[Yahoo-eng-team] [Bug 1696309] [NEW] net-ip-availability-list not support filter by project id

2017-06-06 Thread Dongcan Ye
Public bug reported:

List network ip availability filtered by project id not supported.

$ neutron net-ip-availability-list --project-id 6d0a93fb8cfc4c2f84e3936d95a17bad
neutron CLI is deprecated and will be removed in the future. Use openstack CLI 
instead.
+--+--+--+---+--+
| network_id   | tenant_id| 
network_name | total_ips | used_ips |
+--+--+--+---+--+
| 34bed001-306a-4b1c-a441-c9f6bf95b361 | b76ff5120e234f11a7e7a35a5b60277e | 
private-net  |   253 |2 |
| 4ebdcf94-6ec9-498c-a2c6-b7746aaf09f5 | c04b15f261854c13bff01610313e7b99 | 
dvr-net  |   253 |4 |
| e374af03-4461-4316-bf8c-d95f5ed8526c | 274428ff074a4b639809fb28a52c2621 | 
private-net  |   253 |5 |
| bd1aa0a3-fe2f-42b1-b4e0-6405d4609279 | ed343dbff2384a07bf5871f0cac018f5 | 
private-net  |   253 |2 |
| 3a4a15f6-5eb3-4f4e-acf5-940131030e9f | c04b15f261854c13bff01610313e7b99 | 
ceph-net |   253 |7 |
| 9cd01eb4-906a-4c68-b705-0520bfe1b1e6 | 6d0a93fb8cfc4c2f84e3936d95a17bad | 
net12|   253 |1 |

** Affects: neutron
 Importance: Undecided
 Assignee: Dongcan Ye (hellochosen)
 Status: New

** Changed in: neutron
 Assignee: (unassigned) => Dongcan Ye (hellochosen)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1696309

Title:
  net-ip-availability-list not support filter by project id

Status in neutron:
  New

Bug description:
  List network ip availability filtered by project id not supported.

  $ neutron net-ip-availability-list --project-id 
6d0a93fb8cfc4c2f84e3936d95a17bad
  neutron CLI is deprecated and will be removed in the future. Use openstack 
CLI instead.
  
+--+--+--+---+--+
  | network_id   | tenant_id| 
network_name | total_ips | used_ips |
  
+--+--+--+---+--+
  | 34bed001-306a-4b1c-a441-c9f6bf95b361 | b76ff5120e234f11a7e7a35a5b60277e | 
private-net  |   253 |2 |
  | 4ebdcf94-6ec9-498c-a2c6-b7746aaf09f5 | c04b15f261854c13bff01610313e7b99 | 
dvr-net  |   253 |4 |
  | e374af03-4461-4316-bf8c-d95f5ed8526c | 274428ff074a4b639809fb28a52c2621 | 
private-net  |   253 |5 |
  | bd1aa0a3-fe2f-42b1-b4e0-6405d4609279 | ed343dbff2384a07bf5871f0cac018f5 | 
private-net  |   253 |2 |
  | 3a4a15f6-5eb3-4f4e-acf5-940131030e9f | c04b15f261854c13bff01610313e7b99 | 
ceph-net |   253 |7 |
  | 9cd01eb4-906a-4c68-b705-0520bfe1b1e6 | 6d0a93fb8cfc4c2f84e3936d95a17bad | 
net12|   253 |1 |

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1696309/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1696308] [NEW] list revoked tokens API returns 500 InternalServerError

2017-06-06 Thread Dinesh Bhor
Public bug reported:

list revoked tokens API returns 500 InternalServerError

The documentation [1] says that the API should return list of expired PKI 
tokens, signed by the cryptographic message syntax (CMS) but 
I am using token format as UUID.

[1] https://developer.openstack.org/api-ref/identity/v3/?expanded=list-
revoked-tokens-detail#list-revoked-tokens


Sample program:

  1 from keystoneauth1.identity import v3
  2 from keystoneauth1 import session
  3 from keystoneclient.v3 import client
  4 auth = v3.Password(auth_url='http:///identity/v3',
  5user_id=,
  6password=,
  7project_id=)
  8 sess = session.Session(auth=auth)
  9 keystone = client.Client(session=sess)
 10
 11 a =  keystone.tokens.get_revoked()


The API which is getting used is below:

GET http:///identity/v3/auth/tokens/OS-PKI/revoked
 
 
Curl command:
$ curl -g -i -X GET http://10.232.48.201/identity/v3/auth/tokens/OS-PKI/revoked 
 -H "X-Auth-Token: eb8fc9de9d154c6daa6b26a14d7c4e0f"
HTTP/1.1 500 Internal Server Error
Date: Wed, 07 Jun 2017 05:51:14 GMT
Server: Apache/2.4.18 (Ubuntu)
Vary: X-Auth-Token
Content-Type: application/json
Content-Length: 143
x-openstack-request-id: req-a6517dc2-08ac-4d62-8d21-c3405159e1f3
Connection: close

{"error": {"message": "An unexpected error prevented the server from
fulfilling your request.", "code": 500, "title": "Internal Server
Error"}}


command prompt traceback:

Traceback (most recent call last):
  File "3_keystoneclient_program.py", line 12, in 
a =  keystone.tokens.get_revoked()
  File "/usr/local/lib/python2.7/dist-packages/positional/__init__.py", line 
101, in inner
return wrapped(*args, **kwargs)
  File "/opt/stack/python-keystoneclient/keystoneclient/v3/tokens.py", line 62, 
in get_revoked
resp, body = self._client.get(path)
  File "/usr/local/lib/python2.7/dist-packages/keystoneauth1/adapter.py", line 
223, in get
return self.request(url, 'GET', **kwargs)
  File "/usr/local/lib/python2.7/dist-packages/keystoneauth1/adapter.py", line 
382, in request
resp = super(LegacyJsonAdapter, self).request(*args, **kwargs)
  File "/usr/local/lib/python2.7/dist-packages/keystoneauth1/adapter.py", line 
148, in request
return self.session.request(url, method, **kwargs)
  File "/usr/local/lib/python2.7/dist-packages/positional/__init__.py", line 
101, in inner
return wrapped(*args, **kwargs)
  File "/usr/local/lib/python2.7/dist-packages/keystoneauth1/session.py", line 
655, in request
raise exceptions.from_response(resp, method, url)
keystoneauth1.exceptions.http.InternalServerError: An unexpected error 
prevented the server from fulfilling your request. (HTTP 500) (Request-ID: 
req-7004583f-3556-4b38-877a-b7669b3df3f8)


Keystone logs:


2017-06-07 11:07:13.262 DEBUG keystone.middleware.auth 
[req-78ad2fdd-6a2d-4489-96c0
-98c7373b3eb2 None None] Authenticating user token from (pid=9498) 
process_request
/usr/local/lib/python2.7/dist-packages/keystonemiddleware/auth_token/__init__.py:40
1
2017-06-07 11:07:13.270 DEBUG keystone.middleware.auth 
[req-44f7294f-8430-48d3-b9a6
-4f531544c893 None None] RBAC: auth_context: {'is_delegated_auth': False, 
'access_t
oken_id': None, 'user_id': u'3ad182b5723d4e88b97ea7a52bf50cea', 'roles': 
[u'admin']
, 'user_domain_id': u'default', 'consumer_id': None, 'trustee_id': None, 
'is_domain
': False, 'is_admin_project': True, 'trustor_id': None, 'token': , 'project_id': u'c76af8728a56496fb67c6ace6e78657d', 'trust_id': None, 
'projec
t_domain_id': u'default'} from (pid=9498) fill_context 
/opt/stack/keystone/keystone
/middleware/auth.py:239
2017-06-07 11:07:13.271 INFO keystone.common.wsgi 
[req-44f7294f-8430-48d3-b9a6-4f53
1544c893 None None] GET 
http://10.232.48.201/identity/v3/auth/tokens/OS-PKI/revoked
2017-06-07 11:07:13.271 DEBUG keystone.common.authorization 
[req-44f7294f-8430-48d3
-b9a6-4f531544c893 None None] RBAC: Authorizing identity:revocation_list() from 
(pi
d=9498) _build_policy_check_credentials 
/opt/stack/keystone/keystone/common/authori
zation.py:136
2017-06-07 11:07:13.272 DEBUG keystone.policy.backends.rules 
[req-44f7294f-8430-48d
3-b9a6-4f531544c893 None None] enforce identity:revocation_list: 
{'is_delegated_aut
h': False, 'access_token_id': None, 'user_id': 
u'3ad182b5723d4e88b97ea7a52bf50cea',
 'roles': [u'admin'], 'user_domain_id': u'default', 'consumer_id': None, 
'trustee_i
d': None, 'is_domain': False, 'is_admin_project': True, 'trustor_id': None, 
'token'
: , 'project_id': 
u'c76af8728a56496fb67c6ace6e78657d', 'trust_id': None, 'project_domain_id': 
u'default'} from (pid=9498) enforce 
/opt/stack/keystone/keystone/policy/backends/rules.py:33
2017-06-07 11:07:13.274 DEBUG keystone.common.authorization 
[req-44f7294f-8430-48d3-b9a6-4f531544c893 None None] RBAC: Authorization 
granted from (pid=9498) check_policy 
/opt/stack/keystone/keystone/common/authorization.py:240

Wed Jun  7 09:49:23 2017 - SIGPIPE: writing to a closed pipe/socket/fd 
(pro

[Yahoo-eng-team] [Bug 1320029] Re: GRE segmentation issue drops packets over 1438 bytes long

2017-06-06 Thread Launchpad Bug Tracker
[Expired for Ubuntu because there has been no activity for 60 days.]

** Changed in: ubuntu
   Status: Incomplete => Expired

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1320029

Title:
  GRE segmentation issue drops packets over 1438 bytes long

Status in neutron:
  Expired
Status in Ubuntu:
  Expired

Bug description:
  OpenStack Icehouse release running on ubuntu 14.04 using GRE tunnels,
  packets over 1438 bytes long are dropped and not segmented.  This
  causes many issues, not least of which is you cannot inject an ssh key
  into an ubuntu 14.04 guest using the metadata service.

  I have attached tcpdump to the tap interface, the br-int bridge, the
  br-tun bridge, and I can see a small packet traverse the path all the
  way to the physical interface leaving the compute node.  When I
  attempt to send a packet of 1439 bytes, it enters the br-int bridge,
  but never leaves.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1320029/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1320029] Re: GRE segmentation issue drops packets over 1438 bytes long

2017-06-06 Thread Launchpad Bug Tracker
[Expired for neutron because there has been no activity for 60 days.]

** Changed in: neutron
   Status: Incomplete => Expired

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1320029

Title:
  GRE segmentation issue drops packets over 1438 bytes long

Status in neutron:
  Expired
Status in Ubuntu:
  Expired

Bug description:
  OpenStack Icehouse release running on ubuntu 14.04 using GRE tunnels,
  packets over 1438 bytes long are dropped and not segmented.  This
  causes many issues, not least of which is you cannot inject an ssh key
  into an ubuntu 14.04 guest using the metadata service.

  I have attached tcpdump to the tap interface, the br-int bridge, the
  br-tun bridge, and I can see a small packet traverse the path all the
  way to the physical interface leaving the compute node.  When I
  attempt to send a packet of 1439 bytes, it enters the br-int bridge,
  but never leaves.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1320029/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1696295] [NEW] [Hype-V][Azure]cloud-init failed to create user if "/mnt/cdrom/secure" does not exist

2017-06-06 Thread Hongjiang Zhang
Public bug reported:

On Azure, cloud-init (head) fails to mount cdrom /dev/cd0 on FreeBSD if
the directory /mnt/cdrom/secure does not exist. In fact, "mount" should
not depends on any directory. The quick fix is to use "util.mount_cd" to
test whether cdrom is available or not.

** Affects: cloud-init
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to cloud-init.
https://bugs.launchpad.net/bugs/1696295

Title:
  [Hype-V][Azure]cloud-init failed to create user if "/mnt/cdrom/secure"
  does not exist

Status in cloud-init:
  New

Bug description:
  On Azure, cloud-init (head) fails to mount cdrom /dev/cd0 on FreeBSD
  if the directory /mnt/cdrom/secure does not exist. In fact, "mount"
  should not depends on any directory. The quick fix is to use
  "util.mount_cd" to test whether cdrom is available or not.

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-init/+bug/1696295/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1696267] Re: Functional test test_sync_standard_traits intermittently fails

2017-06-06 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/471508
Committed: 
https://git.openstack.org/cgit/openstack/nova/commit/?id=11f4b627459cb68b199ad4f2f1738f07f27627bc
Submitter: Jenkins
Branch:master

commit 11f4b627459cb68b199ad4f2f1738f07f27627bc
Author: Chris Dent 
Date:   Tue Jun 6 22:47:49 2017 +

Reset the _TRAITS_SYNCED global in Traits tests

The global is reset before and after tests because we don't know
what other tests might have been messing with it (without even
knowing) in this process. We want to start from a clean slate and
leave the slate clean.

