-Type: application/json

  {"user": {"links": {"self":
  "/v3/users/90776556002948dfb44227aef3b042e7"},
  "description": "User Creation in another domain", "name": "User Pwr
  Ranger 50", "enabled": true, "id": "90776556002948dfb44227aef3b042e7",
  "domain_id": "37a09709db404e7d97f8a211ebebc93f"}}

  The user got created in a specified domain "domain-
  id":"37a09709db404e7d97f8a211ebebc93f", even though domain Id field is
  misspelt as "domain-id" instead of "domain_id".

  Hence the issue has to be resolved by creating objects in "default"
  domain when the field name is spelt wrongly.

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1526244/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1528250] [NEW] Wrong string format in exception FlavorExtraSpecUpdateCreateFailed

2015-12-21 Thread Pavel Kholkin
Public bug reported:

class FlavorExtraSpecUpdateCreateFailed(NovaException):
msg_fmt = _("Flavor %(id)d extra spec cannot be updated or created "
"after %(retries)d retries.")

'id' here means 'flavorid' which is String (not Integer).

** Affects: nova
 Importance: Low
 Assignee: Pavel Kholkin (pkholkin)
 Status: In Progress

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1528250

Title:
  Wrong string format in exception FlavorExtraSpecUpdateCreateFailed

Status in OpenStack Compute (nova):
  In Progress

Bug description:
  class FlavorExtraSpecUpdateCreateFailed(NovaException):
  msg_fmt = _("Flavor %(id)d extra spec cannot be updated or created "
  "after %(retries)d retries.")

  'id' here means 'flavorid' which is String (not Integer).

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1528250/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1528235] [NEW] [REF]Add weight to l3 agent

2015-12-21 Thread Hong Hui Xiao
Public bug reported:

[Existing problem]
Currently, neutron will treat all l3 agent as the same. The default 
LeastRoutersScheduler will chose l3 agent, based on the load of l3 agents. But 
the hosts of l3 agents may be different. Some hosts may have better CPU, larger 
memory and better network bandwidth. Admins/Operators may want the host with 
higher performance to take more load.

[Proposal]
Add a configuration to l3_agent.ini to represent the weight of l3 agent. 
Admins/Operators can set higher weight to the l3 agent with higher performance. 
The l3 agent with higher weight will have higher chance to be selected by the 
L3Scheduler.

[Benefits]
Neutron can provide a better scheduling by leveraging the difference of 
performance of l3 agents' hosts

[What is the enhancement?]
Configuration file changes. 
Code change in the L3 scheduler.

** Affects: neutron
 Importance: Undecided
 Assignee: Hong Hui Xiao (xiaohhui)
 Status: New


** Tags: rfe

** Tags added: rfe

** Changed in: neutron
 Assignee: (unassigned) => Hong Hui Xiao (xiaohhui)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1528235

Title:
  [REF]Add weight to l3 agent

Status in neutron:
  New

Bug description:
  [Existing problem]
  Currently, neutron will treat all l3 agent as the same. The default 
LeastRoutersScheduler will chose l3 agent, based on the load of l3 agents. But 
the hosts of l3 agents may be different. Some hosts may have better CPU, larger 
memory and better network bandwidth. Admins/Operators may want the host with 
higher performance to take more load.

  [Proposal]
  Add a configuration to l3_agent.ini to represent the weight of l3 agent. 
Admins/Operators can set higher weight to the l3 agent with higher performance. 
The l3 agent with higher weight will have higher chance to be selected by the 
L3Scheduler.