Change-Id: I42b9a7973ec5c4f42578779dc6ad59274212113f
Closes-Bug: #1696267


** Changed in: nova
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1696267

Title:
  Functional test test_sync_standard_traits intermittently fails

Status in OpenStack Compute (nova):
  Fix Released

Bug description:
  http://logs.openstack.org/98/471498/1/check/gate-nova-tox-functional-
  ubuntu-xenial/c84dfef/console.html#_2017-06-06_22_23_07_594859

  2017-06-06 22:23:07.594859 | 
nova.tests.functional.db.test_resource_provider.ResourceProviderTraitTestCase.test_sync_standard_traits
  2017-06-06 22:23:07.594888 | 
---
  2017-06-06 22:23:07.594894 | 
  2017-06-06 22:23:07.594904 | Captured traceback:
  2017-06-06 22:23:07.594917 | ~~~
  2017-06-06 22:23:07.594934 | Traceback (most recent call last):
  2017-06-06 22:23:07.594965 |   File 
"nova/tests/functional/db/test_resource_provider.py", line 1768, in 
test_sync_standard_traits
  2017-06-06 22:23:07.594988 | self.assertEqual(set(std_traits), 
set(all_traits))
  2017-06-06 22:23:07.595032 |   File 
"/home/jenkins/workspace/gate-nova-tox-functional-ubuntu-xenial/.tox/functional/local/lib/python2.7/site-packages/testtools/testcase.py",
 line 411, in assertEqual
  2017-06-06 22:23:07.595053 | self.assertThat(observed, matcher, 
message)
  2017-06-06 22:23:07.595095 |   File 
"/home/jenkins/workspace/gate-nova-tox-functional-ubuntu-xenial/.tox/functional/local/lib/python2.7/site-packages/testtools/testcase.py",
 line 498, in assertThat
  2017-06-06 22:23:07.595107 | raise mismatch_error
  2017-06-06 22:23:07.595122 | testtools.matchers._impl.MismatchError: !=:
  2017-06-06 22:23:07.595136 | reference = set(['HW_CPU_X86_3DNOW',
  2017-06-06 22:23:07.595147 |  'HW_CPU_X86_ABM',
  2017-06-06 22:23:07.595158 |  'HW_CPU_X86_AESNI',
  2017-06-06 22:23:07.595169 |  'HW_CPU_X86_ASF',
  2017-06-06 22:23:07.595198 |  'HW_CPU_X86_AVX',
  2017-06-06 22:23:07.595211 |  'HW_CPU_X86_AVX2',
  2017-06-06 22:23:07.595223 |  'HW_CPU_X86_AVX512BW',
  2017-06-06 22:23:07.595234 |  'HW_CPU_X86_AVX512CD',
  2017-06-06 22:23:07.595250 |  'HW_CPU_X86_AVX512DQ',
  2017-06-06 22:23:07.595262 |  'HW_CPU_X86_AVX512ER',
  2017-06-06 22:23:07.595274 |  'HW_CPU_X86_AVX512F',
  2017-06-06 22:23:07.595286 |  'HW_CPU_X86_AVX512PF',
  2017-06-06 22:23:07.595297 |  'HW_CPU_X86_AVX512VL',
  2017-06-06 22:23:07.595308 |  'HW_CPU_X86_BMI',
  2017-06-06 22:23:07.595319 |  'HW_CPU_X86_BMI2',
  2017-06-06 22:23:07.595331 |  'HW_CPU_X86_CLMUL',
  2017-06-06 22:23:07.595342 |  'HW_CPU_X86_F16C',
  2017-06-06 22:23:07.595353 |  'HW_CPU_X86_FMA3',
  2017-06-06 22:23:07.595364 |  'HW_CPU_X86_FMA4',
  2017-06-06 22:23:07.595375 |  'HW_CPU_X86_MMX',
  2017-06-06 22:23:07.595385 |  'HW_CPU_X86_MPX',
  2017-06-06 22:23:07.595416 |  'HW_CPU_X86_SGX',
  2017-06-06 22:23:07.595430 |  'HW_CPU_X86_SHA',
  2017-06-06 22:23:07.595441 |  'HW_CPU_X86_SSE',
  2017-06-06 22:23:07.595458 |  'HW_CPU_X86_SSE2',
  2017-06-06 22:23:07.595469 |  'HW_CPU_X86_SSE3',
  2017-06-06 22:23:07.595482 |  'HW_CPU_X86_SSE41',
  2017-06-06 22:23:07.595494 |  'HW_CPU_X86_SSE42',
  2017-06-06 22:23:07.595505 |  'HW_CPU_X86_SSE4A',
  2017-06-06 22:23:07.595516 |  'HW_CPU_X86_SSSE3',
  2017-06-06 22:23:07.595532 |  'HW_CPU_X86_SVM',
  2017-06-06 22:23:07.595544 |  'HW_CPU_X86_TBM',
  2017-06-06 22:23:07.59 |  'HW_CPU_X86_TSX',
  2017-06-06 22:23:07.595566 |  'HW_CPU_X86_VMX',
  2017-06-06 22:23:07.595576 |  'HW_CPU_X86_XOP',
  2017-06-06 22:23:07.595588 |  'HW_NIC_ACCEL_DEFLATE',
  2017-06-06 22:23:07.595600 |  'HW_NIC_ACCEL_DIFFIEH',
  2017-06-06 22:23:07.595612 |  'HW_NIC_ACCEL_ECC',
  2017-06-06 22:23:07.595623 |  'HW_NIC_ACCEL_IPSEC',
  2017-06-06 22:23:07.595634 |  'HW_NIC_ACCEL_LZS',
  2017-06-06 22:23:07.595646 |  'HW_

[Yahoo-eng-team] [Bug 1649852] Re: Concurrent calls to DELETE os-floating-ips can raise uncaught neutronclient.common.exceptions.NotFound

2017-06-06 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/410815
Committed: 
https://git.openstack.org/cgit/openstack/nova/commit/?id=d99197aece6451013d1de1f08c1af16832ee0e7e
Submitter: Jenkins
Branch:master

commit d99197aece6451013d1de1f08c1af16832ee0e7e
Author: Guillaume Espanel 
Date:   Wed Dec 14 15:29:02 2016 +0100

Catch neutronclient.NotFound on floating deletion

In some cases, trying to delete a floating IP multiple times in a short
delay can trigger an exception beacause the floating ip deletion
operation is not atomic. If neutronclient's call to delete fails with a
NotFound error, we raise a 404 error to nova's client instead of a 500.

Change-Id: I49ea7e52073148457e794d641ed17d4ef58616f8
Co-Authored-By: Stephen Finucane 
Closes-Bug: #1649852


** Changed in: nova
   Status: In Progress => Fix Released

** Changed in: nova/ocata
   Status: Confirmed => In Progress

** Changed in: nova/ocata
 Assignee: (unassigned) => Matt Riedemann (mriedem)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1649852

Title:
  Concurrent calls to DELETE os-floating-ips can raise uncaught
  neutronclient.common.exceptions.NotFound

Status in OpenStack Compute (nova):
  Fix Released
Status in OpenStack Compute (nova) ocata series:
  In Progress

Bug description:
  Description
  

  Concurrent calls to DELETE os-floating-ips/floating-ip-id can cause 
neutronclient to raise
  a neutronclient.common.exceptions.NotFound exception uncaught by Nova which 
in turn returns
  a 500 Error.

  Steps to reproduce
  ===

  Tested on a mitaka devstack :

   - source openrc
   - run this humble script :

  FIP_ID=`nova floating-ip-create | grep public | awk '{print($2)}'`
  TENANT_ID=`keystone token-get | grep " tenant_id " | awk '{print($4)}'`
  TOKEN_ID=`keystone token-get | grep " id " | awk '{print($4)}'`

  curl -g -i -X DELETE 
http://127.0.0.1:8774/v2.1/$TENANT_ID/os-floating-ips/$FIP_ID -H "User-Agent: 
python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: $TOKEN_ID"&
  curl -g -i -X DELETE 
http://127.0.0.1:8774/v2.1/$TENANT_ID/os-floating-ips/$FIP_ID -H "User-Agent: 
python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: $TOKEN_ID"&
  curl -g -i -X DELETE 
http://127.0.0.1:8774/v2.1/$TENANT_ID/os-floating-ips/$FIP_ID -H "User-Agent: 
python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: $TOKEN_ID"&
  curl -g -i -X DELETE 
http://127.0.0.1:8774/v2.1/$TENANT_ID/os-floating-ips/$FIP_ID -H "User-Agent: 
python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: $TOKEN_ID"

  
  Expected result
  

  First call to go trough should return a 202, and all other calls
  should probably return 404 or 409 if deletion is in progress but not
  500.

  
  Actual result
  ==

  Some calls to DELETE get a 500 Error response.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1649852/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1696267] [NEW] Functional test test_sync_standard_traits intermittently fails

2017-06-06 Thread Matt Riedemann
Public bug reported:

http://logs.openstack.org/98/471498/1/check/gate-nova-tox-functional-
ubuntu-xenial/c84dfef/console.html#_2017-06-06_22_23_07_594859

2017-06-06 22:23:07.594859 | 
nova.tests.functional.db.test_resource_provider.ResourceProviderTraitTestCase.test_sync_standard_traits
2017-06-06 22:23:07.594888 | 
---
2017-06-06 22:23:07.594894 | 
2017-06-06 22:23:07.594904 | Captured traceback:
2017-06-06 22:23:07.594917 | ~~~
2017-06-06 22:23:07.594934 | Traceback (most recent call last):
2017-06-06 22:23:07.594965 |   File 
"nova/tests/functional/db/test_resource_provider.py", line 1768, in 
test_sync_standard_traits
2017-06-06 22:23:07.594988 | self.assertEqual(set(std_traits), 
set(all_traits))
2017-06-06 22:23:07.595032 |   File 
"/home/jenkins/workspace/gate-nova-tox-functional-ubuntu-xenial/.tox/functional/local/lib/python2.7/site-packages/testtools/testcase.py",
 line 411, in assertEqual
2017-06-06 22:23:07.595053 | self.assertThat(observed, matcher, message)
2017-06-06 22:23:07.595095 |   File 
"/home/jenkins/workspace/gate-nova-tox-functional-ubuntu-xenial/.tox/functional/local/lib/python2.7/site-packages/testtools/testcase.py",
 line 498, in assertThat
2017-06-06 22:23:07.595107 | raise mismatch_error
2017-06-06 22:23:07.595122 | testtools.matchers._impl.MismatchError: !=:
2017-06-06 22:23:07.595136 | reference = set(['HW_CPU_X86_3DNOW',
2017-06-06 22:23:07.595147 |  'HW_CPU_X86_ABM',
2017-06-06 22:23:07.595158 |  'HW_CPU_X86_AESNI',
2017-06-06 22:23:07.595169 |  'HW_CPU_X86_ASF',
2017-06-06 22:23:07.595198 |  'HW_CPU_X86_AVX',
2017-06-06 22:23:07.595211 |  'HW_CPU_X86_AVX2',
2017-06-06 22:23:07.595223 |  'HW_CPU_X86_AVX512BW',
2017-06-06 22:23:07.595234 |  'HW_CPU_X86_AVX512CD',
2017-06-06 22:23:07.595250 |  'HW_CPU_X86_AVX512DQ',
2017-06-06 22:23:07.595262 |  'HW_CPU_X86_AVX512ER',
2017-06-06 22:23:07.595274 |  'HW_CPU_X86_AVX512F',
2017-06-06 22:23:07.595286 |  'HW_CPU_X86_AVX512PF',
2017-06-06 22:23:07.595297 |  'HW_CPU_X86_AVX512VL',
2017-06-06 22:23:07.595308 |  'HW_CPU_X86_BMI',
2017-06-06 22:23:07.595319 |  'HW_CPU_X86_BMI2',
2017-06-06 22:23:07.595331 |  'HW_CPU_X86_CLMUL',
2017-06-06 22:23:07.595342 |  'HW_CPU_X86_F16C',
2017-06-06 22:23:07.595353 |  'HW_CPU_X86_FMA3',
2017-06-06 22:23:07.595364 |  'HW_CPU_X86_FMA4',
2017-06-06 22:23:07.595375 |  'HW_CPU_X86_MMX',
2017-06-06 22:23:07.595385 |  'HW_CPU_X86_MPX',
2017-06-06 22:23:07.595416 |  'HW_CPU_X86_SGX',
2017-06-06 22:23:07.595430 |  'HW_CPU_X86_SHA',
2017-06-06 22:23:07.595441 |  'HW_CPU_X86_SSE',
2017-06-06 22:23:07.595458 |  'HW_CPU_X86_SSE2',
2017-06-06 22:23:07.595469 |  'HW_CPU_X86_SSE3',
2017-06-06 22:23:07.595482 |  'HW_CPU_X86_SSE41',
2017-06-06 22:23:07.595494 |  'HW_CPU_X86_SSE42',
2017-06-06 22:23:07.595505 |  'HW_CPU_X86_SSE4A',
2017-06-06 22:23:07.595516 |  'HW_CPU_X86_SSSE3',
2017-06-06 22:23:07.595532 |  'HW_CPU_X86_SVM',
2017-06-06 22:23:07.595544 |  'HW_CPU_X86_TBM',
2017-06-06 22:23:07.59 |  'HW_CPU_X86_TSX',
2017-06-06 22:23:07.595566 |  'HW_CPU_X86_VMX',
2017-06-06 22:23:07.595576 |  'HW_CPU_X86_XOP',
2017-06-06 22:23:07.595588 |  'HW_NIC_ACCEL_DEFLATE',
2017-06-06 22:23:07.595600 |  'HW_NIC_ACCEL_DIFFIEH',
2017-06-06 22:23:07.595612 |  'HW_NIC_ACCEL_ECC',
2017-06-06 22:23:07.595623 |  'HW_NIC_ACCEL_IPSEC',
2017-06-06 22:23:07.595634 |  'HW_NIC_ACCEL_LZS',
2017-06-06 22:23:07.595646 |  'HW_NIC_ACCEL_RSA',
2017-06-06 22:23:07.595657 |  'HW_NIC_ACCEL_SSL',
2017-06-06 22:23:07.595668 |  'HW_NIC_ACCEL_TLS',
2017-06-06 22:23:07.595679 |  'HW_NIC_DCB_ETS',
2017-06-06 22:23:07.595689 |  'HW_NIC_DCB_PFC',
2017-06-06 22:23:07.595700 |  'HW_NIC_DCB_QCN',
2017-06-06 22:23:07.595712 |  'HW_NIC_MULTIQUEUE',
2017-06-06 22:23:07.595723 |  'HW_NIC_OFFLOAD_FDF',
2017-06-06 22:23:07.595735 |  'HW_NIC_OFFLOAD_GENEVE',
2017-06-06 22:23:07.595747 |  'HW_NIC_OFFLOAD_GRE',
2017-06-06 22:23:07.595759 |  'HW_NIC_OFFLOAD_GRO',
2017-06-06 22:23:07.595770 |  'HW_NIC_OFFLOAD_GSO',
2017-06-06 22:23:07.595782 |  'HW_NIC_OFFLOAD_L2CRC',
2017-06-06 22:23:07.595794 |  'HW_NIC_OFFLOAD_LRO',
2017-06-06 22:23:07.595808 |  'HW_NIC_OFFLOAD_LSO',
2017-06-06 22:23:07.595820 |  'HW_NIC_OFFLOAD_QINQ',
2017-06-06 22:23:07.595832 |  'HW_NIC_OFFLOAD_RDMA',
2017-06-06 22:23:07.595845 |  'HW_NIC_OFFLOAD_RXHASH',
2017-06-06 22:23:07.595858 |  'HW_NIC_OFFLOAD_RXVLAN',
2017-06-06 22:23:07.595869 |  'HW_NIC_OFFLOAD_SCS',
2017-06-

[Yahoo-eng-team] [Bug 1696001] Re: nova-manage cell_v2 map_cell0 can create invalid connection URL

2017-06-06 Thread Matt Riedemann
** Changed in: nova
   Importance: Medium => High

** Also affects: nova/newton
   Importance: Undecided
   Status: New

** Also affects: nova/ocata
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1696001

Title:
  nova-manage cell_v2 map_cell0 can create invalid connection URL

Status in OpenStack Compute (nova):
  Confirmed
Status in OpenStack Compute (nova) newton series:
  New
Status in OpenStack Compute (nova) ocata series:
  New

Bug description:
  Description
  ===

  nova-manage cell_v2 map_cell0 will automatically generate a database
  connection url from the existing connection configuration setting.
  However, if the connection has query parameters like a charset
  defined, it will generate an invalid URL.