  [Benefits]
  Neutron can provide a better scheduling by leveraging the difference of 
performance of l3 agents' hosts

  [What is the enhancement?]
  Configuration file changes. 
  Code change in the L3 scheduler.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1528235/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1520618] Re: lb agent: dhcp tap not plugged in bridge with vlan setup

2015-12-21 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/253067
Committed: 
https://git.openstack.org/cgit/openstack/neutron/commit/?id=cac2436f298491dbca2c932c80bdf3a64ac39ee6
Submitter: Jenkins
Branch:master

commit cac2436f298491dbca2c932c80bdf3a64ac39ee6
Author: Andreas Scheuring 
Date:   Thu Dec 3 14:54:39 2015 +0100

Correct return values for bridge sysctl calls

This fixes an issue where the lb agent did not plug the
dhcp tap device into the bridge when having vlan networking
set up.  Caused by setting of disable_ipv6 value.

Closes-Bug: #1520618
Change-Id: I0d21fad3a676d1fdd30501ea6a295f1e9b207a3a
Co-Authored-By: Brian Haley 


** Changed in: neutron
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1520618

Title:
  lb agent: dhcp tap not plugged in bridge with vlan setup

Status in neutron:
  Fix Released

Bug description:
  Commit [1] disables ipv6 on linuxbridges. On my linuxbridge vlan
  system, this fix causes the code ensure_bridge() to return too early
  without passing the bridge_name back.

  The introduced method returns the output of the systcl -w call
  +def disable_ipv6(self):
  +cmd = 'net.ipv6.conf.%s.disable_ipv6=1' % self.name
  +return self._sysctl([cmd])

  The sysctl always outputs the config that has been set (at least on my 
ubuntu):
  # sudo sysctl -w net.ipv6.conf.brq1192ca0d-a3.disable_ipv6=1
  net.ipv6.conf.brq1192ca0d-a3.disable_ipv6 = 1

  The check that has been introduced assumes that on successful executing, 
nothing (or return code 0) is returned - but the command always returns 
something!
  +if bridge_device.disable_ipv6():
  +return

  The result is, that the tap device of the dhcp server is not plugged
  into the bridge but instead still loosely hanging around.

  
  Log from a lb tempest run [1]. after the sysctl command is executed, the 
method returns (the follow on call that sets the bridge up is missing):
  2015-11-26 14:45:36.283 DEBUG neutron.agent.linux.utils 
[req-0655a18f-ce22-445c-834b-96ba4c91ae6e None None] Exit code: 0 execute 
/opt/stack/new/neutron/neutron/agent/linux/utils.py:142
  2015-11-26 14:45:36.284 DEBUG neutron.agent.linux.utils 
[req-0655a18f-ce22-445c-834b-96ba4c91ae6e None None] Running command (rootwrap 
daemon): ['sysctl', '-w', 'net.ipv6.conf.brq66379423-07.disable_ipv6=1'] 
execute_rootwrap_daemon /opt/stack/new/neutron/neutron/agent/linux/utils.py:100
  2015-11-26 14:45:36.286 DEBUG neutron.agent.linux.utils 
[req-0655a18f-ce22-445c-834b-96ba4c91ae6e None None] Exit code: 0 execute 
/opt/stack/new/neutron/neutron/agent/linux/utils.py:142
  2015-11-26 14:45:36.286 DEBUG neutron.agent.linux.utils 
[req-0655a18f-ce22-445c-834b-96ba4c91ae6e None None] Running command: ['ip', 
'-o', 'link', 'show', 'vxlan-1009'] create_process 
/opt/stack/new/neutron/neutron/agent/linux/utils.py:84
  2015-11-26 14:45:36.294 DEBUG neutron.agent.linux.utils 
[req-0655a18f-ce22-445c-834b-96ba4c91ae6e None None] Exit code: 0 execute 
/opt/stack/new/neutron/neutron/agent/linux/utils.py:142
  2015-11-26 14:45:36.295 DEBUG neutron.agent.linux.utils 
[req-0655a18f-ce22-445c-834b-96ba4c91ae6e None None] Running command (rootwrap 
daemon): ['ip', 'link', 'set', 'tap35e6a6a9-ef', 'mtu', '1450'] 
execute_rootwrap_daemon 