  
  Steps to reproduce
  ==
  Set the following in the nova.conf:

  [database]
  connection = mysql+pymysql://nova:passw...@db.example.com/nova?charset=utf8

  Run:

  nova-manage cell_v2 map_cell0

  
  Excepted result
  ===

  Cell0 is mapped to

  mysql+pymysql://nova:passw...@db.example.com/nova_cell0?charset=utf8

  
  Actual Result
  =

  Cell0 is mapped to

  mysql+pymysql://nova:passw...@db.example.com/nova?charset=utf8nova_cell0

  Subsequent API calls may fail because of this with exceptions like:

  2017-06-05 20:54:20.343 2197 ERROR nova.api.openstack.extensions   File 
"/usr/lib/python2.7/dist-packages/pymysql/connections.py", line 660, in __init__
  2017-06-05 20:54:20.343 2197 ERROR nova.api.openstack.extensions 
self.encoding = charset_by_name(self.charset).encoding
  2017-06-05 20:54:20.343 2197 ERROR nova.api.openstack.extensions 
AttributeError: 'NoneType' object has no attribute 'encoding'

  because utf8nova_cell0  is not a valid encoding.

  
  Environment:
  OpenStack Ocata,
  # dpkg -l | grep nova-common
  ii  nova-common  2:15.0.5-1~u16.04+mcp5   
  all  OpenStack Compute - common files

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1696001/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1696043] Re: os-hypervisors api can not list the uuid of the specified VMM

2017-06-06 Thread Sylvain Bauza
Thanks for your bug report. Unforutunatly, it doesn't really correspond
to a notion of either a regression or a technical issue, but rather a
missing feature.

We have a specific process for approving feature requests thru Launchpad
Blueprints and what we call 'specs', ie. formalized textual RFEs
describing the problem description and the proposal.

FWIW, what you're asking for is actually already approved for our Pike 
timeframe :
https://blueprints.launchpad.net/nova/+spec/service-hyper-uuid-in-api
http://specs.openstack.org/openstack/nova-specs/specs/pike/approved/service-hyper-uuid-in-api.html

I'd suggest you helping by at least reviewing the current series where
some patches have already merged
https://review.openstack.org/#/q/topic:bp/service-hyper-uuid-in-api,n,z


** Changed in: nova
   Status: New => Invalid

** Changed in: nova
   Importance: Undecided => Wishlist

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1696043

Title:
  os-hypervisors api can not list the uuid of the specified VMM

Status in OpenStack Compute (nova):
  Invalid

Bug description:
  os-hypervisors api just cann't list the host's uuid.
  we could find uuid field in nova.compute.

     created_at: 2017-05-17 05:50:51
     updated_at: 2017-05-27 07:45:30
     deleted_at: NULL
     id: 2
     service_id: NULL
  vcpus: 2
  memory_mb: 3791
   local_gb: 98
     vcpus_used: 0
     memory_mb_used: 512
  local_gb_used: 0
    hypervisor_type: QEMU
     hypervisor_version: 2003000
   cpu_info: {"vendor": "Intel", "model": "Westmere", "arch": 
"x86_64", "features": ["pge", "avx", "clflush", "sep", "syscall", "vme", "msr", 
"fsgsbase", "xsave", "vmx", "erms", "cmov", "smep", "pcid", "pat", "lm", "tsc", 
"nx", "fxsr", "sse4.1", "pae", "sse4.2", "pclmuldq", "fma", "mmx", "osxsave", 
"cx8", "mce", "de", "rdtscp", "ht", "pse", "lahf_lm", "popcnt", "mca", 
"pdpe1gb", "apic", "sse", "f16c", "ds", "invtsc", "pni", "aes", "sse2", "ss", 
"hypervisor", "ssse3", "fpu", "cx16", "pse36", "mtrr", "movbe", "rdrand", 
"x2apic"], "topology": {"cores": 2, "cells": 1, "threads": 1, "sockets": 1}}
   disk_available_least: 82
    free_ram_mb: 3279
   free_disk_gb: 98
   current_workload: 0
    running_vms: 0
    hypervisor_hostname: compute
    deleted: 0
    host_ip: 192.168.2.101
    supported_instances: [["i686", "qemu", "hvm"], ["i686", "kvm", "hvm"], 
["x86_64", "qemu", "hvm"], ["x86_64", "kvm", "hvm"]]
  pci_stats: {"nova_object.version": "1.1", "nova_object.changes": 
["objects"], "nova_object.name": "PciDevicePoolList", "nova_object.data": 
{"objects": []}, "nova_object.namespace": "nova"}
    metrics: []
    extra_resources: NULL
  stats: {}
  numa_topology: {"nova_object.version": "1.2", "nova_object.changes": 
["cells"], "nova_object.name": "NUMATopology", "nova_object.data": {"cells": 
[{"nova_object.version": "1.2", "nova_object.changes": ["cpu_usage", 
"memory_usage", "cpuset", "mempages", "pinned_cpus", "memory", "siblings", 
"id"], "nova_object.name": "NUMACell", "nova_object.data": {"cpu_usage": 0, 
"memory_usage": 0, "cpuset": [0, 1], "pinned_cpus": [], "siblings": [], 
"memory": 4095, "mempages": [{"nova_object.version": "1.1", 
"nova_object.changes": ["total", "used", "reserved", "size_kb"], 
"nova_object.name": "NUMAPagesTopology", "nova_object.data": {"used": 0, 
"total": 1048462, "reserved": 0, "size_kb": 4}, "nova_object.namespace": 
"nova"}, {"nova_object.version": "1.1", "nova_object.changes": ["total", 
"used", "reserved", "size_kb"], "nova_object.name": "NUMAPagesTopology", 
"nova_object.data": {"used": 0, "total": 0, "reserved": 0, "size_kb": 2048}, 
"nova_object.namespace": "nova"}, {"nova_object.version": "1.1", 
"nova_object.changes": ["total", "used", "reserved", "size_kb"], 
"nova_object.name": "NUMAPagesTopology", "nova_object.data": {"used": 0, 
"total": 0, "reserved": 0, "size_kb": 1048576}, "nova_object.namespace": 
"nova"}], "id": 0}, "nova_object.namespace": "nova"}]}, 
"nova_object.namespace": "nova"}
   host: compute
   ram_allocation_ratio: 0
   cpu_allocation_ratio: 0
   uuid: cbf2b233-3645-45e3-a7f5-588857035531
  disk_allocation_ratio: 0

  but the List Hypervisors Details api in 
https://developer.openstack.org/api-ref/compute/ couldn't list the uuid.
  Here is the code of nova/api/openstack/compute/hypervisors.py
   60 for field in ('vcpus', 'memory_mb', 'local_gb', 'vcpus_used',
   61   'memory_mb_used', 'local_gb_used',
   62   'hypervisor_type', 'hypervisor_version',
   63   'free_ram_mb', 'free_disk_gb', 
'current_workload',
   64   

[Yahoo-eng-team] [Bug 1694371] Re: Timeout while waiting for network-vif-plugged event during server rebuild

2017-06-06 Thread Matt Riedemann
** Changed in: nova
   Status: New => Confirmed

** Changed in: heat
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1694371

Title:
  Timeout while waiting for network-vif-plugged event during server
  rebuild

Status in heat:
  Invalid
Status in neutron:
  New
Status in OpenStack Compute (nova):
  Confirmed

Bug description:
  It seems like the server is going to ERROR state during rebuild.

  traceback:

  2017-05-28 04:34:37.767757 | 2017-05-28 04:34:37.767 | Captured traceback:
  2017-05-28 04:34:37.768828 | 2017-05-28 04:34:37.768 | ~~~
  2017-05-28 04:34:37.770099 | 2017-05-28 04:34:37.769 | b'Traceback (most 
recent call last):'
  2017-05-28 04:34:37.771108 | 2017-05-28 04:34:37.770 | b'  File 
"/opt/stack/new/heat/heat_integrationtests/functional/test_snapshot_restore.py",
 line 74, in test_stack_snapshot_restore'
  2017-05-28 04:34:37.772364 | 2017-05-28 04:34:37.772 | b'
self.stack_restore(stack_identifier, snapshot_id)'
  2017-05-28 04:34:37.773407 | 2017-05-28 04:34:37.773 | b'  File 
"/opt/stack/new/heat/heat_integrationtests/common/test.py", line 626, in 
stack_restore'
  2017-05-28 04:34:37.774541 | 2017-05-28 04:34:37.774 | b'
self._wait_for_stack_status(stack_id, wait_for_status)'
  2017-05-28 04:34:37.775568 | 2017-05-28 04:34:37.775 | b'  File 
"/opt/stack/new/heat/heat_integrationtests/common/test.py", line 357, in 
_wait_for_stack_status'
  2017-05-28 04:34:37.776642 | 2017-05-28 04:34:37.776 | b'
fail_regexp):'
  2017-05-28 04:34:37.778354 | 2017-05-28 04:34:37.778 | b'  File 
"/opt/stack/new/heat/heat_integrationtests/common/test.py", line 321, in 
_verify_status'
  2017-05-28 04:34:37.779448 | 2017-05-28 04:34:37.779 | b'
stack_status_reason=stack.stack_status_reason)'
  2017-05-28 04:34:37.780644 | 2017-05-28 04:34:37.780 | 
b"heat_integrationtests.common.exceptions.StackBuildErrorException: Stack 
StackSnapshotRestoreTest-1374582671/7fb8f800-1545-4e34-a6fa-3e2adbf4443a is in 
RESTORE_FAILED status due to 'Error: resources.my_server: Rebuilding server 
failed, status 'ERROR''"
  2017-05-28 04:34:37.782119 | 2017-05-28 04:34:37.781 | b''

  
  Noticed at:

  http://logs.openstack.org/16/462216/16/check/gate-heat-dsvm-
  functional-convg-mysql-lbaasv2-py35-ubuntu-
  xenial/17c2da9/console.html#_2017-05-28_04_34_37_753094

  
  Looks like a nova issue from the below traceback.

  http://logs.openstack.org/16/462216/16/check/gate-heat-dsvm-
  functional-convg-mysql-lbaasv2-py35-ubuntu-
  xenial/17c2da9/logs/screen-n-cpu.txt.gz?level=ERROR#_May_28_04_14_49_044455

  
  May 28 04:14:49.042877 ubuntu-xenial-osic-cloud1-s3700-9024798 
nova-compute[26709]: ERROR nova.compute.manager [instance: 
45105d34-b970-4ced-968c-a1c4ead5b282]   File 
"/opt/stack/new/nova/nova/compute/manager.py", line 6758, in 
_error_out_instance_on_exception
  May 28 04:14:49.042955 ubuntu-xenial-osic-cloud1-s3700-9024798 
nova-compute[26709]: ERROR nova.compute.manager [instance: 
45105d34-b970-4ced-968c-a1c4ead5b282] yield
  May 28 04:14:49.043027 ubuntu-xenial-osic-cloud1-s3700-9024798 
nova-compute[26709]: ERROR nova.compute.manager [instance: 
45105d34-b970-4ced-968c-a1c4ead5b282]   File 
"/opt/stack/new/nova/nova/compute/manager.py", line 2814, in rebuild_instance
  May 28 04:14:49.043100 ubuntu-xenial-osic-cloud1-s3700-9024798 
nova-compute[26709]: ERROR nova.compute.manager [instance: 
45105d34-b970-4ced-968c-a1c4ead5b282] bdms, recreate, on_shared_storage, 
preserve_ephemeral)
  May 28 04:14:49.043197 ubuntu-xenial-osic-cloud1-s3700-9024798 
nova-compute[26709]: ERROR nova.compute.manager [instance: 
45105d34-b970-4ced-968c-a1c4ead5b282]   File 
"/opt/stack/new/nova/nova/compute/manager.py", line 2855, in 
_do_rebuild_instance_with_claim
  May 28 04:14:49.043299 ubuntu-xenial-osic-cloud1-s3700-9024798 
nova-compute[26709]: ERROR nova.compute.manager [instance: 
45105d34-b970-4ced-968c-a1c4ead5b282] self._do_rebuild_instance(*args, 
**kwargs)
  May 28 04:14:49.043384 ubuntu-xenial-osic-cloud1-s3700-9024798 
nova-compute[26709]: ERROR nova.compute.manager [instance: 
45105d34-b970-4ced-968c-a1c4ead5b282]   File 
"/opt/stack/new/nova/nova/compute/manager.py", line 2977, in 
_do_rebuild_instance
  May 28 04:14:49.043458 ubuntu-xenial-osic-cloud1-s3700-9024798 
nova-compute[26709]: ERROR nova.compute.manager [instance: 
45105d34-b970-4ced-968c-a1c4ead5b282] self._rebuild_default_impl(**kwargs)
  May 28 04:14:49.043534 ubuntu-xenial-osic-cloud1-s3700-9024798 
nova-compute[26709]: ERROR nova.compute.manager [instance: 
45105d34-b970-4ced-968c-a1c4ead5b282]   File 
"/opt/stack/new/nova/nova/compute/manager.py", line 2714, in 
_rebuild_default_impl
  May 28 04:14:49.043611 ubuntu-xenial-osic-cloud1-s3700-9024798 
nova-compute[26709]: ERROR nova.compute.manager [instance: 
45105d34-b97

[Yahoo-eng-team] [Bug 1696221] [NEW] Unnecessary instance lazy-loads during rebuild

2017-06-06 Thread Matt Riedemann
Public bug reported:

The rebuild code in the compute manager also handles evacuate. Rebuild
is rebuild on the same host, no migration. Evacuate is rebuild the
instance on another host, and has a migration context.

This code:

https://github.com/openstack/nova/blob/e01ae75d52900d96355dfcb39ef9b136f0c0d5c4/nova/compute/manager.py#L2718

Is using the mutated_migration_context() context manager which lazy-
loads numa_topology, pci_requests and pci_devices and then, since
self.migration_context isn't set on the instance, yields as a noop.

Seen here:

http://logs.openstack.org/82/471082/1/gate/gate-novaclient-dsvm-
functional-neutron-ubuntu-
xenial/796acb7/logs/screen-n-cpu.txt.gz#_Jun_06_13_14_02_547424

Jun 06 13:14:02.547424 ubuntu-xenial-infracloud-chocolate-9158824 
nova-compute[20994]: DEBUG nova.objects.instance [None 
req-5b3770c1-d332-4875-8933-97de8a9890b4 admin admin] Lazy-loading 
'pci_requests' on Instance uuid 573258a4-9416-4e13-a765-7c90683f3526 
{{(pid=20994) obj_load_attr /opt/stack/new/nova/nova/objects/instance.py:1038}}
Jun 06 13:14:02.562243 ubuntu-xenial-infracloud-chocolate-9158824 
nova-compute[20994]: DEBUG nova.objects.instance [None 
req-5b3770c1-d332-4875-8933-97de8a9890b4 admin admin] Lazy-loading 
'pci_devices' on Instance uuid 573258a4-9416-4e13-a765-7c90683f3526 
{{(pid=20994) obj_load_attr /opt/stack/new/nova/nova/objects/instance.py:1038}}
Jun 06 13:14:02.577132 ubuntu-xenial-infracloud-chocolate-9158824 
nova-compute[20994]: DEBUG nova.objects.instance [None 
req-5b3770c1-d332-4875-8933-97de8a9890b4 admin admin] Lazy-loading 
'migration_context' on Instance uuid 573258a4-9416-4e13-a765-7c90683f3526 
{{(pid=20994) obj_load_attr /opt/stack/new/nova/nova/objects/instance.py:1038}}
Jun 06 13:14:02.590554 ubuntu-xenial-infracloud-chocolate-9158824 
nova-compute[20994]: DEBUG nova.objects.instance [None 
req-5b3770c1-d332-4875-8933-97de8a9890b4 admin admin] [instance: 
573258a4-9416-4e13-a765-7c90683f3526] Trying to apply a migration context that 
does not seem to be set for this instance {{(pid=20994) apply_migration_context 
/opt/stack/new/nova/nova/objects/instance.py:977}}

This is wasteful as each lazy-loaded field is a round trip to the
database via conductor to set the field. If self.migration_context isn't
set, mutated_migration_context() should just yield and return.

** Affects: nova
 Importance: Undecided
 Status: Triaged


** Tags: rebuild

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1696221

Title:
  Unnecessary instance lazy-loads during rebuild

Status in OpenStack Compute (nova):
  Triaged

Bug description:
  The rebuild code in the compute manager also handles evacuate. Rebuild
  is rebuild on the same host, no migration. Evacuate is rebuild the
  instance on another host, and has a migration context.

  This code:

  
https://github.com/openstack/nova/blob/e01ae75d52900d96355dfcb39ef9b136f0c0d5c4/nova/compute/manager.py#L2718

  Is using the mutated_migration_context() context manager which lazy-
  loads numa_topology, pci_requests and pci_devices and then, since
  self.migration_context isn't set on the instance, yields as a noop.

  Seen here:

  http://logs.openstack.org/82/471082/1/gate/gate-novaclient-dsvm-
  functional-neutron-ubuntu-
  xenial/796acb7/logs/screen-n-cpu.txt.gz#_Jun_06_13_14_02_547424

  Jun 06 13:14:02.547424 ubuntu-xenial-infracloud-chocolate-9158824 
nova-compute[20994]: DEBUG nova.objects.instance [None 
req-5b3770c1-d332-4875-8933-97de8a9890b4 admin admin] Lazy-loading 
'pci_requests' on Instance uuid 573258a4-9416-4e13-a765-7c90683f3526 
{{(pid=20994) obj_load_attr /opt/stack/new/nova/nova/objects/instance.py:1038}}
  Jun 06 13:14:02.562243 ubuntu-xenial-infracloud-chocolate-9158824 
nova-compute[20994]: DEBUG nova.objects.instance [None 
req-5b3770c1-d332-4875-8933-97de8a9890b4 admin admin] Lazy-loading 
'pci_devices' on Instance uuid 573258a4-9416-4e13-a765-7c90683f3526 
{{(pid=20994) obj_load_attr /opt/stack/new/nova/nova/objects/instance.py:1038}}
  Jun 06 13:14:02.577132 ubuntu-xenial-infracloud-chocolate-9158824 
nova-compute[20994]: DEBUG nova.objects.instance [None 
req-5b3770c1-d332-4875-8933-97de8a9890b4 admin admin] Lazy-loading 
'migration_context' on Instance uuid 573258a4-9416-4e13-a765-7c90683f3526 
{{(pid=20994) obj_load_attr /opt/stack/new/nova/nova/objects/instance.py:1038}}
  Jun 06 13:14:02.590554 ubuntu-xenial-infracloud-chocolate-9158824 
nova-compute[20994]: DEBUG nova.objects.instance [None 
req-5b3770c1-d332-4875-8933-97de8a9890b4 admin admin] [instance: 
573258a4-9416-4e13-a765-7c90683f3526] Trying to apply a migration context that 
does not seem to be set for this instance {{(pid=20994) apply_migration_context 
/opt/stack/new/nova/nova/objects/instance.py:977}}

  This is wasteful as each lazy-loaded field is a round trip to the
  database via conductor to set the field. 

[Yahoo-eng-team] [Bug 1691195] Re: Can't live-migrate after "round-trip" volume-upate

2017-06-06 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/465205
Committed: 
https://git.openstack.org/cgit/openstack/nova/commit/?id=a8a4a8ea7b8e6c85273ddb02d34d6af1740b183f
Submitter: Jenkins
Branch:master

commit a8a4a8ea7b8e6c85273ddb02d34d6af1740b183f
Author: Artom Lifshitz 
Date:   Wed May 17 00:22:34 2017 +

Use VIR_DOMAIN_BLOCK_REBASE_COPY_DEV when rebasing

Previously, in swap_volume, the VIR_DOMAIN_BLOCK_REBASE_COPY_DEV flag
was not passed to virDomainBlockRebase. In the case of iSCSI-backed
disks, this caused the XML to change from 
to . This was a problem because
/dev/iscsi/lun is not a regular file. This patch passes the
VIR_DOMAIN_BLOCK_REBASE_COPY_DEV flag to virDomainBlockRebase, causing
the correct  to be generated upon
volume-update.

Change-Id: I868a0dae0baf8cded9c7c5807ea63ffc5eec0c5e
Closes-bug: 1691195


** Changed in: nova
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1691195

Title:
  Can't live-migrate after "round-trip" volume-upate

Status in OpenStack Compute (nova):
  Fix Released
Status in OpenStack Compute (nova) newton series:
  In Progress
Status in OpenStack Compute (nova) ocata series:
  In Progress

Bug description:
  Description
  ===

  If an instance has had an attached volume volume-updated twice in a
  "round-trip" - ie, volume-update $vol1 $vol2, then volume-update $vol2
  $vol1 - it cannot be live-migrated.

  Steps to reproduce
  ==

  1. Create two iscsi volumes.
     # cinder create --name test_vol1 --volume-type iscsi 1
     # cinder create --name test_vol2 --volume-type iscsi 1

     (--volume-type iscsi isn't mandatory - in my devstack environment there
     is no iscsi volume-type, but that doesn't stop me from reproducing this
     bug)

  2. Boot an instance.
     # nova boot --flavor 1 --image $imageid --nic net-id=$netid testvm1

  3. Attach one iscsi volume to testvm1.
     # nova volume-attach testvm1 $test_vol1

  4. Do volume-update to swap volume to 2nd one. (1st time volume-update)
     # nova volume-update testvm1 $test_vol1 $test_vol2

  5. Do volume-update again to swap volume back to the 1st one. (2nd time
 volume-update)
     # nova volume-update testvm1 $test_vol2 $test_vol1

  6. Live migrate instance to other compute node.
     # nova live-migration testvm1

  Expected result
  ===

  Live migration succeeds.

  Actual result
  =

  Live migration fails with:

  Apr 27 10:32:14 multi9h-3 nova-compute: File "/usr/lib64/python2.7
  /site-packages/libvirt.py", line 1939, in migrateToURI3

  Apr 27 10:32:14 multi9h-3 nova-compute: if ret == -1: raise
  libvirtError ('virDomainMigrateToURI3() failed', dom=self)

  Apr 27 10:32:14 multi9h-3 nova-compute: libvirtError: missing source
  information for device vdb

  Environment
  ===

  This has been originally reported [1] in Red Hat OSP 9 (Mitaka) and is
  reproducible on devstack master as well.

  Additional information
  ==

  There are two things going on here.

  1. When performing the volume-update, the libvirt driver calls
  virDomainBlockRebase without the VIR_DOMAIN_BLOCK_REBASE_COPY_DEV flag
  [2], meaning the device XML changes from  to
  . This is a problem because /dev/iscsi/lun
  isn't a regular file, and causes the above error, except you need the
  "round-trip" volume-update to trigger it. Why? Because:

  2. The serial number isn't updated when doing volume-update, and
  there's a bit of live-migration code [3] that checks for serial
  numbers before updating the XML. If the serial numbers don't match,
  the XML isn't updated, and libvirt doesn't notice that /dev/iscsi/lun
  isn't a file.

  [1] https://bugzilla.redhat.com/show_bug.cgi?id=1446446
  [2] http://libvirt.org/html/libvirt-libvirt-domain.html#virDomainBlockRebase
  [3] 
https://github.com/openstack/nova/blob/master/nova/virt/libvirt/migration.py#L158

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1691195/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1696006] Re: Libvirt fails to detach network interface with Linux bridge

2017-06-06 Thread Miguel Lavalle
*** This bug is a duplicate of bug 1696125 ***
https://bugs.launchpad.net/bugs/1696125

** No longer affects: neutron

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1696006

Title:
  Libvirt fails to detach network interface with Linux bridge

Status in OpenStack Compute (nova):
  New

Bug description:
  We are seeing a spike of failures in job gate-tempest-dsvm-neutron-
  linuxbridge-ubuntu-xenial, test
  tempest.scenario.test_network_basic_ops.TestNetworkBasicOps.test_hotplug_nic.

  As of this writing, there are 48 instances of this failure in Kibana:

  
http://logstash.openstack.org/#/dashboard/file/logstash.json?query=message:%5C%22Failed%20to%20delete%20resource%5C%22%20AND%20message:%5C%22within%20the%20required%20time%20%5C%22%20AND%20message:%5C%22TestNetworkBasicOps:_run_cleanups%5C%22%20AND%20tags:%5C%22console%5C%22&from=7d

  I analyzed several cases and all seem to be the same. Compute manager
  calls libvirt to detach the interface and gets a failure (in this
  example, tap tap05567d09-b3 is being detached), so it raises an
  InterfaceDetachFailed exception:

  http://paste.openstack.org/show/611347/

  The code involved is here:

  https://github.com/openstack/nova/blob/master/nova/compute/manager.py#L5224

  Since the exception is raised, the call to Neutron to delete the port
  is never executed:
  https://github.com/openstack/nova/blob/master/nova/compute/manager.py#L5227.
  Since the tempest test was setup to wait for the port deletion to
  ascertain success of the interface removal
  
(https://github.com/openstack/tempest/blob/master/tempest/scenario/test_network_basic_ops.py#L253)
  a timeout occurs and the test / job fails.

  It is worth noting that the Linuxbridge agent actually detected the
  removal of the interface: http://paste.openstack.org/show/611346/.
  Please note that tap05567d09-b3 shows up in the removed set of the
  changes detected by the agent

  It is also worth noting that this failure starts to show up in Kibana
  on 5/31/2017

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1696006/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1696098] Re: Race in deleting ports during Tempest Runs

2017-06-06 Thread Matt Riedemann
*** This bug is a duplicate of bug 1696125 ***
https://bugs.launchpad.net/bugs/1696125

** This bug is no longer a duplicate of bug 1696006
   Libvirt fails to detach network interface with Linux bridge
** This bug has been marked a duplicate of bug 1696125
   Detach interface failed - Unable to detach from guest transient domain (pike)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1696098

Title:
  Race in deleting ports during Tempest Runs

Status in neutron:
  Confirmed

Bug description:
  This is similar to https://bugs.launchpad.net/tempest/+bug/1357055
  which is closed (and honestly would be confusing to make this the same
  bug).