  [1] https://review.openstack.org/#/c/241076/
  [2] 
http://logs.openstack.org/85/193485/21/check/gate-tempest-dsvm-neutron-linuxbridge/7341e9a/logs/screen-q-agt.txt.gz

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1520618/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1525137] Re: doc wrong about BAK extensions of injection

2015-12-21 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/256351
Committed: 
https://git.openstack.org/cgit/openstack/nova/commit/?id=326de7607a4a2d9b99fc1f7cf6005bba5b6a06f6
Submitter: Jenkins
Branch:master

commit 326de7607a4a2d9b99fc1f7cf6005bba5b6a06f6
Author: jichenjc 
Date:   Fri Dec 11 04:11:27 2015 +0800

Remove incorrect comments about file injection

there is no method on 'BAK extension appended with a time stamp'
if this comes from some Active engine, we should let active
engine to document it instead of generialize it in nova

blueprint complete-todo-in-api-concept-doc

Closes-Bug: 1525137

Change-Id: Ibb05dc57f9be81de335ca4935c4c7fa59971de13


** Changed in: nova
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1525137

Title:
  doc wrong about BAK extensions of injection

Status in OpenStack Compute (nova):
  Fix Released
Status in openstack-api-site:
  Fix Released

Bug description:
  I cat following contents into a.pwd , note the '1' at /bin/sh1 of ssh line 
it's on purpose
  after following opreations, I didn't see fllowing mechanism talked in doc
  For example, if the /etc/passwd file exists, it is backed up as 
/etc/passwd.bak.1246036261.5785.

  
  
https://github.com/openstack/nova/blob/master/api-guide/source/server_concepts.rst
  http://developer.openstack.org/api-ref-compute-v2.1.html

  
  $ sudo cat passwd
  root:x:0:0:root:/root:/bin/sh
  daemon:x:1:1:daemon:/usr/sbin:/bin/sh
  bin:x:2:2:bin:/bin:/bin/sh
  sys:x:3:3:sys:/dev:/bin/sh
  sync:x:4:100:sync:/bin:/bin/sync
  mail:x:8:8:mail:/var/spool/mail:/bin/sh
  proxy:x:13:13:proxy:/bin:/bin/sh
  www-data:x:33:33:www-data:/var/www:/bin/sh
  backup:x:34:34:backup:/var/backups:/bin/sh
  operator:x:37:37:Operator:/var:/bin/sh
  haldaemon:x:68:68:hald:/:/bin/sh
  dbus:x:81:81:dbus:/var/run/dbus:/bin/sh
  ftp:x:83:83:ftp:/home/ftp:/bin/sh
  nobody:x:99:99:nobody:/home:/bin/sh
  sshd:x:103:99:Operator:/var:/bin/sh1
  cirros:x:1000:1000:non-root user:/home/cirros:/bin/sh

  
  do the following 

  jichen@devstack1:/opt/stack/nova$ nova boot --file 
/etc/passwd=/home/jichen/a.pwd --image 9eee793a-25e5-4f42-bd9e-b869e60d3dbd 
--flavor m1.micro t6
  
+--++
  | Property | Value
  |
  
+--++
  | OS-DCF:diskConfig| MANUAL   
  |
  | OS-EXT-AZ:availability_zone  |  
  |
  | OS-EXT-STS:power_state   | 0
  |
  | OS-EXT-STS:task_state| scheduling   
  |
  | OS-EXT-STS:vm_state  | building 
  |
  | OS-SRV-USG:launched_at   | -
  |
  | OS-SRV-USG:terminated_at | -
  |
  | accessIPv4   |  
  |
  | accessIPv6   |  
  |
  | adminPass| 9VUVZY53nbFb 
  |
  | config_drive |  
  |
  | created  | 2015-12-11T09:19:28Z 
  |
  | flavor   | m1.micro (84)
  |
  | hostId   |  
  |
  | id   | 80f24559-2bd9-4709-b1a2-36709cfb3b50 
  |
  | image| cirros-0.3.4-x86_64-uec 
(9eee793a-25e5-4f42-bd9e-b869e60d3dbd) |