  When trying to tear down subnets, they sometimes fail because the port
  still exists. However there is no indication that the port delete
  failed.

  2017-06-05 18:38:20.846777 | Captured traceback-1:
  2017-06-05 18:38:20.846795 | ~
  2017-06-05 18:38:20.846817 | Traceback (most recent call last):
  2017-06-05 18:38:20.846853 |   File 
"tempest/lib/common/utils/test_utils.py", line 84, in 
call_and_ignore_notfound_exc
  2017-06-05 18:38:20.846890 | return func(*args, **kwargs)
  2017-06-05 18:38:20.846926 |   File 
"tempest/lib/services/network/subnets_client.py", line 52, in delete_subnet
  2017-06-05 18:38:20.846949 | return self.delete_resource(uri)
  2017-06-05 18:38:20.846981 |   File 
"tempest/lib/services/network/base.py", line 41, in delete_resource
  2017-06-05 18:38:20.847004 | resp, body = self.delete(req_uri)
  2017-06-05 18:38:20.847034 |   File "tempest/lib/common/rest_client.py", 
line 301, in delete
  2017-06-05 18:38:20.847064 | return self.request('DELETE', url, 
extra_headers, headers, body)
  2017-06-05 18:38:20.847094 |   File "tempest/lib/common/rest_client.py", 
line 659, in request
  2017-06-05 18:38:20.847117 | self._error_checker(resp, resp_body)
  2017-06-05 18:38:20.847149 |   File "tempest/lib/common/rest_client.py", 
line 780, in _error_checker
  2017-06-05 18:38:20.847175 | raise exceptions.Conflict(resp_body, 
resp=resp)
  2017-06-05 18:38:20.847208 | tempest.lib.exceptions.Conflict: An object 
with that identifier already exists
  2017-06-05 18:38:20.847274 | Details: {u'detail': u'', u'message': 
u'Unable to complete operation on subnet 276de24c-4560-47f5-9feb-2964314d7814: 
One or more ports have an IP allocation from this subnet.', u'type': 
u'SubnetInUse'}

  http://logs.openstack.org/53/469253/1/gate/gate-tempest-dsvm-neutron-
  linuxbridge-ubuntu-
  xenial/64416cc/console.html#_2017-06-05_18_38_20_847274

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1696098/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1694772] Re: test_keepalived_multiple_sighups_does_not_forfeit_mastership fails because of "AttributeError: 'module' object has no attribute 'LINUX_DEV_LEN'"

2017-06-06 Thread Ihar Hrachyshka
** Changed in: neutron
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1694772

Title:
  test_keepalived_multiple_sighups_does_not_forfeit_mastership fails
  because of "AttributeError: 'module' object has no attribute
  'LINUX_DEV_LEN'"

Status in neutron:
  Fix Released

Bug description:
  http://logs.openstack.org/82/465182/1/check/gate-neutron-dsvm-
  fullstack-ubuntu-xenial/a0a5ab4/logs/dsvm-fullstack-
  
logs/TestHAL3Agent.test_keepalived_multiple_sighups_does_not_forfeit_mastership/neutron-l3-agent
  --2017-05-31--17-35-57-322793.txt.gz?level=TRACE

  2017-05-31 17:36:06.311 32260 ERROR neutron.agent.l3.router_info 
[req-2ccd326a-186e-4c00-85cc-17ed633b93dc - - - - -] 'module' object has no 
attribute 'LINUX_DEV_LEN'
  2017-05-31 17:36:06.311 32260 ERROR neutron.agent.l3.router_info Traceback 
(most recent call last):
  2017-05-31 17:36:06.311 32260 ERROR neutron.agent.l3.router_info   File 
"/opt/stack/new/neutron/neutron/common/utils.py", line 287, in call
  2017-05-31 17:36:06.311 32260 ERROR neutron.agent.l3.router_info return 
func(*args, **kwargs)
  2017-05-31 17:36:06.311 32260 ERROR neutron.agent.l3.router_info   File 
"/opt/stack/new/neutron/neutron/agent/l3/router_info.py", line 1094, in process
  2017-05-31 17:36:06.311 32260 ERROR neutron.agent.l3.router_info 
self.process_external(agent)
  2017-05-31 17:36:06.311 32260 ERROR neutron.agent.l3.router_info   File 
"/opt/stack/new/neutron/neutron/agent/l3/router_info.py", line 869, in 
process_external
  2017-05-31 17:36:06.311 32260 ERROR neutron.agent.l3.router_info 
self._process_external_gateway(ex_gw_port, agent.pd)
  2017-05-31 17:36:06.311 32260 ERROR neutron.agent.l3.router_info   File 
"/opt/stack/new/neutron/neutron/agent/l3/router_info.py", line 750, in 
_process_external_gateway
  2017-05-31 17:36:06.311 32260 ERROR neutron.agent.l3.router_info 
interface_name = self.get_external_device_name(ex_gw_port_id)
  2017-05-31 17:36:06.311 32260 ERROR neutron.agent.l3.router_info   File 
"/opt/stack/new/neutron/neutron/tests/common/agents/l3_agent.py", line 96, in 
get_external_device_name
  2017-05-31 17:36:06.311 32260 ERROR neutron.agent.l3.router_info 
[:iptables_firewall.LINUX_DEV_LEN])
  2017-05-31 17:36:06.311 32260 ERROR neutron.agent.l3.router_info 
AttributeError: 'module' object has no attribute 'LINUX_DEV_LEN'

  This is probably Newton only.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1694772/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1693353] Re: resource provider links list shows 'traits' in all microversions and should not

2017-06-06 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/468923
Committed: 
https://git.openstack.org/cgit/openstack/nova/commit/?id=72960a33e094f74de76f23d75dbaaae07332fa6f
Submitter: Jenkins
Branch:master

commit 72960a33e094f74de76f23d75dbaaae07332fa6f
Author: Chris Dent 
Date:   Mon May 29 16:38:59 2017 +

[placement] adjust resource provider links by microversion

The resource provider representation includes links to other related
resources. Those links should vary depending on microversion as some
of the related resources did not show up until a later microversion.

This change makes it so 'aggregates' show up at microverison 1.1 and
beyond and traits in microversion 1.6 and beyond. A new gabbit has
been added, resource-provider-links which exercises this. Only the
single resource provider representation is tested because the same
code is used for single and collection representations.

Change-Id: Ife64922ee91a775fabdcf718e6eb0e0c7ddfde7a
Closes-Bug: #1693353


** Changed in: nova
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1693353

Title:
  resource provider links list shows 'traits' in all microversions and
  should not

Status in OpenStack Compute (nova):
  Fix Released

Bug description:
  When listing single or multiple resource providers, the JSON response
  includes a list of 'links' with each provider. These link to
  'inventories', 'aggregates', 'usages' and 'traits'. Since 'traits'
  only showed up in microversion 1.6 the link to them should only be
  presented if the microversion is 1.6 or above.

  The change to fix this is in the '_serialize_links' method in
  nova.api.openstack.placement.handlers.resource_provider.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1693353/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1696176] [NEW] Add default routes for IPv4 and IPv6 only to ifcfg-* files and not to route-* or route6-* files in sysconfig

2017-06-06 Thread Andreas Karis
Public bug reported:

Since f38fa41317602908139aa96e930b634f65e39555 , default routes get
added to both ifcfg-* and route-* and route6-* files. (ii) Default
routes should only go to ifcfg-* files, otherwise the information is
redundant. (i) Also, in dual stack networks, this redundant "feature"
isn't working correctly, only the IPv6 route is added to both route6-*
and ifcfg-*, but not the IPv4 route.

(i) First of all, let me explain why only the IPv6 route was added to
route6-* and not the IPv4 route to route-*

sysconfig.py
(...)
for route in subnet.get('routes', []):
is_ipv6 = subnet.get('ipv6')

if _is_default_route(route):
if (
(subnet.get('ipv4') and
 route_cfg.has_set_default_ipv4) or
(subnet.get('ipv6') and
 route_cfg.has_set_default_ipv6)
):
raise ValueError("Duplicate declaration of default "
 "route found for interface '%s'"
 % (iface_cfg.name))
# NOTE(harlowja): ipv6 and ipv4 default gateways
gw_key = 'GATEWAY0'
nm_key = 'NETMASK0'
addr_key = 'ADDRESS0'
(...)

The above will obviously overwrite GATEWAY0, NETMASK0, ADDRESS0 when
there is an IPv4 default route and an IPv6 default route.

(ii) Now, interestingly, we don't want to add these routes to the
route-* and route6-* files, because this would only result in duplicate
default route declaration (we only need it in the ifcfg-* files, not in
the route-* or route6-*).

Which means that this can be fixed by changing indentation for the following 
lines (moving all lines marked with "+" exactly 4 characters to the right). 
This moves the route_cfg part into the "else" condition:
~~~
cd /usr/lib/python2.7/site-packages/cloudinit/net
[root@rhel-test net]# diff -u sysconfig.py.back sysconfig.py
--- sysconfig.py.back   2017-06-06 12:39:25.857595506 -0400
+++ sysconfig.py2017-06-06 12:40:19.059595506 -0400
@@ -372,11 +372,11 @@
 nm_key = 'NETMASK%s' % route_cfg.last_idx
 addr_key = 'ADDRESS%s' % route_cfg.last_idx
 route_cfg.last_idx += 1
-for (old_key, new_key) in [('gateway', gw_key),
-   ('netmask', nm_key),
-   ('network', addr_key)]:
-if old_key in route:
-route_cfg[new_key] = route[old_key]
+for (old_key, new_key) in [('gateway', gw_key),
+   ('netmask', nm_key),
+   ('network', addr_key)]:
+if old_key in route:
+route_cfg[new_key] = route[old_key]
 
 @classmethod
 def _render_bonding_opts(cls, iface_cfg, iface):
~~~

The above means that a route will only be added to the route_cfg array
if it is not a default route.

** Affects: cloud-init
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to cloud-init.
https://bugs.launchpad.net/bugs/1696176

Title:
  Add default routes for IPv4 and IPv6 only to ifcfg-* files and not to
  route-* or route6-* files in sysconfig

Status in cloud-init:
  New

Bug description:
  Since f38fa41317602908139aa96e930b634f65e39555 , default routes get
  added to both ifcfg-* and route-* and route6-* files. (ii) Default
  routes should only go to ifcfg-* files, otherwise the information is
  redundant. (i) Also, in dual stack networks, this redundant "feature"
  isn't working correctly, only the IPv6 route is added to both route6-*
  and ifcfg-*, but not the IPv4 route.

  (i) First of all, let me explain why only the IPv6 route was added to
  route6-* and not the IPv4 route to route-*

  sysconfig.py
  (...)
  for route in subnet.get('routes', []):
  is_ipv6 = subnet.get('ipv6')

  if _is_default_route(route):
  if (
  (subnet.get('ipv4') and
   route_cfg.has_set_default_ipv4) or
  (subnet.get('ipv6') and
   route_cfg.has_set_default_ipv6)
  ):
  raise ValueError("Duplicate declaration of default "
   "route found for interface '%s'"
   % (iface_cfg.name))
  # NOTE(harlowja): ipv6 and ipv4 default gateways
  gw_key = 'GATEWAY0'
  nm_key = 'NETMASK0'
  addr_key = 'ADDRESS0'
  (...)

  The above will obviously overwrite GAT

[Yahoo-eng-team] [Bug 1685185] Re: disconnect_volume not called when rebase failures are encountered during swap_volume

2017-06-06 Thread Matt Riedemann
** Changed in: nova
   Importance: Undecided => Medium

** Also affects: nova/newton
   Importance: Undecided
   Status: New

** Also affects: nova/ocata
   Importance: Undecided
   Status: New

** Changed in: nova/newton
   Status: New => In Progress

** Changed in: nova/ocata
   Status: New => In Progress

** Changed in: nova/newton
   Importance: Undecided => Medium

** Changed in: nova/ocata
   Importance: Undecided => Medium

** Changed in: nova/newton
 Assignee: (unassigned) => Lee Yarwood (lyarwood)

** Changed in: nova/ocata
 Assignee: (unassigned) => Lee Yarwood (lyarwood)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1685185

Title:
  disconnect_volume not called when rebase failures are encountered
  during swap_volume

Status in OpenStack Compute (nova):
  Fix Released
Status in OpenStack Compute (nova) newton series:
  In Progress
Status in OpenStack Compute (nova) ocata series:
  In Progress

Bug description:
  Description
  ===

  At present disconnect_volume is not called when rebase failures are
  encountered during swap_volume. This results in the new volume
  remaining connected to the compute host prior to terminate_connection
  then being called. This can in turn lead to left over devices
  remaining on the compute host for some volume backends such as
  LVM/iSCSI.

  Steps to reproduce
  ==

  Downstream, the easiest way to reproduce this is via
  https://bugzilla.redhat.com/show_bug.cgi?id=1401755 :

  # sudo setenforce 1
  # nova update-volume ${instance_uuid} \
   ${attached_NFS_volume_id} \
   ${unattached_iSCSI_volume_id}

  Upstream, I've been unable to get devstack to even work correctly with
  SELinux in enforcing mode so I've been unable to reproduce the
  rollback this way.

  Expected result
  ===

  New volume disconnected from compute host.

  Actual result
  =

  New volume remains connected to compute host.

  Environment
  ===
  1. Exact version of OpenStack you are running. See the following
list for all releases: http://docs.openstack.org/releases/

 N/A

  2. Which hypervisor did you use?
 (For example: Libvirt + KVM, Libvirt + XEN, Hyper-V, PowerKVM, ...)
 What's the version of that?

 Libvirt + KVM

  2. Which storage type did you use?
 (For example: Ceph, LVM, GPFS, ...)
 What's the version of that?

 NFS + LVM/iSCSI

  3. Which networking type did you use?
 (For example: nova-network, Neutron with OpenVSwitch, ...)

 N/A

  Logs & Configs
  ==

  Example Newton trace :

  2017-04-12 09:37:53.744 3077 ERROR oslo_messaging.rpc.dispatcher 
[req-f31f6110-e880-41e8-be1a-2c41ea7fd9ce 75fbc7a6db34480091d2a53e2e20b695 
62e53e5e804e49a9890928a5a4846f60 - - -] Exception during message handling: 
internal error: unable to execute QEMU command 'drive-mirror': Could not open 
'/dev/disk/by-id/dm-uuid-mpath-360014053aac4f90daef4d76baa773169': Permission 
denied
  2017-04-12 09:37:53.744 3077 ERROR oslo_messaging.rpc.dispatcher Traceback 
(most recent call last):
  2017-04-12 09:37:53.744 3077 ERROR oslo_messaging.rpc.dispatcher   File 
"/usr/lib/python2.7/site-packages/oslo_messaging/rpc/dispatcher.py", line 138, 
in _dispatch_and_reply
  2017-04-12 09:37:53.744 3077 ERROR oslo_messaging.rpc.dispatcher 
incoming.message))
  2017-04-12 09:37:53.744 3077 ERROR oslo_messaging.rpc.dispatcher   File 
"/usr/lib/python2.7/site-packages/oslo_messaging/rpc/dispatcher.py", line 183, 
in _dispatch
  2017-04-12 09:37:53.744 3077 ERROR oslo_messaging.rpc.dispatcher return 
self._do_dispatch(endpoint, method, ctxt, args)
  2017-04-12 09:37:53.744 3077 ERROR oslo_messaging.rpc.dispatcher   File 
"/usr/lib/python2.7/site-packages/oslo_messaging/rpc/dispatcher.py", line 127, 
in _do_dispatch
  2017-04-12 09:37:53.744 3077 ERROR oslo_messaging.rpc.dispatcher result = 
func(ctxt, **new_args)
  2017-04-12 09:37:53.744 3077 ERROR oslo_messaging.rpc.dispatcher   File 
"/usr/lib/python2.7/site-packages/nova/exception.py", line 110, in wrapped
  2017-04-12 09:37:53.744 3077 ERROR oslo_messaging.rpc.dispatcher payload)
  2017-04-12 09:37:53.744 3077 ERROR oslo_messaging.rpc.dispatcher   File 
"/usr/lib/python2.7/site-packages/oslo_utils/excutils.py", line 220, in __exit__
  2017-04-12 09:37:53.744 3077 ERROR oslo_messaging.rpc.dispatcher 
self.force_reraise()
  2017-04-12 09:37:53.744 3077 ERROR oslo_messaging.rpc.dispatcher   File 
"/usr/lib/python2.7/site-packages/oslo_utils/excutils.py", line 196, in 
force_reraise
  2017-04-12 09:37:53.744 3077 ERROR oslo_messaging.rpc.dispatcher 
six.reraise(self.type_, self.value, self.tb)
  2017-04-12 09:37:53.744 3077 ERROR oslo_messaging.rpc.dispatcher   File 
"/usr/lib/python2.7/site-packages/nova/exception.py", line 89, in wrapped
  2017-

[Yahoo-eng-team] [Bug 1696152] [NEW] nova notifications use nova-api as binary name instead of nova-osapi_compute

2017-06-06 Thread Balazs Gibizer
Public bug reported:

There are multiple places in nova where the binary of the nova api
service is referred as 'nova-api'[1] but in fact the correct name of
that binary is 'nova-osapi_compute' [2]


[1]https://github.com/openstack/nova/search?utf8=%E2%9C%93&q=binary%3Dnova-api&type=
[2]https://github.com/openstack/nova/blob/a818049554f61316930c7122bb0831b6372fadc0/api-guide/source/general_info.rst

** Affects: nova
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1696152

Title:
  nova notifications use nova-api as binary name instead of nova-
  osapi_compute

Status in OpenStack Compute (nova):
  New

Bug description:
  There are multiple places in nova where the binary of the nova api
  service is referred as 'nova-api'[1] but in fact the correct name of
  that binary is 'nova-osapi_compute' [2]

  
  
[1]https://github.com/openstack/nova/search?utf8=%E2%9C%93&q=binary%3Dnova-api&type=
  
[2]https://github.com/openstack/nova/blob/a818049554f61316930c7122bb0831b6372fadc0/api-guide/source/general_info.rst

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1696152/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1696006] Re: Libvirt fails to detach network interface with Linux bridge

2017-06-06 Thread Miguel Lavalle
** Also affects: neutron
   Importance: Undecided
   Status: New

** Changed in: neutron
   Importance: Undecided => Critical

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1696006

Title:
  Libvirt fails to detach network interface with Linux bridge

Status in neutron:
  New
Status in OpenStack Compute (nova):
  New

Bug description:
  We are seeing a spike of failures in job gate-tempest-dsvm-neutron-
  linuxbridge-ubuntu-xenial, test
  tempest.scenario.test_network_basic_ops.TestNetworkBasicOps.test_hotplug_nic.

  As of this writing, there are 48 instances of this failure in Kibana:

  
http://logstash.openstack.org/#/dashboard/file/logstash.json?query=message:%5C%22Failed%20to%20delete%20resource%5C%22%20AND%20message:%5C%22within%20the%20required%20time%20%5C%22%20AND%20message:%5C%22TestNetworkBasicOps:_run_cleanups%5C%22%20AND%20tags:%5C%22console%5C%22&from=7d

  I analyzed several cases and all seem to be the same. Compute manager
  calls libvirt to detach the interface and gets a failure (in this
  example, tap tap05567d09-b3 is being detached), so it raises an
  InterfaceDetachFailed exception:

  http://paste.openstack.org/show/611347/

  The code involved is here:

  https://github.com/openstack/nova/blob/master/nova/compute/manager.py#L5224

  Since the exception is raised, the call to Neutron to delete the port
  is never executed:
  https://github.com/openstack/nova/blob/master/nova/compute/manager.py#L5227.
  Since the tempest test was setup to wait for the port deletion to
  ascertain success of the interface removal
  
(https://github.com/openstack/tempest/blob/master/tempest/scenario/test_network_basic_ops.py#L253)
  a timeout occurs and the test / job fails.

  It is worth noting that the Linuxbridge agent actually detected the
  removal of the interface: http://paste.openstack.org/show/611346/.
  Please note that tap05567d09-b3 shows up in the removed set of the
  changes detected by the agent

  It is also worth noting that this failure starts to show up in Kibana
  on 5/31/2017

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1696006/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1669844] Re: Host failure shortly after image download can result in data corruption

2017-06-06 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/443230
Committed: 
https://git.openstack.org/cgit/openstack/nova/commit/?id=1301368bf2352eddcc664202d7f159f523f681e2
Submitter: Jenkins
Branch:master

commit 1301368bf2352eddcc664202d7f159f523f681e2
Author: Matthew Booth 
Date:   Wed Mar 8 16:38:49 2017 +

Ensure image conversion flushes output data to disk

qemu-img convert defaults to cache=none, which means that when it
completes the output data may still only be in the host kernel's
cache rather than on persistent storage. A host crash at this point
will leave a file with the correct metadata (name, size, ownership,
permissions), but no contents. This will prevent qcow2 instances on
that compute host which use that image from restarting, and requires
manual intervention from an operator to fix.

See also change Id9905a87, which fixes this issue for downloads
without a conversion.

Closes-Bug: #1669844
Change-Id: I33bd99b0752111ff7057f9bd40e58dcde77c7d95


** Changed in: nova
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1669844

Title:
  Host failure shortly after image download can result in data
  corruption

Status in OpenStack Compute (nova):
  Fix Released

Bug description:
  GlanceImageServiceV2.download() ensures its downloaded file is closed
  before releasing for use by an external qemu process, but it doesn't
  do an fdatasync(). This means that the downloaded file may be
  temporarily in the host kernel's cache rather than on disk, which
  means there is a short window in which a host crash will lose the
  contents of the backing file, despite it being in use by a running
  instance.

  Disclaimer: I'm not personally able to reproduce this, but it looks
  sane and our QE team is reliably hitting it.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1669844/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1664465] Re: check instance exist before check in cell

2017-06-06 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/433470
Committed: 
https://git.openstack.org/cgit/openstack/nova/commit/?id=4ac27e815c48d1ff89218bd62fef49ab238f2764
Submitter: Jenkins
Branch:master

commit 4ac27e815c48d1ff89218bd62fef49ab238f2764
Author: jichenjc 
Date:   Mon Jan 23 23:11:39 2017 +0800

Check instance existing before check in mapping

The instance might be not exist during checking so
we provide a incorrect info to admin, this patch check
instance exist before check in mapping.

Closes-Bug: 1664465

Change-Id: I21a7d1effaadcbda4cfbd0a0465b984ebb484f24


** Changed in: nova
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1664465

Title:
  check instance exist before check in cell

Status in OpenStack Compute (nova):
  Fix Released

Bug description:
  we should check whether instance exist before saying (upgrade is incomplete)
  as the instance itself doesn't exist (I removed 'e' on purpose)

  stack@ubuntu1604:/opt/stack/nova$ nova-manage cell_v2 verify_instance --uuid  
0e7a7e72-3d75-46af-86a9-3ccf7b97699e
  /usr/local/lib/python2.7/dist-packages/pymysql/cursors.py:166: Warning: 
(3090, u"Changing sql mode 'NO_AUTO_CREATE_USER' is deprecated. It will be 
removed in a future release.")
result = self._query(query)
  Instance 0e7a7e72-3d75-46af-86a9-3ccf7b97699e is in cell: None 
(85980b20-6ca3-451f-a873-af4a5ba3809f)

  
  stack@ubuntu1604:/opt/stack/nova$ nova-manage cell_v2 verify_instance --uuid  
0e7a7e72-3d75-46af-86a9-3ccf7b97699
  /usr/local/lib/python2.7/dist-packages/pymysql/cursors.py:166: Warning: 
(3090, u"Changing sql mode 'NO_AUTO_CREATE_USER' is deprecated. It will be 
removed in a future release.")
result = self._query(query)
  Instance 0e7a7e72-3d75-46af-86a9-3ccf7b97699 is not mapped to a cell (upgrade 
is incomplete)
  stack@ubuntu1604:/opt/stack/nova$

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1664465/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1696135] Re: kali console (onecloudhosting) crashes

2017-06-06 Thread albert zakhia
solved

** Changed in: nova
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1696135

Title:
  kali console (onecloudhosting) crashes

Status in OpenStack Compute (nova):
  Fix Released

Bug description:
  VPS Security Distros
  Kali Linux 2017.1 Latest
  Configurable Options
  VM Image Kali Linux 2017.1 x64
  IP Addresses 1
  Backups Files Limit 0
  Disk 50 [GB]
  RAM 4096 [MB] 
  VCPUs 2

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1696135/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1696135] [NEW] kali console (onecloudhosting) crashes

2017-06-06 Thread albert zakhia
Public bug reported:

VPS Security Distros
Kali Linux 2017.1 Latest
Configurable Options
VM Image Kali Linux 2017.1 x64
IP Addresses 1
Backups Files Limit 0
Disk 50 [GB]
RAM 4096 [MB] 
VCPUs 2

** Affects: nova
 Importance: Undecided
 Status: Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1696135

Title:
  kali console (onecloudhosting) crashes

Status in OpenStack Compute (nova):
  Fix Released

Bug description:
  VPS Security Distros
  Kali Linux 2017.1 Latest
  Configurable Options
  VM Image Kali Linux 2017.1 x64
  IP Addresses 1
  Backups Files Limit 0
  Disk 50 [GB]
  RAM 4096 [MB] 
  VCPUs 2

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1696135/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1649852] Re: Concurrent calls to DELETE os-floating-ips can raise uncaught neutronclient.common.exceptions.NotFound

2017-06-06 Thread Matt Riedemann
** Changed in: nova
 Assignee: Matt Riedemann (mriedem) => Guillaume Espanel (guillaume-espanel)

** Changed in: nova
   Importance: Undecided => Medium

** Also affects: nova/ocata
   Importance: Undecided
   Status: New

** Changed in: nova/ocata
   Status: New => Confirmed

** Changed in: nova/ocata
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1649852

Title:
  Concurrent calls to DELETE os-floating-ips can raise uncaught
  neutronclient.common.exceptions.NotFound

Status in OpenStack Compute (nova):
  In Progress
Status in OpenStack Compute (nova) ocata series:
  Confirmed

Bug description:
  Description
  

  Concurrent calls to DELETE os-floating-ips/floating-ip-id can cause 
neutronclient to raise
  a neutronclient.common.exceptions.NotFound exception uncaught by Nova which 
in turn returns
  a 500 Error.

  Steps to reproduce
  ===

  Tested on a mitaka devstack :

   - source openrc
   - run this humble script :

  FIP_ID=`nova floating-ip-create | grep public | awk '{print($2)}'`
  TENANT_ID=`keystone token-get | grep " tenant_id " | awk '{print($4)}'`
  TOKEN_ID=`keystone token-get | grep " id " | awk '{print($4)}'`

  curl -g -i -X DELETE 
http://127.0.0.1:8774/v2.1/$TENANT_ID/os-floating-ips/$FIP_ID -H "User-Agent: 
python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: $TOKEN_ID"&
  curl -g -i -X DELETE 
http://127.0.0.1:8774/v2.1/$TENANT_ID/os-floating-ips/$FIP_ID -H "User-Agent: 
python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: $TOKEN_ID"&
  curl -g -i -X DELETE 
http://127.0.0.1:8774/v2.1/$TENANT_ID/os-floating-ips/$FIP_ID -H "User-Agent: 
python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: $TOKEN_ID"&
  curl -g -i -X DELETE 
http://127.0.0.1:8774/v2.1/$TENANT_ID/os-floating-ips/$FIP_ID -H "User-Agent: 
python-novaclient" -H "Accept: application/json" -H "X-Auth-Token: $TOKEN_ID"

  
  Expected result
  

  First call to go trough should return a 202, and all other calls
  should probably return 404 or 409 if deletion is in progress but not
  500.