  
  jichen@devstack1:/opt/stack/nova$ ssh cirros@10.0.0.17
  The authenticity of host '10.0.0.17 (10.0.0.17)' can't be established.
  RSA key fingerprint is c2:44:7a:4f:61:cb:1b:95:b4:3a:49:fe:ce:dc:1e:20.
  Are you sure you want to continue connecting (yes/no)? yes
  Warning: Permanently added '10.0.0.17' (RSA) to the list of known hosts.
  cirros@10.0.0.17's password:

  
  $ cd /etc
  $ ls
  TZ cirros fstab  init.d ld.so.conf 
mtab   profileresolv.confshadow
  acpi   cirros-initgroup  initt

[Yahoo-eng-team] [Bug 1523780] Re: Race between HA router create and HA router delete

2015-12-21 Thread LIU Yulong
The following exceptions are not fixed:
1.DBReferenceError: (IntegrityError)

2. AttributeError: 'NoneType' object has no attribute 'config' (l3 agent
process router in router_delete function)

3. DBError: UPDATE statement on table 'ports' expected to update 1
row(s); 0 were matched. (Maybe this patch
https://review.openstack.org/#/c/238122/ can fix this.)

4. res = {"id": port["id"],
   TypeError: 'NoneType' object is unsubscriptable

** Changed in: neutron
   Status: Fix Released => In Progress

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1523780

Title:
  Race between HA router create and HA router delete

Status in neutron:
  In Progress

Bug description:
  Set more than one API worker and RPC worker,  and then run rally scenario 
test  create_and_delete_routers:
  you may get such errors:

  1.DBReferenceError: (IntegrityError) (1452, 'Cannot add or update a
  child row: a foreign key constraint fails
  (`neutron`.`ha_router_agent_port_bindings`, CONSTRAINT
  `ha_router_agent_port_bindings_ibfk_2` FOREIGN KEY (`router_id`)
  REFERENCES `routers` (`id`) ON DELETE CASCADE)') 'INSERT INTO
  ha_router_agent_port_bindings (port_id, router_id, l3_agent_id, state)
  VALUES (%s, %s, %s, %s)' ('xxx', 'xxx', None,
  'standby')

  (InvalidRequestError: This Session's transaction has been rolled back
  by a nested rollback() call.  To begin a new transaction, issue
  Session.rollback() first.)

  2. AttributeError: 'NoneType' object has no attribute 'config' (l3
  agent process router in router_delete function)

  3. DBError: UPDATE statement on table 'ports' expected to update 1
  row(s); 0 were matched.

  4. res = {"id": port["id"],
     TypeError: 'NoneType' object is unsubscriptable

  5. delete HA network during deleting the last router, get error
  message: "Unable to complete operation on network . There
  are one or more ports still in use on the network."

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1523780/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1528137] [NEW] creating meter label rule doesn't work properly

2015-12-21 Thread Yu Fukuyama
Public bug reported:

Created rule by the following API counts packets between a router which
connects to external network and the connection destination device.

  API: POST /v2.0/metering/metering-label-rules

When outbound traffic of external router, destination should be
remote_ip, and when inbound traffic, sender should be remote_ip. But it
has become actually reversed.

Because option for creating the iptables rule is reversed.

  code:
https://github.com/openstack/neutron/blob/master/neutron/services/metering/drivers/iptables/iptables_driver.py#L176

I'll show you an example that created the meter label rule the remote_ip
is set to 192.168.0.0/16.


[Actual results]

$ neutron meter-label-create test-label --tenant-id 
2a023bd32f014e44b60b591cbd151514
Created a new metering_label:
+-+--+
| Field   | Value|
+-+--+
| description |  |
| id  | d35d0464-f872-43c7-8dd8-850657da59ef |
| name| test-label   |
| shared  | False|
| tenant_id   | 2a023bd32f014e44b60b591cbd151514 |
+-+--+
$ neutron meter-label-create test-label2 --tenant-id 
2a023bd32f014e44b60b591cbd151514
Created a new metering_label:
+-+--+
| Field   | Value|
+-+--+
| description |  |
| id  | 61c344ce-0438-4cd3-bbd8-a4d5e0dbce6f |
| name| test-label2  |
| shared  | False|
| tenant_id   | 2a023bd32f014e44b60b591cbd151514 |
+-+--+
$ neutron meter-label-rule-create --tenant-id 2a023bd32f014e44b60b591cbd151514 
--direction egress d35d0464-f872-43c7-8dd8-850657da59ef 192.168.0.0/16

$ neutron meter-label-rule-create --tenant-id
2a023bd32f014e44b60b591cbd151514 --direction ingress
61c344ce-0438-4cd3-bbd8-a4d5e0dbce6f 192.168.0.0/16

$ neutron meter-label-rule-list
+--+--+---+--+
| id   | excluded | direction | 
remote_ip_prefix |
+--+--+---+--+
| 3e426537-61f4-44ac-a67a-e66ce26dc11b | False| egress| 192.168.0.0/16  
 |
| 4d669406-173c-4eea-af21-00430719cbfa | False| ingress   | 192.168.0.0/16  
 |
+--+--+---+--+

$ sudo ip netns exec qrouter-b72b789e-8ca9-465e-a2d1-98f725a7042f iptables-save
...
-A neutron-meter-r-61c344ce-043 -d 192.168.0.0/16 -i qg-708e8abf-bc -j 
neutron-meter-l-61c344ce-043
-A neutron-meter-r-d35d0464-f87 -s 192.168.0.0/16 -o qg-708e8abf-bc -j 
neutron-meter-l-d35d0464-f87
...


 [The expected iptables rules]

-A neutron-meter-r-61c344ce-043 -s 192.168.0.0/16 -i qg-708e8abf-bc -j 
neutron-meter-l-61c344ce-043
-A neutron-meter-r-d35d0464-f87 -d 192.168.0.0/16 -o qg-708e8abf-bc -j 
neutron-meter-l-d35d0464-f87


[Examples of required packet is not counted]

ubuntu@test-vm(10.0.0.3):~$ ping 192.168.0.3 -c 3
PING 192.168.0.3 (192.168.0.3) 56(84) bytes of data.
64 bytes from 192.168.0.3: icmp_seq=1 ttl=62 time=1.13 ms
64 bytes from 192.168.0.3: icmp_seq=2 ttl=62 time=0.618 ms
64 bytes from 192.168.0.3: icmp_seq=3 ttl=62 time=0.652 ms

--- 192.168.0.3 ping statistics ---
3 packets transmitted, 3 received, 0% packet loss, time 2000ms
rtt min/avg/max/mdev = 0.618/0.801/1.133/0.235 ms

$ sudo ip netns exec qrouter-b72b789e-8ca9-465e-a2d1-98f725a7042f iptables -t 
filter -L neutron-meter-l-d35d0464-f87 -n -v -x
Chain neutron-meter-l-d35d0464-f87 (2 references)
pkts  bytes target prot opt in out source   
destination
   00all  --  *  *   0.0.0.0/0
0.0.0.0/0

** Affects: neutron
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1528137

Title:
  creating meter label rule doesn't work properly

Status in neutron:
  New

Bug description:
  Created rule by the following API counts packets between a router
  which connects to external network and the connection destination
  device.

API: POST /v2.0/metering/metering-label-rules

  When outbound traffic of external router, destination should be
  remote_ip, and when inbound traffic, sender should be remote_ip. But
  it has become actually reversed.

  Because option for creating the iptables rule is reversed.

code:
  
https://github.com/openstack/neutron/blob/master/neutron/services/metering/drivers/iptables/iptables_driver.py#L176