  
  Actual result
  ==

  Some calls to DELETE get a 500 Error response.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1649852/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1696094] Re: CI: ovb-ha promotion job fails with 504 gateway timeout

2017-06-06 Thread Alan Pevec
** Also affects: neutron
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1696094

Title:
  CI: ovb-ha promotion job fails with 504 gateway timeout

Status in neutron:
  New
Status in tripleo:
  Triaged

Bug description:
  http://logs.openstack.org/15/359215/106/experimental-tripleo/gate-
  tripleo-ci-centos-7-ovb-
  ha/2ea94ab/console.html#_2017-06-05_23_52_38_539282

  2017-06-05 23:50:34.148537 | 
+---+--+
  2017-06-05 23:50:35.545475 | neutron CLI is deprecated and will be removed in 
the future. Use openstack CLI instead.
  2017-06-05 23:52:38.539282 | 504 Gateway Time-out
  2017-06-05 23:52:38.539408 | The server didn't respond in time.
  2017-06-05 23:52:38.539437 | 

  It happens on where subnet creation should be.
  I see in logs ovs-vsctl failure, but not sure it's not red herring.

  http://logs.openstack.org/15/359215/106/experimental-tripleo/gate-
  tripleo-ci-centos-7-ovb-ha/2ea94ab/logs/controller-1-tripleo-
  ci-b-bar/var/log/messages

  Jun  5 23:48:22 localhost ovs-vsctl: ovs|1|vsctl|INFO|Called as 
/bin/ovs-vsctl --timeout=5 --id=@manager -- create Manager 
"target=\"ptcp:6640:127.0.0.1\"" -- add Open_vSwitch . manager_options @manager
  Jun  5 23:48:22 localhost ovs-vsctl: ovs|2|db_ctl_base|ERR|transaction 
error: {"details":"Transaction causes multiple rows in \"Manager\" table to 
have identical values (\"ptcp:6640:127.0.0.1\") for index on column \"target\". 
 First row, with UUID 7e2b866a-40d5-4f9c-9e08-0be3bb34b199, existed in the 
database before this transaction and was not modified by the transaction.  
Second row, with UUID 49488cff-271a-457a-b1e7-e6ca3da6f069, was inserted by 
this transaction.","error":"constraint violation"}

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1696094/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1696125] [NEW] Detach interface failed - Unable to detach from guest transient domain (pike)

2017-06-06 Thread Matt Riedemann
Public bug reported:

Seeing this in Tempest runs on master (pike):

http://logs.openstack.org/24/471024/2/check/gate-tempest-dsvm-neutron-
linuxbridge-ubuntu-
xenial/6b98d38/logs/screen-n-cpu.txt.gz?level=TRACE#_Jun_06_02_16_02_855503

Jun 06 02:16:02.855503 ubuntu-xenial-ovh-bhs1-9149075 nova-compute[24118]: 
WARNING nova.compute.manager [None req-b4a50024-a2fd-4279-b284-340d2074f1c1 
tempest-TestNetworkBasicOps-1479445685 tempest-TestNetworkBasicOps-1479445685] 
[instance: 2668bcb9-b13d-4b5b-8ee5-edbdee3b15a8] Detach interface failed, 
port_id=3843caa3-ab04-45f1-94d8-f330390e40fe, reason: Device detach failed for 
fa:16:3e:ab:e3:3f: Unable to detach from guest transient domain.: 
DeviceDetachFailed: Device detach failed for fa:16:3e:ab:e3:3f: Unable to 
detach from guest transient domain.
Jun 06 02:16:02.884007 ubuntu-xenial-ovh-bhs1-9149075 nova-compute[24118]: 
ERROR oslo_messaging.rpc.server [None req-b4a50024-a2fd-4279-b284-340d2074f1c1 
tempest-TestNetworkBasicOps-1479445685 tempest-TestNetworkBasicOps-1479445685] 
Exception during message handling: InterfaceDetachFailed: Failed to detach 
network adapter device from 2668bcb9-b13d-4b5b-8ee5-edbdee3b15a8
Jun 06 02:16:02.884180 ubuntu-xenial-ovh-bhs1-9149075 nova-compute[24118]: 
ERROR oslo_messaging.rpc.server Traceback (most recent call last):
Jun 06 02:16:02.884286 ubuntu-xenial-ovh-bhs1-9149075 nova-compute[24118]: 
ERROR oslo_messaging.rpc.server   File 
"/usr/local/lib/python2.7/dist-packages/oslo_messaging/rpc/server.py", line 
157, in _process_incoming
Jun 06 02:16:02.884395 ubuntu-xenial-ovh-bhs1-9149075 nova-compute[24118]: 
ERROR oslo_messaging.rpc.server res = self.dispatcher.dispatch(message)
Jun 06 02:16:02.884538 ubuntu-xenial-ovh-bhs1-9149075 nova-compute[24118]: 
ERROR oslo_messaging.rpc.server   File 
"/usr/local/lib/python2.7/dist-packages/oslo_messaging/rpc/dispatcher.py", line 
213, in dispatch
Jun 06 02:16:02.884669 ubuntu-xenial-ovh-bhs1-9149075 nova-compute[24118]: 
ERROR oslo_messaging.rpc.server return self._do_dispatch(endpoint, method, 
ctxt, args)
Jun 06 02:16:02.884777 ubuntu-xenial-ovh-bhs1-9149075 nova-compute[24118]: 
ERROR oslo_messaging.rpc.server   File 
"/usr/local/lib/python2.7/dist-packages/oslo_messaging/rpc/dispatcher.py", line 
183, in _do_dispatch
Jun 06 02:16:02.884869 ubuntu-xenial-ovh-bhs1-9149075 nova-compute[24118]: 
ERROR oslo_messaging.rpc.server result = func(ctxt, **new_args)
Jun 06 02:16:02.884968 ubuntu-xenial-ovh-bhs1-9149075 nova-compute[24118]: 
ERROR oslo_messaging.rpc.server   File 
"/opt/stack/new/nova/nova/exception_wrapper.py", line 77, in wrapped
Jun 06 02:16:02.885069 ubuntu-xenial-ovh-bhs1-9149075 nova-compute[24118]: 
ERROR oslo_messaging.rpc.server function_name, call_dict, binary)
Jun 06 02:16:02.885171 ubuntu-xenial-ovh-bhs1-9149075 nova-compute[24118]: 
ERROR oslo_messaging.rpc.server   File 
"/usr/local/lib/python2.7/dist-packages/oslo_utils/excutils.py", line 220, in 
__exit__
Jun 06 02:16:02.885272 ubuntu-xenial-ovh-bhs1-9149075 nova-compute[24118]: 
ERROR oslo_messaging.rpc.server self.force_reraise()
Jun 06 02:16:02.885367 ubuntu-xenial-ovh-bhs1-9149075 nova-compute[24118]: 
ERROR oslo_messaging.rpc.server   File 
"/usr/local/lib/python2.7/dist-packages/oslo_utils/excutils.py", line 196, in 
force_reraise
Jun 06 02:16:02.885461 ubuntu-xenial-ovh-bhs1-9149075 nova-compute[24118]: 
ERROR oslo_messaging.rpc.server six.reraise(self.type_, self.value, self.tb)
Jun 06 02:16:02.885554 ubuntu-xenial-ovh-bhs1-9149075 nova-compute[24118]: 
ERROR oslo_messaging.rpc.server   File 
"/opt/stack/new/nova/nova/exception_wrapper.py", line 68, in wrapped
Jun 06 02:16:02.885649 ubuntu-xenial-ovh-bhs1-9149075 nova-compute[24118]: 
ERROR oslo_messaging.rpc.server return f(self, context, *args, **kw)
Jun 06 02:16:02.885755 ubuntu-xenial-ovh-bhs1-9149075 nova-compute[24118]: 
ERROR oslo_messaging.rpc.server   File 
"/opt/stack/new/nova/nova/compute/manager.py", line 214, in decorated_function
Jun 06 02:16:02.885856 ubuntu-xenial-ovh-bhs1-9149075 nova-compute[24118]: 
ERROR oslo_messaging.rpc.server kwargs['instance'], e, sys.exc_info())
Jun 06 02:16:02.885950 ubuntu-xenial-ovh-bhs1-9149075 nova-compute[24118]: 
ERROR oslo_messaging.rpc.server   File 
"/usr/local/lib/python2.7/dist-packages/oslo_utils/excutils.py", line 220, in 
__exit__
Jun 06 02:16:02.886053 ubuntu-xenial-ovh-bhs1-9149075 nova-compute[24118]: 
ERROR oslo_messaging.rpc.server self.force_reraise()
Jun 06 02:16:02.886143 ubuntu-xenial-ovh-bhs1-9149075 nova-compute[24118]: 
ERROR oslo_messaging.rpc.server   File 
"/usr/local/lib/python2.7/dist-packages/oslo_utils/excutils.py", line 196, in 
force_reraise
Jun 06 02:16:02.886232 ubuntu-xenial-ovh-bhs1-9149075 nova-compute[24118]: 
ERROR oslo_messaging.rpc.server six.reraise(self.type_, self.value, self.tb)
Jun 06 02:16:02.886322 ubuntu-xenial-ovh-bhs1-9149075 nova-compute[24118]: 
ERROR oslo_messaging.rpc.server   File 
"/opt/stack/new/nova/nova/co

[Yahoo-eng-team] [Bug 1696111] [NEW] Keystone confuses users when creating a trust when there's a roles name conflict

2017-06-06 Thread Michal Dulko
Public bug reported:

Due to code [1] Keystone produces a confusing message when:

* We're using python-openstackclient
* We're creating a trust with a role name that exists in more that one domain.

"role %s is not defined" suggests that there isn't a role like that.
What actually happens, Keystone cannot decide which role is the user's
choice.

python-openstackclient automatically converts role ids to role names
when sending a POST request, so specifying roles using an id doesn't
help at all.


[1]
https://github.com/openstack/keystone/blob/03319d1/keystone/trust/controllers.py#L90-L94

** Affects: keystone
 Importance: Undecided
 Status: New

** Affects: python-openstackclient
 Importance: Undecided
 Status: New

** Also affects: python-openstackclient
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1696111

Title:
  Keystone confuses users when creating a trust when there's a roles
  name conflict

Status in OpenStack Identity (keystone):
  New
Status in python-openstackclient:
  New

Bug description:
  Due to code [1] Keystone produces a confusing message when:

  * We're using python-openstackclient
  * We're creating a trust with a role name that exists in more that one domain.

  "role %s is not defined" suggests that there isn't a role like that.
  What actually happens, Keystone cannot decide which role is the user's
  choice.

  python-openstackclient automatically converts role ids to role names
  when sending a POST request, so specifying roles using an id doesn't
  help at all.


  [1]
  
https://github.com/openstack/keystone/blob/03319d1/keystone/trust/controllers.py#L90-L94

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1696111/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1696104] [NEW] iptables without ipset are not being restored after reboot

2017-06-06 Thread Oleksiy Molchanov
Public bug reported:

After deleting all VMs from compute node there are related to ipset
entries left in /etc/iptables/rules.v4. So after restarting this node
not all of the entries would be restored.

Steps to reproduce:
1. Create VM
2. Delete VM
3. Check number of entries in iptables-save
4. Reboot compute node
5. Check number of entries in iptables-save or run `iptables-restore < 
/etc/iptables/rules.v4`

Expected output:
Not all entries are restored

Actual output:
# iptables-restore < /etc/iptables/rules.v4
iptables-restore v1.4.21: Set NIPv4d6056099-2723-45ac-bf56- doesn't exist.
Error occurred at line: 161
Try `iptables-restore -h' or 'iptables-restore --help' for more information.

Version:
Openstack Mitaka

** Affects: neutron
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1696104

Title:
  iptables without ipset are not being restored after reboot

Status in neutron:
  New

Bug description:
  After deleting all VMs from compute node there are related to ipset
  entries left in /etc/iptables/rules.v4. So after restarting this node
  not all of the entries would be restored.

  Steps to reproduce:
  1. Create VM
  2. Delete VM
  3. Check number of entries in iptables-save
  4. Reboot compute node
  5. Check number of entries in iptables-save or run `iptables-restore < 
/etc/iptables/rules.v4`

  Expected output:
  Not all entries are restored

  Actual output:
  # iptables-restore < /etc/iptables/rules.v4
  iptables-restore v1.4.21: Set NIPv4d6056099-2723-45ac-bf56- doesn't exist.
  Error occurred at line: 161
  Try `iptables-restore -h' or 'iptables-restore --help' for more information.

  Version:
  Openstack Mitaka

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1696104/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1696098] [NEW] Race in deleting ports during Tempest Runs

2017-06-06 Thread Sean Dague
Public bug reported:

This is similar to https://bugs.launchpad.net/tempest/+bug/1357055 which
is closed (and honestly would be confusing to make this the same bug).

When trying to tear down subnets, they sometimes fail because the port
still exists. However there is no indication that the port delete
failed.

2017-06-05 18:38:20.846777 | Captured traceback-1:
2017-06-05 18:38:20.846795 | ~
2017-06-05 18:38:20.846817 | Traceback (most recent call last):
2017-06-05 18:38:20.846853 |   File 
"tempest/lib/common/utils/test_utils.py", line 84, in 
call_and_ignore_notfound_exc
2017-06-05 18:38:20.846890 | return func(*args, **kwargs)
2017-06-05 18:38:20.846926 |   File 
"tempest/lib/services/network/subnets_client.py", line 52, in delete_subnet
2017-06-05 18:38:20.846949 | return self.delete_resource(uri)
2017-06-05 18:38:20.846981 |   File "tempest/lib/services/network/base.py", 
line 41, in delete_resource
2017-06-05 18:38:20.847004 | resp, body = self.delete(req_uri)
2017-06-05 18:38:20.847034 |   File "tempest/lib/common/rest_client.py", 
line 301, in delete
2017-06-05 18:38:20.847064 | return self.request('DELETE', url, 
extra_headers, headers, body)
2017-06-05 18:38:20.847094 |   File "tempest/lib/common/rest_client.py", 
line 659, in request
2017-06-05 18:38:20.847117 | self._error_checker(resp, resp_body)
2017-06-05 18:38:20.847149 |   File "tempest/lib/common/rest_client.py", 
line 780, in _error_checker
2017-06-05 18:38:20.847175 | raise exceptions.Conflict(resp_body, 
resp=resp)
2017-06-05 18:38:20.847208 | tempest.lib.exceptions.Conflict: An object 
with that identifier already exists
2017-06-05 18:38:20.847274 | Details: {u'detail': u'', u'message': u'Unable 
to complete operation on subnet 276de24c-4560-47f5-9feb-2964314d7814: One or 
more ports have an IP allocation from this subnet.', u'type': u'SubnetInUse'}

http://logs.openstack.org/53/469253/1/gate/gate-tempest-dsvm-neutron-
linuxbridge-ubuntu-
xenial/64416cc/console.html#_2017-06-05_18_38_20_847274

** Affects: neutron
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1696098

Title:
  Race in deleting ports during Tempest Runs

Status in neutron:
  New

Bug description:
  This is similar to https://bugs.launchpad.net/tempest/+bug/1357055
  which is closed (and honestly would be confusing to make this the same
  bug).

  When trying to tear down subnets, they sometimes fail because the port
  still exists. However there is no indication that the port delete
  failed.

  2017-06-05 18:38:20.846777 | Captured traceback-1:
  2017-06-05 18:38:20.846795 | ~
  2017-06-05 18:38:20.846817 | Traceback (most recent call last):
  2017-06-05 18:38:20.846853 |   File 
"tempest/lib/common/utils/test_utils.py", line 84, in 
call_and_ignore_notfound_exc
  2017-06-05 18:38:20.846890 | return func(*args, **kwargs)
  2017-06-05 18:38:20.846926 |   File 
"tempest/lib/services/network/subnets_client.py", line 52, in delete_subnet
  2017-06-05 18:38:20.846949 | return self.delete_resource(uri)
  2017-06-05 18:38:20.846981 |   File 
"tempest/lib/services/network/base.py", line 41, in delete_resource
  2017-06-05 18:38:20.847004 | resp, body = self.delete(req_uri)
  2017-06-05 18:38:20.847034 |   File "tempest/lib/common/rest_client.py", 
line 301, in delete
  2017-06-05 18:38:20.847064 | return self.request('DELETE', url, 
extra_headers, headers, body)
  2017-06-05 18:38:20.847094 |   File "tempest/lib/common/rest_client.py", 
line 659, in request
  2017-06-05 18:38:20.847117 | self._error_checker(resp, resp_body)
  2017-06-05 18:38:20.847149 |   File "tempest/lib/common/rest_client.py", 
line 780, in _error_checker
  2017-06-05 18:38:20.847175 | raise exceptions.Conflict(resp_body, 
resp=resp)
  2017-06-05 18:38:20.847208 | tempest.lib.exceptions.Conflict: An object 
with that identifier already exists
  2017-06-05 18:38:20.847274 | Details: {u'detail': u'', u'message': 
u'Unable to complete operation on subnet 276de24c-4560-47f5-9feb-2964314d7814: 
One or more ports have an IP allocation from this subnet.', u'type': 
u'SubnetInUse'}

  http://logs.openstack.org/53/469253/1/gate/gate-tempest-dsvm-neutron-
  linuxbridge-ubuntu-
  xenial/64416cc/console.html#_2017-06-05_18_38_20_847274

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1696098/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1696093] [NEW] When update a firewall, we should update the iptables firstly, and then clear the conntrack record, just like the function create_firewall(). Otherwise, the contra

2017-06-06 Thread wujun
Public bug reported:

environment: devstack master

When update a firewall, we should update the iptables firstly,  and then
clear the conntrack record,  just like the function create_firewall().
Otherwise, the contrack record could be reproduced.

We can trigger the firewall_update action by:
1.#neutron firewall-update f1 --no-routers
2.vm ping external ip address all the time
3.#neutron firewall-update f1 --router demo-router

We can found that vm still can ping external ip address successfully.

** Affects: neutron
 Importance: Undecided
 Assignee: wujun (wujun)
 Status: New


** Tags: fwaas

** Changed in: neutron
 Assignee: (unassigned) => wujun (wujun)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1696093

Title:
  When update a firewall, we should update the iptables firstly,  and
  then clear the conntrack record,  just like the function
  create_firewall(). Otherwise, the contrack record could be reproduced.

Status in neutron:
  New

Bug description:
  environment: devstack master

  When update a firewall, we should update the iptables firstly,  and
  then clear the conntrack record,  just like the function
  create_firewall(). Otherwise, the contrack record could be reproduced.

  We can trigger the firewall_update action by:
  1.#neutron firewall-update f1 --no-routers
  2.vm ping external ip address all the time
  3.#neutron firewall-update f1 --router demo-router

  We can found that vm still can ping external ip address successfully.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1696093/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1695533] Re: Incorrect URL in XML used by libvirt to launch instance

2017-06-06 Thread Markus Zoeller (markus_z)
I don't think that this is a valid bug, as the XML namespace URI is
usually not a "real" URI. In Wikipedia you will also find:

"[...] the namespace specification does not 
require nor suggest that the namespace URI 
be used to retrieve information. [...]"

https://en.wikipedia.org/wiki/XML_namespace

FWIW:
The XML metadata in the domain XML got introduced with commit
https://github.com/openstack/nova/commit/bf02f13  
The blueprint is this:

http://specs.openstack.org/openstack/nova-specs/specs/juno/implemented/libvirt-driver-domain-metadata.html

** Changed in: nova
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1695533

Title:
  Incorrect URL in XML used by libvirt to launch instance

Status in OpenStack Compute (nova):
  Invalid

Bug description:
  I launched an instance using Devstack running on QEMU hypervisor. I
  dumped the XML of VM to see what things are getting configured and
  found a URL in the XML. The URL points to a page which no longer
  exists on the openstack.org website. I guess this URL gets embedded in
  each VM's XML. Though it does nothing (maybe pointing to the syntax
  used to define XML), and I am interested in this URL. I have filed
  this bug so that the URL can be corrected or can be removed from the
  XML. Attached is the full dumpxml. Here is a snippet of it:


  http://openstack.org/xmlns/libvirt/nova/1.0";>

ttt

  Steps to reproduce:
  1. Launch an instance
  2. Goto compute node where the instance is running.
  3. Do "virsh dumpxml "
  4. Check the URL in dumped output.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1695533/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1693670] Re: Fix doc generation for Python3

2017-06-06 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/470673
Committed: 
https://git.openstack.org/cgit/openstack/neutron-lib/commit/?id=ef21b5798901243ec2eed4ba8af871029c33532d
Submitter: Jenkins
Branch:master

commit ef21b5798901243ec2eed4ba8af871029c33532d
Author: Vu Cong Tuan 
Date:   Sun Jun 4 12:27:34 2017 +0700

Fix html_last_updated_fmt for Python3

html_last_updated_fmt option is interpreted as a
byte string in python3, causing Sphinx build to break.
This patch makes it utf-8 string.

Change-Id: I261fc5fecad14dd1e9c37877388bc91d8a18b26d
Closes-Bug:#1693670


** Changed in: neutron
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1693670

Title:
   Fix doc generation for Python3

Status in neutron:
  Fix Released
Status in tacker:
  Fix Released
Status in zaqar:
  Fix Released

Bug description:
  Fix the Sphinx html_last_updated_fmt for Python3.
  The html_last_updated_fmt option is interpeted as a
  byte string in python3, causing Sphinx build to break.
  This patch makes it utf-8 string.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1693670/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1696082] [NEW] 'nova.exception.NeutronAdminCredentialConfigurationInvalid

2017-06-06 Thread Balaji
Public bug reported:

Unexpected API Error. Please report this at http://bugs.launchpad.net/nova/ and 
attach the Nova API log if possible.
 (HTTP 500) 
(Request-ID: req-b31a490e-9a16-4e60-87c8-98266a9bb4c4)

[root@controller ~(keystone_fulladmin)]$  dpkg -l | grep nova
ii  nova-api 2:15.0.2-0ubuntu1~cloud0   
  all  OpenStack Compute - API frontend
ii  nova-common  2:15.0.2-0ubuntu1~cloud0   
  all  OpenStack Compute - common files
ii  nova-conductor   2:15.0.2-0ubuntu1~cloud0   
  all  OpenStack Compute - conductor service
ii  nova-consoleauth 2:15.0.2-0ubuntu1~cloud0   
  all  OpenStack Compute - Console Authenticator
ii  nova-doc 2:15.0.2-0ubuntu1~cloud0   
  all  OpenStack Compute - documentation
ii  nova-novncproxy  2:15.0.2-0ubuntu1~cloud0   
  all  OpenStack Compute - NoVNC proxy
ii  nova-placement-api   2:15.0.2-0ubuntu1~cloud0   
  all  OpenStack Compute - placement API frontend
ii  nova-scheduler   2:15.0.2-0ubuntu1~cloud0   
  all  OpenStack Compute - virtual machine scheduler
ii  python-nova  2:15.0.2-0ubuntu1~cloud0   
  all  OpenStack Compute Python libraries
ii  python-novaclient2:7.1.0-0ubuntu1~cloud0
  all  client library for OpenStack Compute API - Python 2.7


2017-06-06 14:20:46.952 6587 ERROR nova.network.neutronv2.api 
[req-b31a490e-9a16-4e60-87c8-98266a9bb4c4 ebdda307ceb44f4c8984f9c2a0e7b839 
96b226f6aa2f4d32b361ad0fa3eec46c - default default] Neutron client was not able 
to generate a valid admin token, please verify Neutron admin credential located 
in nova.conf
2017-06-06 14:20:46.952 6587 ERROR nova.api.openstack.extensions 
[req-b31a490e-9a16-4e60-87c8-98266a9bb4c4 ebdda307ceb44f4c8984f9c2a0e7b839 
96b226f6aa2f4d32b361ad0fa3eec46c - default default] Unexpected exception in API 
method
2017-06-06 14:20:46.952 6587 ERROR nova.api.openstack.extensions Traceback 
(most recent call last):
2017-06-06 14:20:46.952 6587 ERROR nova.api.openstack.extensions   File 
"/usr/lib/python2.7/dist-packages/nova/api/openstack/extensions.py", line 338, 
in wrapped
2017-06-06 14:20:46.952 6587 ERROR nova.api.openstack.extensions return 
f(*args, **kwargs)
2017-06-06 14:20:46.952 6587 ERROR nova.api.openstack.extensions   File 
"/usr/lib/python2.7/dist-packages/nova/api/validation/__init__.py", line 108, 
in wrapper
2017-06-06 14:20:46.952 6587 ERROR nova.api.openstack.extensions return 
func(*args, **kwargs)
2017-06-06 14:20:46.952 6587 ERROR nova.api.openstack.extensions   File 
"/usr/lib/python2.7/dist-packages/nova/api/validation/__init__.py", line 108, 
in wrapper
2017-06-06 14:20:46.952 6587 ERROR nova.api.openstack.extensions return 
func(*args, **kwargs)
2017-06-06 14:20:46.952 6587 ERROR nova.api.openstack.extensions   File 
"/usr/lib/python2.7/dist-packages/nova/api/validation/__init__.py", line 108, 
in wrapper
2017-06-06 14:20:46.952 6587 ERROR nova.api.openstack.extensions return 
func(*args, **kwargs)
2017-06-06 14:20:46.952 6587 ERROR nova.api.openstack.extensions   File 
"/usr/lib/python2.7/dist-packages/nova/api/validation/__init__.py", line 108, 
in wrapper
2017-06-06 14:20:46.952 6587 ERROR nova.api.openstack.extensions return 
func(*args, **kwargs)
2017-06-06 14:20:46.952 6587 ERROR nova.api.openstack.extensions   File 
"/usr/lib/python2.7/dist-packages/nova/api/validation/__init__.py", line 108, 
in wrapper
2017-06-06 14:20:46.952 6587 ERROR nova.api.openstack.extensions return 
func(*args, **kwargs)
2017-06-06 14:20:46.952 6587 ERROR nova.api.openstack.extensions   File 
"/usr/lib/python2.7/dist-packages/nova/api/validation/__init__.py", line 108, 
in wrapper
2017-06-06 14:20:46.952 6587 ERROR nova.api.openstack.extensions return 
func(*args, **kwargs)
2017-06-06 14:20:46.952 6587 ERROR nova.api.openstack.extensions   File 
"/usr/lib/python2.7/dist-packages/nova/api/openstack/compute/servers.py", line 
642, in create
2017-06-06 14:20:46.952 6587 ERROR nova.api.openstack.extensions 
**create_kwargs)
2017-06-06 14:20:46.952 6587 ERROR nova.api.openstack.extensions   File 
"/usr/lib/python2.7/dist-packages/nova/hooks.py", line 154, in inner
2017-06-06 14:20:46.952 6587 ERROR nova.api.openstack.extensions rv = 
f(*args, **kwargs)
2017-06-06 14:20:46.952 6587 ERROR nova.api.openstack.extensions   File 
"/usr/lib/python2.7/dist-packages/nova/compute/api.py", line 1613, in create
2017-06-06 14:20:46.952 6587 ERROR nova.api.openstack.extensions 
check_server_group_quota=check_server_group_quota)
2017-06-06 14:20:46.952 6587 ERROR nova.api.openstack.extensions   File 
"/usr/lib/python2.7/dist

[Yahoo-eng-team] [Bug 1696076] [NEW] tempest plugin needs an update for identity v3

2017-06-06 Thread YAMAMOTO Takashi
Public bug reported:

some tests are disabled for identity v3 only deployment
after [1].

[1] I8fffc50fd45e43f34ca591416924bcf29626b21f

** Affects: neutron
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1696076

Title:
  tempest plugin needs an update for identity v3

Status in neutron:
  New

Bug description:
  some tests are disabled for identity v3 only deployment
  after [1].

  [1] I8fffc50fd45e43f34ca591416924bcf29626b21f

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1696076/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp