[Yahoo-eng-team] [Bug 1918397] [NEW] failed to name sriov vfs because the names reserved for representors

2021-03-09 Thread waleed mousa
Public bug reported:

After providing a patch to bind sriov vfs in mlnx devices after moving to 
switchdec, we saw in some cases that the names of the representors were 
reserved before for the vfs and that failed to get the old names again of the 
vfs after binding them and name them as ethX.
This creates lot of confusion because now all VFs have 2 visible netdevices, 
one being the VF representor, and the other being a mlx5-bound VF

** Affects: neutron
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1918397

Title:
  failed to name sriov vfs because the names reserved for representors

Status in neutron:
  New

Bug description:
  After providing a patch to bind sriov vfs in mlnx devices after moving to 
switchdec, we saw in some cases that the names of the representors were 
reserved before for the vfs and that failed to get the old names again of the 
vfs after binding them and name them as ethX.
  This creates lot of confusion because now all VFs have 2 visible netdevices, 
one being the VF representor, and the other being a mlx5-bound VF

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1918397/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1915308] Re: security group table doesn't observe Neutron policy settings

2021-03-09 Thread Vishal Manchanda
It is fixed by https://review.opendev.org/c/openstack/horizon/+/774922

** Changed in: horizon
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1915308

Title:
  security group table doesn't observe Neutron policy settings

Status in OpenStack Dashboard (Horizon):
  Fix Released
Status in OpenStack Security Advisory:
  Won't Fix

Bug description:
  The security group panel enables all actions
  (create/edit/delete/manage rules/etc.) regardless of the network
  policy.yaml settings or user account.

  In the code there's this telling readme:

  # TODO(amotoki): [drop-nova-network] Add neutron policy support

  In my deployment this is a bit alarming -- users who are intended to
  be read-only are nonetheless invited to delete things.  Of course the
  Neutron backend /does/ observe the policy so this is ugly but not
  usually an actual security risk unless people have different back-end
  and front-end policy files.

  I'm flagging as security-related nonetheless for the odd edge case
  where it poses a risk.

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1915308/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1793411] Re: Dashboard memory leaks

2021-03-09 Thread Vishal Manchanda
As mentioned in the above comments it is already fixed by 
https://review.openstack.org/c/614893/.
So changing bug status to Fix Released and regarding the same issue in Queen 
and Rocky branch, you
can apply the same fix in your env. I don't have an evn. to check if above 
patch not work in the old branches. Last but not least Rocky and Queen are EOL, 
So I am not sure it is good to purpose backport
to old branches now.
Feel Free to add your suggestions.


** Changed in: horizon
   Status: Fix Committed => Fix Released

** Changed in: horizon
   Importance: High => Low

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1793411

Title:
  Dashboard memory leaks

Status in OpenStack Dashboard (Horizon):
  Fix Released

Bug description:
  1.Issue description

  Recently, we found the server which hosts horizon dashboard had
  serveral times OOM caused by horizon services. After restarting the
  dashboard, the memory usage goes up very quickly if we access
  /project/network_topology/ path.

  2.How to reproduce

  Login into the dashboard and go to 'Network Topology' tab, then leave
  it there (autorefresh 10s by default), now monitor the memory changes
  on the host.

  3.Versions and Components

  Dashboard:  Stable/Pike
  Server:   uWSGI 1.9.17-1
  OS:   Ubuntu 14.04 trusty
  Python:   2.7.6

  As the codes of memoized has little changes since Pike, if you use
  Queen/Rocky release, you may also succeed to reproduce it.

  4.The investigation

  The root cause of the memory leak is the decorator
  memorized(horizon/utils/memoized.py) which is used to cache function
  calls in Horizon.

  After disable it, the memory increases has been controlled.

  The following is the comparison of memory change(with guppy) for each
  request of /project/network_topology:

   - original (no code change)684kb

   - do garbage collection manually   185kb

   - disable memorize cache   10kb

  As we known, memoized uses weakref to cache objects. A weak reference
  to an object is not enough to keep the object alive: when the only
  remaining references to a referent are weak references, garbage
  collection is free to destroy the referent and reuse its memory for
  something else.

  In the memory, we could see lots of weakref stuffs, the following is a
  example:

  Partition of a set of 394 objects. Total size = 37824 bytes.
   Index  Count   % Size   % Cumulative  % Kind (class / dict of class)
   0197  5018912  50 18912  50 _cffi_backend.CDataGCP
   1197  5018912  50 37824 100 weakref.KeyedRefq

  But the rest of them are not. the following result is the memory
  objects changes of per /project/network_topology access with garbage
  collection manually.

  Partition of a set of 1017 objects. Total size = 183680 bytes.
   Index  Count   % Size   % Cumulative  % Referrers by Kind (class / dict 
of class)
   0419  4158320  32 58320  32 dict (no owner)
   1100  1023416  13 81736  44 list
   2135  1315184   8 96920  53 
   3  2   0 6704   4103624  56 
urllib3.connection.VerifiedHTTPSConnection
   4  2   0 6704   4110328  60 
urllib3.connectionpool.HTTPSConnectionPool
   5  1   0 3352   2113680  62 novaclient.v2.client.Client
   6  2   0 2096   1115776  63 OpenSSL.SSL.Connection
   7  2   0 2096   1117872  64 OpenSSL.SSL.Context
   8  2   0 2096   1119968  65 Queue.LifoQueue
   9 12   1 2096   1122064  66 dict of 
urllib3.connectionpool.HTTPSConnectionPool

  The most of them are dicts. Followings are the dicts sorted by class,
  as you can see most of them are not weakref objects:

  Partition of a set of 419 objects. Total size = 58320 bytes.
   Index  Count   % Size   % Cumulative  % Class
   0362  8650712  87 50712  87 unicode
   1 27   6 3736   6 54448  93 list
   2  5   1 2168   4 56616  97 dict
   3 22   5 1448   2 58064 100 str
   4  2   0  192   0 58256 100 weakref.KeyedRef
   5  1   0   64   0 58320 100 keystoneauth1.discover.Discover

  5.The issue

  So the problem is that memoized does not work like what we expect. It
  allocates memory to cache objects but some of them could not be
  released.

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1793411/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1918352] [NEW] Fault Injection #2065 - improve unit test effectiveness

2021-03-09 Thread Henrique Marques
Public bug reported:

Description
===
I have performed fault injection in openstack nova by changing the code of 
compute/api.py (inserting a representative/probable bug) and then ran the unit, 
functional and integration tests and discover that some of the bugs inserted 
were not detected by the test suite:
The reference WVIV (Wrong value used in variable initialization) is a type of 
fault where the value used in a variable initialization is set to an incorrect 
value.

Steps to reproduce
==

Line of Code|Original Code  |Incorrect Code
5515|is_uuid = False|is_uuid = True


Refactor the line of code above to the incorrect code. Then execute the unit 
tests.

Expected result
===
The unit tests should detect the fault.

Actual result
===
The fault was not detected by the unit tests.

Environment
===
The code tested is on the stable/ussuri branch.

** Affects: nova
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1918352

Title:
  Fault Injection #2065 - improve unit test effectiveness

Status in OpenStack Compute (nova):
  New

Bug description:
  Description
  ===
  I have performed fault injection in openstack nova by changing the code of 
compute/api.py (inserting a representative/probable bug) and then ran the unit, 
functional and integration tests and discover that some of the bugs inserted 
were not detected by the test suite:
  The reference WVIV (Wrong value used in variable initialization) is a type of 
fault where the value used in a variable initialization is set to an incorrect 
value.

  Steps to reproduce
  ==

  Line of Code  |Original Code  |Incorrect Code
  5515  |is_uuid = False|is_uuid = True

  
  Refactor the line of code above to the incorrect code. Then execute the unit 
tests.

  Expected result
  ===
  The unit tests should detect the fault.

  Actual result
  ===
  The fault was not detected by the unit tests.

  Environment
  ===
  The code tested is on the stable/ussuri branch.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1918352/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1918350] [NEW] Fault Injection #2045 - improve unit test effectiveness

2021-03-09 Thread Henrique Marques
Public bug reported:

Description
===
I have performed fault injection in openstack nova by changing the code of 
compute/api.py (inserting a representative/probable bug) and then ran the unit, 
functional and integration tests and discover that some of the bugs inserted 
were not detected by the test suite:
The reference WVIV (Wrong value used in variable initialization) is a type of 
fault where the value used in a variable initialization is set to an incorrect 
value.

Steps to reproduce
==

Line of Code|Original Code  |Incorrect Code
1251|req_spec.is_bfv = False|req_spec.is_bfv = True

Refactor the line of code above to the incorrect code. Then execute the
unit tests.

Expected result
===
The unit tests should detect the fault.

Actual result
===
The fault was not detected by the unit tests.

Environment
===
The code tested is on the stable/ussuri branch.

** Affects: nova
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1918350

Title:
  Fault Injection #2045 - improve unit test effectiveness

Status in OpenStack Compute (nova):
  New

Bug description:
  Description
  ===
  I have performed fault injection in openstack nova by changing the code of 
compute/api.py (inserting a representative/probable bug) and then ran the unit, 
functional and integration tests and discover that some of the bugs inserted 
were not detected by the test suite:
  The reference WVIV (Wrong value used in variable initialization) is a type of 
fault where the value used in a variable initialization is set to an incorrect 
value.

  Steps to reproduce
  ==

  Line of Code  |Original Code  |Incorrect Code
  1251  |req_spec.is_bfv = False|req_spec.is_bfv = True

  Refactor the line of code above to the incorrect code. Then execute
  the unit tests.

  Expected result
  ===
  The unit tests should detect the fault.

  Actual result
  ===
  The fault was not detected by the unit tests.

  Environment
  ===
  The code tested is on the stable/ussuri branch.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1918350/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1918348] [NEW] Fault Injection #2041 - improve unit test effectiveness

2021-03-09 Thread Henrique Marques
Public bug reported:

Description
===
I have performed fault injection in openstack nova by changing the code of 
compute/api.py (inserting a representative/probable bug) and then ran the unit, 
functional and integration tests and discover that some of the bugs inserted 
were not detected by the test suite:
The reference WVIV (Wrong value used in variable initialization) is a type of 
fault where the value used in a variable initialization is set to an incorrect 
value.

Steps to reproduce
==

Line of Code|Original Code  |Incorrect Code
108 |MIN_COMPUTE_SAME_HOST_COLD_MIGRATE = 48
|MIN_COMPUTE_SAME_HOST_COLD_MIGRATE = 655654

Refactor the line of code above to the incorrect code. Then execute the
unit tests.

Expected result
===
The unit tests should detect the fault.

Actual result
===
The fault was not detected by the unit tests.

Environment
===
The code tested is on the stable/ussuri branch.

** Affects: nova
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1918348

Title:
  Fault Injection #2041 - improve unit test effectiveness

Status in OpenStack Compute (nova):
  New

Bug description:
  Description
  ===
  I have performed fault injection in openstack nova by changing the code of 
compute/api.py (inserting a representative/probable bug) and then ran the unit, 
functional and integration tests and discover that some of the bugs inserted 
were not detected by the test suite:
  The reference WVIV (Wrong value used in variable initialization) is a type of 
fault where the value used in a variable initialization is set to an incorrect 
value.

  Steps to reproduce
  ==

  Line of Code  |Original Code  |Incorrect Code
  108   |MIN_COMPUTE_SAME_HOST_COLD_MIGRATE = 48
|MIN_COMPUTE_SAME_HOST_COLD_MIGRATE = 655654

  Refactor the line of code above to the incorrect code. Then execute
  the unit tests.

  Expected result
  ===
  The unit tests should detect the fault.

  Actual result
  ===
  The fault was not detected by the unit tests.

  Environment
  ===
  The code tested is on the stable/ussuri branch.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1918348/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1918347] [NEW] Fault Injection #2039 - improve unit test effectiveness

2021-03-09 Thread Henrique Marques
Public bug reported:

Description
===
I have performed fault injection in openstack nova by changing the code of 
compute/api.py (inserting a representative/probable bug) and then ran the unit, 
functional and integration tests and discover that some of the bugs inserted 
were not detected by the test suite:
The reference WVIV (Wrong value used in variable initialization) is a type of 
fault where the value used in a variable initialization is set to an incorrect 
value.

Steps to reproduce
==

Line of Code|Original Code  |Incorrect Code
106 |MIN_COMPUTE_SYNC_COMPUTE_STATUS_DISABLED = 38  
|MIN_COMPUTE_SYNC_COMPUTE_STATUS_DISABLED = 56484

Refactor the line of code above to the incorrect code. Then execute the
unit tests.

Expected result
===
The unit tests should detect the fault.

Actual result
===
The fault was not detected by the unit tests.

Environment
===
The code tested is on the stable/ussuri branch.

** Affects: nova
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1918347

Title:
  Fault Injection #2039 - improve unit test effectiveness

Status in OpenStack Compute (nova):
  New

Bug description:
  Description
  ===
  I have performed fault injection in openstack nova by changing the code of 
compute/api.py (inserting a representative/probable bug) and then ran the unit, 
functional and integration tests and discover that some of the bugs inserted 
were not detected by the test suite:
  The reference WVIV (Wrong value used in variable initialization) is a type of 
fault where the value used in a variable initialization is set to an incorrect 
value.

  Steps to reproduce
  ==

  Line of Code  |Original Code  |Incorrect Code
  106   |MIN_COMPUTE_SYNC_COMPUTE_STATUS_DISABLED = 38  
|MIN_COMPUTE_SYNC_COMPUTE_STATUS_DISABLED = 56484

  Refactor the line of code above to the incorrect code. Then execute
  the unit tests.

  Expected result
  ===
  The unit tests should detect the fault.

  Actual result
  ===
  The fault was not detected by the unit tests.

  Environment
  ===
  The code tested is on the stable/ussuri branch.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1918347/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1918349] [NEW] Fault Injection #2042 - improve unit test effectiveness

2021-03-09 Thread Henrique Marques
Public bug reported:

Description
===
I have performed fault injection in openstack nova by changing the code of 
compute/api.py (inserting a representative/probable bug) and then ran the unit, 
functional and integration tests and discover that some of the bugs inserted 
were not detected by the test suite:
The reference WVIV (Wrong value used in variable initialization) is a type of 
fault where the value used in a variable initialization is set to an incorrect 
value.

Steps to reproduce
==

Line of Code|Original Code  |Incorrect Code
107 |MIN_COMPUTE_CROSS_CELL_RESIZE = 47 |MIN_COMPUTE_CROSS_CELL_RESIZE 
= 47546

Refactor the line of code above to the incorrect code. Then execute the
unit tests.

Expected result
===
The unit tests should detect the fault.

Actual result
===
The fault was not detected by the unit tests.

Environment
===
The code tested is on the stable/ussuri branch.

** Affects: nova
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1918349

Title:
  Fault Injection #2042 - improve unit test effectiveness

Status in OpenStack Compute (nova):
  New

Bug description:
  Description
  ===
  I have performed fault injection in openstack nova by changing the code of 
compute/api.py (inserting a representative/probable bug) and then ran the unit, 
functional and integration tests and discover that some of the bugs inserted 
were not detected by the test suite:
  The reference WVIV (Wrong value used in variable initialization) is a type of 
fault where the value used in a variable initialization is set to an incorrect 
value.

  Steps to reproduce
  ==

  Line of Code  |Original Code  |Incorrect Code
  107   |MIN_COMPUTE_CROSS_CELL_RESIZE = 47 |MIN_COMPUTE_CROSS_CELL_RESIZE 
= 47546

  Refactor the line of code above to the incorrect code. Then execute
  the unit tests.

  Expected result
  ===
  The unit tests should detect the fault.

  Actual result
  ===
  The fault was not detected by the unit tests.

  Environment
  ===
  The code tested is on the stable/ussuri branch.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1918349/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1918346] [NEW] Fault Injection #7 - improve unit test effectiveness

2021-03-09 Thread Henrique Marques
Public bug reported:

Description
===
I have performed fault injection in openstack nova by changing the code of 
compute/api.py (inserting a representative/probable bug) and then ran the unit, 
functional and integration tests and discover that some of the bugs inserted 
were not detected by the test suite:
The reference WIDS (Wrong string in initial data) is a type of fault where the 
string used in a variable initialization is set to an incorrect value.
 

Steps to reproduce
==

Line of Code|Original Code  |Incorrect Code
3152|attr = 'task_state'|attr = 'K53RIP5A'

Refactor the line of code above to the incorrect code. Then execute the
unit tests.

Expected result
===
The unit tests should detect the fault.

Actual result
===
The fault was not detected by the unit tests.

Environment
===
The code tested is on the stable/ussuri branch.

** Affects: nova
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1918346

Title:
  Fault Injection #7 - improve unit test effectiveness

Status in OpenStack Compute (nova):
  New

Bug description:
  Description
  ===
  I have performed fault injection in openstack nova by changing the code of 
compute/api.py (inserting a representative/probable bug) and then ran the unit, 
functional and integration tests and discover that some of the bugs inserted 
were not detected by the test suite:
  The reference WIDS (Wrong string in initial data) is a type of fault where 
the string used in a variable initialization is set to an incorrect value.
   

  Steps to reproduce
  ==

  Line of Code  |Original Code  |Incorrect Code
  3152  |attr = 'task_state'|attr = 'K53RIP5A'

  Refactor the line of code above to the incorrect code. Then execute
  the unit tests.

  Expected result
  ===
  The unit tests should detect the fault.

  Actual result
  ===
  The fault was not detected by the unit tests.

  Environment
  ===
  The code tested is on the stable/ussuri branch.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1918346/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1918344] [NEW] Fault Injection #4 - improve unit test effectiveness

2021-03-09 Thread Henrique Marques
Public bug reported:

Description
===
I have performed fault injection in openstack nova by changing the code of 
compute/api.py (inserting a representative/probable bug) and then ran the unit, 
functional and integration tests and discover that some of the bugs inserted 
were not detected by the test suite:
The reference WIDS (Wrong string in initial data) is a type of fault where the 
string used in a variable initialization is set to an incorrect value.
 

Steps to reproduce
==

Line of CodeOriginal Code   Incorrect Code
104 AGGREGATE_ACTION_ADD = 'Add'
AGGREGATE_ACTION_ADD = '71ENJL8W'

Refactor the line of code above to the incorrect code. Then execute the
unit tests.

Expected result
===
The unit tests should detect the fault.

Actual result
===
The fault was not detected by the unit tests.

Environment
===
The code tested is on the stable/ussuri branch.

** Affects: nova
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1918344

Title:
  Fault Injection #4 - improve unit test effectiveness

Status in OpenStack Compute (nova):
  New

Bug description:
  Description
  ===
  I have performed fault injection in openstack nova by changing the code of 
compute/api.py (inserting a representative/probable bug) and then ran the unit, 
functional and integration tests and discover that some of the bugs inserted 
were not detected by the test suite:
  The reference WIDS (Wrong string in initial data) is a type of fault where 
the string used in a variable initialization is set to an incorrect value.
   

  Steps to reproduce
  ==

  Line of Code  Original Code   Incorrect Code
  104   AGGREGATE_ACTION_ADD = 'Add'
AGGREGATE_ACTION_ADD = '71ENJL8W'

  Refactor the line of code above to the incorrect code. Then execute
  the unit tests.

  Expected result
  ===
  The unit tests should detect the fault.

  Actual result
  ===
  The fault was not detected by the unit tests.

  Environment
  ===
  The code tested is on the stable/ussuri branch.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1918344/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1918345] [NEW] Fault Injection #6 - improve unit test effectiveness

2021-03-09 Thread Henrique Marques
Public bug reported:

Description
===
I have performed fault injection in openstack nova by changing the code of 
compute/api.py (inserting a representative/probable bug) and then ran the unit, 
functional and integration tests and discover that some of the bugs inserted 
were not detected by the test suite:
The reference WIDS (Wrong string in initial data) is a type of fault where the 
string used in a variable initialization is set to an incorrect value.
 

Steps to reproduce
==

Line of Code|Original Code  |Incorrect Code
3155|attr = 'vm_state'  |attr = 'KMJHW8MG'


Refactor the line of code above to the incorrect code. Then execute the unit 
tests.

Expected result
===
The unit tests should detect the fault.

Actual result
===
The fault was not detected by the unit tests.

Environment
===
The code tested is on the stable/ussuri branch.

** Affects: nova
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1918345

Title:
  Fault Injection #6 - improve unit test effectiveness

Status in OpenStack Compute (nova):
  New

Bug description:
  Description
  ===
  I have performed fault injection in openstack nova by changing the code of 
compute/api.py (inserting a representative/probable bug) and then ran the unit, 
functional and integration tests and discover that some of the bugs inserted 
were not detected by the test suite:
  The reference WIDS (Wrong string in initial data) is a type of fault where 
the string used in a variable initialization is set to an incorrect value.
   

  Steps to reproduce
  ==

  Line of Code  |Original Code  |Incorrect Code
  3155  |attr = 'vm_state'  |attr = 'KMJHW8MG'

  
  Refactor the line of code above to the incorrect code. Then execute the unit 
tests.

  Expected result
  ===
  The unit tests should detect the fault.

  Actual result
  ===
  The fault was not detected by the unit tests.

  Environment
  ===
  The code tested is on the stable/ussuri branch.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1918345/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1918340] [NEW] Fault Injection #1 - improve unit test effectiveness

2021-03-09 Thread Henrique Marques
Public bug reported:

Description
===
I have performed fault injection in openstack nova by changing the code of 
compute/api.py (inserting a representative/probable bug) and then ran the unit, 
functional and integration tests and discover that some of the bugs inserted 
were not detected by the test suite:
The reference WIDS (Wrong string in initial data) is a type of fault where the 
string used in a variable initialization is set to an incorrect value.
 

Steps to reproduce
==

Line of CodeOriginal Code   Incorrect Code
102 AGGREGATE_ACTION_UPDATE_META = 'UpdateMeta' 
AGGREGATE_ACTION_UPDATE_META = 'NHZWTCGB'

Refactor the line of code above to the incorrect code. Then execute the
unit tests.

Expected result
===
The unit tests should detect the fault.

Actual result
===
The fault was not detected by the unit tests.

Environment
===
The code tested is on the stable/ussuri branch.

** Affects: nova
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1918340

Title:
  Fault Injection #1 - improve unit test effectiveness

Status in OpenStack Compute (nova):
  New

Bug description:
  Description
  ===
  I have performed fault injection in openstack nova by changing the code of 
compute/api.py (inserting a representative/probable bug) and then ran the unit, 
functional and integration tests and discover that some of the bugs inserted 
were not detected by the test suite:
  The reference WIDS (Wrong string in initial data) is a type of fault where 
the string used in a variable initialization is set to an incorrect value.
   

  Steps to reproduce
  ==

  Line of Code  Original Code   Incorrect Code
  102   AGGREGATE_ACTION_UPDATE_META = 'UpdateMeta' 
AGGREGATE_ACTION_UPDATE_META = 'NHZWTCGB'

  Refactor the line of code above to the incorrect code. Then execute
  the unit tests.

  Expected result
  ===
  The unit tests should detect the fault.

  Actual result
  ===
  The fault was not detected by the unit tests.

  Environment
  ===
  The code tested is on the stable/ussuri branch.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1918340/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1918342] [NEW] Fault Injection #2 - improve unit test effectiveness

2021-03-09 Thread Henrique Marques
Public bug reported:

Description
===
I have performed fault injection in openstack nova by changing the code of 
compute/api.py (inserting a representative/probable bug) and then ran the unit, 
functional and integration tests and discover that some of the bugs inserted 
were not detected by the test suite:
The reference WIDS (Wrong string in initial data) is a type of fault where the 
string used in a variable initialization is set to an incorrect value.
 

Steps to reproduce
==

Line of CodeOriginal Code   Incorrect Code
101 AGGREGATE_ACTION_UPDATE = 'Update'  
AGGREGATE_ACTION_UPDATE = 'BGIAPGHU'

Refactor the line of code above to the incorrect code. Then execute the
unit tests.

Expected result
===
The unit tests should detect the fault.

Actual result
===
The fault was not detected by the unit tests.

Environment
===
The code tested is on the stable/ussuri branch.

** Affects: nova
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1918342

Title:
  Fault Injection #2 - improve unit test effectiveness

Status in OpenStack Compute (nova):
  New

Bug description:
  Description
  ===
  I have performed fault injection in openstack nova by changing the code of 
compute/api.py (inserting a representative/probable bug) and then ran the unit, 
functional and integration tests and discover that some of the bugs inserted 
were not detected by the test suite:
  The reference WIDS (Wrong string in initial data) is a type of fault where 
the string used in a variable initialization is set to an incorrect value.
   

  Steps to reproduce
  ==

  Line of Code  Original Code   Incorrect Code
  101   AGGREGATE_ACTION_UPDATE = 'Update'  
AGGREGATE_ACTION_UPDATE = 'BGIAPGHU'

  Refactor the line of code above to the incorrect code. Then execute
  the unit tests.

  Expected result
  ===
  The unit tests should detect the fault.

  Actual result
  ===
  The fault was not detected by the unit tests.

  Environment
  ===
  The code tested is on the stable/ussuri branch.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1918342/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1918343] [NEW] Fault Injection #3 - improve unit test effectiveness

2021-03-09 Thread Henrique Marques
Public bug reported:

Description
===
I have performed fault injection in openstack nova by changing the code of 
compute/api.py (inserting a representative/probable bug) and then ran the unit, 
functional and integration tests and discover that some of the bugs inserted 
were not detected by the test suite:
The reference WIDS (Wrong string in initial data) is a type of fault where the 
string used in a variable initialization is set to an incorrect value.
 

Steps to reproduce
==

Line of CodeOriginal Code   Incorrect Code
103 AGGREGATE_ACTION_DELETE = 'Delete'  
AGGREGATE_ACTION_DELETE = '3E6KOPNF'

Refactor the line of code above to the incorrect code. Then execute the
unit tests.

Expected result
===
The unit tests should detect the fault.

Actual result
===
The fault was not detected by the unit tests.

Environment
===
The code tested is on the stable/ussuri branch.

** Affects: nova
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1918343

Title:
  Fault Injection #3 - improve unit test effectiveness

Status in OpenStack Compute (nova):
  New

Bug description:
  Description
  ===
  I have performed fault injection in openstack nova by changing the code of 
compute/api.py (inserting a representative/probable bug) and then ran the unit, 
functional and integration tests and discover that some of the bugs inserted 
were not detected by the test suite:
  The reference WIDS (Wrong string in initial data) is a type of fault where 
the string used in a variable initialization is set to an incorrect value.
   

  Steps to reproduce
  ==

  Line of Code  Original Code   Incorrect Code
  103   AGGREGATE_ACTION_DELETE = 'Delete'  
AGGREGATE_ACTION_DELETE = '3E6KOPNF'

  Refactor the line of code above to the incorrect code. Then execute
  the unit tests.

  Expected result
  ===
  The unit tests should detect the fault.

  Actual result
  ===
  The fault was not detected by the unit tests.

  Environment
  ===
  The code tested is on the stable/ussuri branch.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1918343/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1896734] Re: A privsep daemon spawned by neutron-openvswitch-agent hangs when debug logging is enabled (large number of registered NICs) - an RPC response is too large for msgpac

2021-03-09 Thread Corey Bryant
** Also affects: neutron (Ubuntu)
   Importance: Undecided
   Status: New

** Also affects: neutron (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Also affects: python-oslo.privsep (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Also affects: neutron (Ubuntu Hirsute)
   Importance: Undecided
   Status: New

** Also affects: python-oslo.privsep (Ubuntu Hirsute)
   Importance: Undecided
   Status: New

** Also affects: neutron (Ubuntu Groovy)
   Importance: Undecided
   Status: New

** Also affects: python-oslo.privsep (Ubuntu Groovy)
   Importance: Undecided
   Status: New

** Changed in: neutron (Ubuntu Focal)
   Importance: Undecided => Medium

** Changed in: neutron (Ubuntu Focal)
   Status: New => Triaged

** Changed in: neutron (Ubuntu Groovy)
   Importance: Undecided => Medium

** Changed in: neutron (Ubuntu Groovy)
   Status: New => Triaged

** Changed in: neutron (Ubuntu Hirsute)
   Importance: Undecided => Medium

** Changed in: neutron (Ubuntu Hirsute)
   Status: New => Triaged

** Also affects: cloud-archive
   Importance: Undecided
   Status: New

** Also affects: cloud-archive/ussuri
   Importance: Undecided
   Status: New

** Also affects: cloud-archive/victoria
   Importance: Undecided
   Status: New

** Changed in: cloud-archive/ussuri
   Importance: Undecided => Medium

** Changed in: cloud-archive/ussuri
   Status: New => Triaged

** Changed in: cloud-archive/victoria
   Importance: Undecided => Medium

** Changed in: cloud-archive/victoria
   Status: New => Triaged

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1896734

Title:
  A privsep daemon spawned by neutron-openvswitch-agent hangs when debug
  logging is enabled (large number of registered NICs) - an RPC response
  is too large for msgpack

Status in OpenStack neutron-openvswitch charm:
  Invalid
Status in Ubuntu Cloud Archive:
  Triaged
Status in Ubuntu Cloud Archive ussuri series:
  Triaged
Status in Ubuntu Cloud Archive victoria series:
  Triaged
Status in neutron:
  Fix Released
Status in oslo.privsep:
  New
Status in neutron package in Ubuntu:
  Triaged
Status in python-oslo.privsep package in Ubuntu:
  New
Status in neutron source package in Focal:
  Triaged
Status in python-oslo.privsep source package in Focal:
  New
Status in neutron source package in Groovy:
  Triaged
Status in python-oslo.privsep source package in Groovy:
  New
Status in neutron source package in Hirsute:
  Triaged
Status in python-oslo.privsep source package in Hirsute:
  New

Bug description:
  When there is a large amount of netdevs registered in the kernel and
  debug logging is enabled, neutron-openvswitch-agent and the privsep
  daemon spawned by it hang since the RPC call result sent by the
  privsep daemon over a unix socket exceeds the message sizes that the
  msgpack library can handle.

  The impact of this is that enabling debug logging on the cloud
  completely stalls neutron-openvswitch-agents and makes them "dead"
  from the Neutron server perspective.

  The issue is summarized in detail in comment #5
  https://bugs.launchpad.net/oslo.privsep/+bug/1896734/comments/5

  
  Old Description

  While trying to debug a different issue, I encountered a situation
  where privsep hangs in the process of handling a request from neutron-
  openvswitch-agent when debug logging is enabled (juju debug-log
  neutron-openvswitch=true):

  https://bugs.launchpad.net/charm-neutron-openvswitch/+bug/1895652/comments/11
  https://bugs.launchpad.net/charm-neutron-openvswitch/+bug/1895652/comments/12

  The issue gets reproduced reliably in the environment where I
  encountered it on all units. As a result, neutron-openvswitch-agent
  services hang while waiting for a response from the privsep daemon and
  do not progress past basic initialization. They never post any state
  back to the Neutron server and thus are marked dead by it.

  The processes though are shown as "active (running)" by systemd which
  adds to the confusion since they do indeed start from the systemd's
  perspective.

  systemctl --no-pager status neutron-openvswitch-agent.service
  ● neutron-openvswitch-agent.service - Openstack Neutron Open vSwitch Plugin 
Agent
     Loaded: loaded (/lib/systemd/system/neutron-openvswitch-agent.service; 
enabled; vendor preset: enabled)
     Active: active (running) since Wed 2020-09-23 08:28:41 UTC; 25min ago
   Main PID: 247772 (/usr/bin/python)
  Tasks: 4 (limit: 9830)
     CGroup: /system.slice/neutron-openvswitch-agent.service
     ├─247772 /usr/bin/python3 /usr/bin/neutron-openvswitch-agent 
--config-file=/etc/neutron/neutron.conf 
--config-file=/etc/neutron/plugins/ml2/openvswitch_…og
     └─248272 /usr/bin/python3 /usr/bin/privsep-helper --config-file 

[Yahoo-eng-team] [Bug 1853613] Re: VMs don't get ip from dhcp after compute restart

2021-03-09 Thread Brian Murray
** Also affects: neutron (Ubuntu)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1853613

Title:
  VMs don't get ip from dhcp after compute restart

Status in neutron:
  Fix Released
Status in neutron package in Ubuntu:
  Incomplete

Bug description:
  Env: pike + ovs + vxlan + l2pop + iptables_hybrid.
  Dhcp agent on differnt node than compute.

  Steps:
  1. Boot 4 or more vms to same compute and same vxlan net.
  2. Wait until they are fully running and reboot compute node.
  3. After boot the vms are in status SHUTOFF. Start the vms.

  Vms don't get an ip address from neutron dhcp. The flood to tunnels
  flow (br-tun table 22) for the network is missing, so broadcasts like
  dhcp requests don't get on a tunnel to the node with dhcp agent.
  Neutron server did not send the flooding entry to the agent. It only
  does that for the first or second active port, or if the agent is
  restarted.

  After the compute boots, neutron-ovs-cleanup runs first and deletes
  the qvo ports from br-int [4]. Then the ovs-agent starts and nova-
  compute after it. Nova-compute destroys the domains and moves the vms
  to SHUTOFF status. It also (for some reason) recreates the qbr linux
  bridges and qvb/qvo veths connected to br-int. So neutron continues to
  see the ports as ACTIVE even though the vms are SHUTOFF, and
  agent_active_ports [1] never drops below 3. Also nova-compute might
  start a short time after the ovs-agent and the new ports are not
  detected in first iteration of the ovs agent loop, so agent_restarted
  will be false here [2].

  Before [3] agent_restarted was true if the agent was running for less
  than agent_boot_time (default 180 sec) and the problem did not show.

  It does not happen if neutron-ovs-cleanup is disabled. Then the ovs
  agent first treats them as skipped_devices and they get status DOWN.

  [1] 
https://github.com/openstack/neutron/blob/21a52f7ae597f7992f32ff41cedff0c31e35c762/neutron/plugins/ml2/drivers/l2pop/mech_driver.py#L306
  [2] 
https://github.com/openstack/neutron/blob/21a52f7ae597f7992f32ff41cedff0c31e35c762/neutron/plugins/ml2/drivers/l2pop/mech_driver.py#L310
 
  [3] 
https://opendev.org/openstack/neutron/commit/62fe7852bbd70a24174853997096c52ee015e269
  [4] https://bugs.launchpad.net/neutron/+bug/1853582

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1853613/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1864822] Re: Openvswitch Agent - Connexion openvswitch DB Broken

2021-03-09 Thread Brian Murray
** Also affects: neutron (Ubuntu)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1864822

Title:
  Openvswitch Agent - Connexion openvswitch DB Broken

Status in neutron:
  Fix Released
Status in neutron package in Ubuntu:
  Incomplete

Bug description:
  Hi all,

  We have deployed more OpenStack plateform in my company.
  We used kolla ansible to deploy our plateforms.
  Here is the configuration that we applied : 
  kolla_base_distro: "centos"
  kolla_install_type : "binary"
  openstack_version : "stein"

  Neutron architecture : 
  HA l3 enable
  DVR enable
  SNAT Enabled
  multiple vlan provider : True

  Note: Our plateforms are multi-region

  Recently, we have upgraded a master region from rocky to stein with kolla 
ansible upgrade procedure.
  Since ugrade, sometimes openvswitch agent lost connexion to ovsdb.
  We have found this error in neutron-openvswitch-agent.log : 
"tcp:127.0.0.1:6640: send error: Broken pipe".
  And we have found this errors in ovsdb-server.log : 
  2020-02-24T23:13:22.644Z|9|reconnect|ERR|tcp:127.0.0.1:50260: no response 
to inactivity probe after 5 seconds, disconnecting
  2020-02-25T04:10:55.893Z|00010|reconnect|ERR|tcp:127.0.0.1:58544: no response 
to inactivity probe after 5 seconds, disconnecting
  2020-02-25T07:21:12.301Z|00011|reconnect|ERR|tcp:127.0.0.1:34918: no response 
to inactivity probe after 5 seconds, disconnecting
  2020-02-25T09:21:45.533Z|00012|reconnect|ERR|tcp:127.0.0.1:37782: no response 
to inactivity probe after 5 seconds, disconnecting

  When we experience this issue, all "NORMAL" type flows inside br-ex doesn't 
get out.
  Example of flows stuck: 
  (neutron-openvswitch-agent)[root@cnp69s12p07 /]# ovs-ofctl dump-flows br-ex | 
grep NORMAL
   cookie=0x7adbd675f988912b, duration=72705.077s, table=0, n_packets=185, 
n_bytes=16024, idle_age=65534, hard_age=65534, priority=0 actions=NORMAL
   cookie=0x7adbd675f988912b, duration=72695.007s, table=2, n_packets=11835702, 
n_bytes=5166123797, idle_age=0, hard_age=65534, priority=4,in_port=5,dl_vlan=1 
actions=mod_vlan_vid:12,NORMAL
   cookie=0x7adbd675f988912b, duration=72694.928s, table=2, n_packets=4133243, 
n_bytes=349654412, idle_age=0, hard_age=65534, priority=4,in_port=5,dl_vlan=9 
actions=mod_vlan_vid:18,NORMAL

  Workaround to solve this issue: 
  - stop openvswitch_db openvswitch_vswitchd neutron_openvswitch_agent 
neutron_l3_agent (containers)
  - start containers:  openvswitch_db openvswitch_vswitchd
  - start neutron_l3_agent neutron_openvswitch_agent

  Note: we have keep ovs connection timeout options by default : 
  - of_connect_timeout: 300
  - of_request_timeout: 300
  - of_inactivity_probe: 10

  
  Thank you in advance for your help.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1864822/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1829410] Re: vendor_data2 not supported

2021-03-09 Thread Dan Watkins
*** This bug is a duplicate of bug 1841104 ***
https://bugs.launchpad.net/bugs/1841104

Marked as a duplicate: the good news is that we've released a fix for
this!

** This bug has been marked a duplicate of bug 1841104
   Openstack's vendor_data2.json is not handled

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to cloud-init.
https://bugs.launchpad.net/bugs/1829410

Title:
  vendor_data2 not supported

Status in cloud-init:
  Triaged

Bug description:
  For the OpenStack datasource, I see some references to
  vendor_data2.json but it is not accessible via
  cloud.datasource.vendordata_pure or cloud.datasource.vendordata_raw or
  any other variable. Can full support be added for vendor_data2? It
  seems like it is supported, but looks like it is never requested or
  parsed.

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-init/+bug/1829410/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1829411] Re: vendor_data2 not supported

2021-03-09 Thread Dan Watkins
*** This bug is a duplicate of bug 1841104 ***
https://bugs.launchpad.net/bugs/1841104

** This bug is no longer a duplicate of bug 1829410
   vendor_data2 not supported
** This bug has been marked a duplicate of bug 1841104
   Openstack's vendor_data2.json is not handled

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to cloud-init.
https://bugs.launchpad.net/bugs/1829411

Title:
  vendor_data2 not supported

Status in cloud-init:
  New

Bug description:
  For the OpenStack datasource, I see some references to
  vendor_data2.json but it is not accessible via
  cloud.datasource.vendordata_pure or cloud.datasource.vendordata_raw or
  any other variable. Can full support be added for vendor_data2? It
  seems like it is supported, but looks like it is never requested or
  parsed.

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-init/+bug/1829411/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1545702] Re: [OSSN-0088] Images v2 api metadef vulnerability

2021-03-09 Thread Jeremy Stanley
** Summary changed:

- Images v2 api metadef vulnerability
+ [OSSN-0088] Images v2 api metadef vulnerability

** Also affects: ossn
   Importance: Undecided
   Status: New

** Changed in: ossn
   Status: New => Fix Released

** Changed in: ossn
   Importance: Undecided => Critical

** Changed in: ossn
 Assignee: (unassigned) => Abhishek Kekane (abhishek-kekane)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Glance.
https://bugs.launchpad.net/bugs/1545702

Title:
  [OSSN-0088] Images v2 api metadef vulnerability

Status in Glance:
  Confirmed
Status in OpenStack Security Advisory:
  Won't Fix
Status in OpenStack Security Notes:
  Fix Released

Bug description:
  It looks like a regular user can use the metadef api to create an
  unlimited number of records in the database.

   $ glance md-namespace-create ns1 xxx
   $ glance md-namespace-create ns2 xxx
   .
   .
   .

   $ glance md-tag-create --name tag OS::Software::WebServers
   $ glance md-tag-create --name tag2 OS::Software::WebServers
  .
  .
  .

  etc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/glance/+bug/1545702/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1916922] Re: Glance leaks resource types across namespaces

2021-03-09 Thread Jeremy Stanley
We'll be switching this bug public shortly along with bug 1916926 under
a single publication (OSSN-0088).

** Description changed:

- This issue is being treated as a potential security risk under
- embargo. Please do not make any public mention of embargoed
- (private) security vulnerabilities before their coordinated
- publication by the OpenStack Vulnerability Management Team in the
- form of an official OpenStack Security Advisory. This includes
- discussion of the bug or associated fixes in public forums such as
- mailing lists, code review systems and bug trackers. Please also
- avoid private disclosure to other individuals not already approved
- for access to this information, and provide this same reminder to
- those who are made aware of the issue prior to publication. All
- discussion should remain confined to this private bug report, and
- any proposed fixes should be added to the bug as attachments. This
- embargo shall not extend past 2021-05-26 and will be made
- public by or on that date even if no fix is identified.
- 
- 
- As a user of a project, I can see resource types associated to private 
namespaces I don't have access to:
+ As a user of a project, I can see resource types associated to private
+ namespaces I don't have access to:
  
  ╭─ubuntu@glance-devstack ~/devstack ‹master*›
  ╰─➤  $ cat alicerc
  export OS_CACERT=
  export OS_PROJECT_NAME=separate
  export OS_USERNAME=alice
  export OS_PASSWORD=password
  export OS_REGION_NAME=RegionOne
  export OS_IDENTITY_API_VERSION=3
  export OS_AUTH_TYPE=password
  export OS_AUTH_URL=http://192.168.1.155/identity
  export OS_USER_DOMAIN_ID=default
  export OS_PROJECT_DOMAIN_ID=default
  export OS_VOLUME_API_VERSION=3
  ╭─ubuntu@glance-devstack ~/devstack ‹master*›
  ╰─➤  $ source alicerc
  ╭─ubuntu@glance-devstack ~/devstack ‹master*›
  ╰─➤  $ glance md-namespace-list
  +--+
  | namespace|
  +--+
  | OS::Software::DBMS   |
  | CIM::ResourceAllocationSettingData   |
  | OS::Compute::CPUPinning  |
  | OS::Compute::Watchdog|
  | OS::Compute::GuestMemoryBacking  |
  | OS::Compute::AggregateDiskFilter |
  | OS::Compute::RandomNumberGenerator   |
  | OS::Compute::Hypervisor  |
  | OS::Compute::AggregateIoOpsFilter|
  | OS::Compute::VirtCPUTopology |
  | OS::Compute::HostCapabilities|
  | CIM::ProcessorAllocationSettingData  |
  | OS::Compute::GuestShutdownBehavior   |
  | OS::Cinder::Volumetype   |
  | OS::Software::WebServers |
  | OS::Compute::Libvirt |
  | OS::Compute::XenAPI  |
  | OS::Compute::Quota   |
  | OS::Compute::VMwareFlavor|
  | OS::Compute::VMwareQuotaFlavor   |
  | OS::Compute::InstanceData|
  | OS::Compute::LibvirtImage|
  | OS::Compute::AggregateNumInstancesFilter |
  | OS::Glance::Signatures   |
  | CIM::VirtualSystemSettingData|
  | CIM::StorageAllocationSettingData|
  | OS::Software::Runtimes   |
  | OS::Compute::VMware  |
  +--+
  ╭─ubuntu@glance-devstack ~/devstack ‹master*›
  ╰─➤  $ glance md-namespace-create alice-namespace
  ++--+
  | Property   | Value|
  ++--+
  | created_at | 2021-02-25T15:55:55Z |
  | namespace  | alice-namespace  |
  | owner  | 67f1495e5dc145abbfa7059c63c6eda2 |
  | protected  | False|
  | schema | /v2/schemas/metadefs/namespace   |
  | updated_at | 2021-02-25T15:55:55Z |
  | visibility | private  |
  ++--+
  ╭─ubuntu@glance-devstack ~/devstack ‹master*›
  ╰─➤  $ glance md-resource-type-associate --name alice-resource-type 
alice-namespace
  ++--+
  | Property   | Value|
  ++--+
  | created_at | 2021-02-25T15:57:29Z |
  | name   | alice-resource-type  |
  | updated_at | 2021-02-25T15:57:29Z |
  ++--+
  
  Now as a separate user
  
  ╭─ubuntu@glance-devstack ~/devstack ‹master*›
  ╰─➤  $ source openrc demo demo
  is_service_enabled:29: command not found: set +o xtrace
  WARNING: setting legacy OS_TENANT_NAME to support cli tools.
  ╭─ubuntu@glance-devstack ~/devstack ‹master*›
  ╰─➤  $ glance md-resource-type-list
  +-+
  | name|
  +-+
  | OS::Glance::Image   |
  | OS::Cinder::Volume  |
  | OS::Nova::Server|
  | OS::Nova::Aggregate |
  | OS::Nova::Flavor|
  | 

[Yahoo-eng-team] [Bug 1901527] Re: Agent API gets broken if OVN DB is upgraded to the one introducing chassis_private

2021-03-09 Thread Jakub Libosvar
Yes, I think it's
https://review.opendev.org/c/openstack/neutron/+/760967 but you're
right, it's fixed now. Thanks for pointing it out!

** Changed in: neutron
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1901527

Title:
  Agent API gets broken if OVN DB is upgraded to the one introducing
  chassis_private

Status in neutron:
  Fix Released

Bug description:
  Neutron determines which table to use for agent healthchecks at the
  initialization phase. With OVN databases that don't implement
  chassis_private table a chassis table is used, which has scaling
  impacts.

  However, if OVN DB is upgraded while Neutron is running, the
  healthchecks will be still performed on chassis table while OVN
  already uses chassis_private. This leads to reporting dead agents by
  the API.

  We should detect OVN was upgraded and start using chassis_private
  table since.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1901527/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1916926] Re: Glance leaks namespace existence to unauthorized users

2021-03-09 Thread Jeremy Stanley
** Description changed:

- This issue is being treated as a potential security risk under
- embargo. Please do not make any public mention of embargoed
- (private) security vulnerabilities before their coordinated
- publication by the OpenStack Vulnerability Management Team in the
- form of an official OpenStack Security Advisory. This includes
- discussion of the bug or associated fixes in public forums such as
- mailing lists, code review systems and bug trackers. Please also
- avoid private disclosure to other individuals not already approved
- for access to this information, and provide this same reminder to
- those who are made aware of the issue prior to publication. All
- discussion should remain confined to this private bug report, and
- any proposed fixes should be added to the bug as attachments. This
- embargo shall not extend past 2021-05-26 and will be made
- public by or on that date even if no fix is identified.
- 
  ╭─ubuntu@glance-devstack ~/devstack ‹master*›
  ╰─➤  $ source openrc demo demo
  ╭─ubuntu@glance-devstack ~/devstack ‹master*›
  ╰─➤  $ openstack token issue
  
++-+
  | Field  | Value  

 |
  
++-+
  | expires| 2021-02-25T14:11:38+   

 |
  | id | 
gABgN6IKDUKTn9RNudtZD605vA9l9eErCcXDrdxZwfhePYVlAHXzzCdQs6FK6XDwFvuexzfymc0uX7NY5RisEnQmUBl6eLccgBMYE6vSpVWCDTkFuKIuPfLh3xSkJGjZcpG7nfJ_ImU_wCJJFgcclf1zHTHWQ9Y15k-mAE7l3xceqUkOx2Y
 |
  | project_id | ed4fade2e2cd4be0932ef30357f6d7a1   

 |
  | user_id| e83b2f50463c4959bcc00a96b52b2f86   

 |
  
++-+
  ╭─ubuntu@glance-devstack ~/devstack ‹master*›
  ╰─➤  $ glance md-namespace-show foo
  ++--+
  | Property   | Value|
  ++--+
  | created_at | 2021-02-25T04:54:10Z |
  | namespace  | foo  |
  | owner  | ed4fade2e2cd4be0932ef30357f6d7a1 |
  | protected  | False|
  | resource_type_associations | ["bar"]  |
  | schema | /v2/schemas/metadefs/namespace   |
  | updated_at | 2021-02-25T04:54:10Z |
  | visibility | private  |
  ++--+
  ╭─ubuntu@glance-devstack ~/devstack ‹master*›
  ╰─➤  $ source alicerc
  ╭─ubuntu@glance-devstack ~/devstack ‹master*›
  ╰─➤  $ glance md-resource-type-associate --name test foo
  HTTP 403 Forbidden: Forbidding request, metadata definition namespace=foo is 
not visible.
  
  This might not be a security issue since the user needs to know the
  namespace name, but opening this in private based on a recommendation
  from jokke.

** Information type changed from Private Security to Public

** Summary changed:

- Glance leaks namespace existence to unauthorized users
+ [OSSN-0088] Glance leaks namespace existence to unauthorized users

** Changed in: ossa
   Status: Incomplete => Won't Fix

** Also affects: ossn
   Importance: Undecided
   Status: New

** Changed in: ossn
   Status: New => Fix Released

** Changed in: ossn
   Importance: Undecided => Critical

** Changed in: ossn
 Assignee: (unassigned) => Abhishek Kekane (abhishek-kekane)

** Tags added: security

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Glance.
https://bugs.launchpad.net/bugs/1916926

Title:
  [OSSN-0088] Glance leaks namespace existence to unauthorized users

Status in Glance:
  New
Status in OpenStack Security Advisory:
  Won't Fix
Status in OpenStack Security Notes:
  Fix 

[Yahoo-eng-team] [Bug 1896203] Re: TypeError: Cannot look up record by empty string in check_for_igmp_snoop_support task

2021-03-09 Thread Lucas Alvares Gomes
Fixed by https://review.opendev.org/c/openstack/neutron/+/758391

** Changed in: neutron
   Status: In Progress => Fix Released

** Changed in: neutron
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1896203

Title:
  TypeError: Cannot look up record by empty string in
  check_for_igmp_snoop_support task

Status in neutron:
  Fix Released

Bug description:
  openstack ussuri deployment

  neutron: 16.1.0
  ovn: 20.06.2
  ovs: 2.13.1

  We are seeing the following traceback for one of maintenance tasks:

  --8<--8<--8<--
  2020-09-18 08:49:11.572 88 ERROR futurist.periodics 
[req-036b9eae-53cf-4c55-a946-8aa2dc6697c5 - - - - -] Failed to call periodic 
'neutron.plugins.ml2.drivers.ovn.mech_driver.ovsdb.maintenance.DBInconsistenciesPeriodics.check_for_igmp_snoop_support'
 (it runs every 600.00 seconds): TypeError: Cannot look up record by empty 
string
  2020-09-18 08:49:11.572 88 ERROR futurist.periodics Traceback (most recent 
call last):
  2020-09-18 08:49:11.572 88 ERROR futurist.periodics   File 
"/var/lib/kolla/venv/lib/python3.6/site-packages/futurist/periodics.py", line 
293, in run
  2020-09-18 08:49:11.572 88 ERROR futurist.periodics work()
  2020-09-18 08:49:11.572 88 ERROR futurist.periodics   File 
"/var/lib/kolla/venv/lib/python3.6/site-packages/futurist/periodics.py", line 
67, in __call__
  2020-09-18 08:49:11.572 88 ERROR futurist.periodics return 
self.callback(*self.args, **self.kwargs)
  2020-09-18 08:49:11.572 88 ERROR futurist.periodics   File 
"/var/lib/kolla/venv/lib/python3.6/site-packages/futurist/periodics.py", line 
181, in decorator
  2020-09-18 08:49:11.572 88 ERROR futurist.periodics return f(*args, 
**kwargs)
  2020-09-18 08:49:11.572 88 ERROR futurist.periodics   File 
"/var/lib/kolla/venv/lib/python3.6/site-packages/neutron/plugins/ml2/drivers/ovn/mech_driver/ovsdb/maintenance.py",
 line 551, in check_for_igmp_snoop_support
  2020-09-18 08:49:11.572 88 ERROR futurist.periodics 
ovn_const.MCAST_FLOOD_UNREGISTERED: value})))
  2020-09-18 08:49:11.572 88 ERROR futurist.periodics   File 
"/usr/lib/python3.6/contextlib.py", line 88, in __exit__
  2020-09-18 08:49:11.572 88 ERROR futurist.periodics next(self.gen)
  2020-09-18 08:49:11.572 88 ERROR futurist.periodics   File 
"/var/lib/kolla/venv/lib/python3.6/site-packages/neutron/plugins/ml2/drivers/ovn/mech_driver/ovsdb/impl_idl_ovn.py",
 line 185, in transaction
  2020-09-18 08:49:11.572 88 ERROR futurist.periodics yield t
  2020-09-18 08:49:11.572 88 ERROR futurist.periodics   File 
"/usr/lib/python3.6/contextlib.py", line 88, in __exit__
  2020-09-18 08:49:11.572 88 ERROR futurist.periodics next(self.gen)
  2020-09-18 08:49:11.572 88 ERROR futurist.periodics   File 
"/var/lib/kolla/venv/lib/python3.6/site-packages/ovsdbapp/api.py", line 119, in 
transaction
  2020-09-18 08:49:11.572 88 ERROR futurist.periodics del 
self._nested_txns_map[cur_thread_id]
  2020-09-18 08:49:11.572 88 ERROR futurist.periodics   File 
"/var/lib/kolla/venv/lib/python3.6/site-packages/ovsdbapp/api.py", line 69, in 
__exit__
  2020-09-18 08:49:11.572 88 ERROR futurist.periodics self.result = 
self.commit()
  2020-09-18 08:49:11.572 88 ERROR futurist.periodics   File 
"/var/lib/kolla/venv/lib/python3.6/site-packages/ovsdbapp/backend/ovs_idl/transaction.py",
 line 62, in commit
  2020-09-18 08:49:11.572 88 ERROR futurist.periodics raise result.ex
  2020-09-18 08:49:11.572 88 ERROR futurist.periodics   File 
"/var/lib/kolla/venv/lib/python3.6/site-packages/ovsdbapp/backend/ovs_idl/connection.py",
 line 122, in run
  2020-09-18 08:49:11.572 88 ERROR futurist.periodics 
txn.results.put(txn.do_commit())
  2020-09-18 08:49:11.572 88 ERROR futurist.periodics   File 
"/var/lib/kolla/venv/lib/python3.6/site-packages/ovsdbapp/backend/ovs_idl/transaction.py",
 line 89, in do_commit
  2020-09-18 08:49:11.572 88 ERROR futurist.periodics command.run_idl(txn)
  2020-09-18 08:49:11.572 88 ERROR futurist.periodics   File 
"/var/lib/kolla/venv/lib/python3.6/site-packages/ovsdbapp/backend/ovs_idl/command.py",
 line 134, in run_idl
  2020-09-18 08:49:11.572 88 ERROR futurist.periodics record = 
self.api.lookup(self.table, self.record)
  2020-09-18 08:49:11.572 88 ERROR futurist.periodics   File 
"/var/lib/kolla/venv/lib/python3.6/site-packages/ovsdbapp/backend/ovs_idl/__init__.py",
 line 107, in lookup
  2020-09-18 08:49:11.572 88 ERROR futurist.periodics return 
self._lookup(table, record)
  2020-09-18 08:49:11.572 88 ERROR futurist.periodics   File 
"/var/lib/kolla/venv/lib/python3.6/site-packages/ovsdbapp/backend/ovs_idl/__init__.py",
 line 115, in _lookup
  2020-09-18 08:49:11.572 88 ERROR futurist.periodics raise 
TypeError("Cannot look up record by empty string")
  2020-09-18 08:49:11.572 88 ERROR futurist.periodics TypeError: Cannot look up 
record by empty 

[Yahoo-eng-team] [Bug 1918292] [NEW] rescuing a boot from volume instance failed with "no bootable device" when hw_rescue_bus=scsi

2021-03-09 Thread Jonathan Rosser
Public bug reported:

I spent some time understanding how to rescue instances which are boot-
from-volume.

After finding a setup which would rescue instances properly with
hw_rescue_device=disk and hw_rescue_bus=usb, switching the rescue bus to
hw_rescue_bus=scsi resulted in an Ubuntu Focal instance to show "No
bootable device" in the instance console when trying to rescue it.

Switching the bus back to USB and unrescue/rescue worked as expected.

Here is the xml from the scsi bus rescue attempt
http://paste.openstack.org/show/803383/

Commands like this were used:  openstack server rescue --image
d0d00858-0672-4d19-9e5a-fb120d78c0fc 81057513-24cd-
49e7-b1e5-939d4080bb21 --os-compute-api-version 2.87

Environment
===
1. Exact version of OpenStack you are running. 
   OpenStack Victoria, OpenStack-Ansible 22.0.0

2. Which hypervisor did you use?
   Libvirt + KVM. libvirt 6.0.0-0ubuntu8.5~cloud0
 
2. Which storage type did you use?
   All storage on Ceph

3. Which networking type did you use?
   Neutron with LinuxBridge

** Affects: nova
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1918292

Title:
  rescuing a boot from volume instance failed with "no bootable device"
  when hw_rescue_bus=scsi

Status in OpenStack Compute (nova):
  New

Bug description:
  I spent some time understanding how to rescue instances which are
  boot-from-volume.

  After finding a setup which would rescue instances properly with
  hw_rescue_device=disk and hw_rescue_bus=usb, switching the rescue bus
  to hw_rescue_bus=scsi resulted in an Ubuntu Focal instance to show "No
  bootable device" in the instance console when trying to rescue it.

  Switching the bus back to USB and unrescue/rescue worked as expected.

  Here is the xml from the scsi bus rescue attempt
  http://paste.openstack.org/show/803383/

  Commands like this were used:  openstack server rescue --image
  d0d00858-0672-4d19-9e5a-fb120d78c0fc 81057513-24cd-
  49e7-b1e5-939d4080bb21 --os-compute-api-version 2.87

  Environment
  ===
  1. Exact version of OpenStack you are running. 
 OpenStack Victoria, OpenStack-Ansible 22.0.0

  2. Which hypervisor did you use?
 Libvirt + KVM. libvirt 6.0.0-0ubuntu8.5~cloud0
   
  2. Which storage type did you use?
 All storage on Ceph

  3. Which networking type did you use?
 Neutron with LinuxBridge

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1918292/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1918288] [NEW] rescue of boot from volume image fails when --image is not specified

2021-03-09 Thread Jonathan Rosser
Public bug reported:

>From an environment where all storage is on ceph, it was not possible to
omit the --image parameter when rescuing a boot-from-volume instance as
suggested near the end of this doc:

https://docs.openstack.org/nova/latest/user/rescue.html

The doc implies that omitting --image will use the image of the rescued
instance as the rescue image.

Works:

openstack server rescue --image d0d00858-0672-4d19-9e5a-fb120d78c0fc
81057513-24cd-49e7-b1e5-939d4080bb21 --os-compute-api-version 2.87

Does not work:

openstack server rescue 81057513-24cd-49e7-b1e5-939d4080bb21 --os-
compute-api-version 2.87

Not specifying --image appears to succeed with the command line client:

REQ: curl -g -i --insecure -X POST 
http://10.11.128.30:8774/v2.1/servers/81057513-24cd-49e7-b1e5-939d4080bb21/action
 -H "Accept: application/json" -H "Content-Type: application/json" -H 
"OpenStack-API-Version: compute 2.87" -H "User-Agent: python-novaclient" -H 
"X-Auth-Token: 
{SHA256}9418545bce89f055d82cf493560aaa6c1e0fb0180f7bae5615006283e83dd999" -H 
"X-OpenStack-Nova-API-Version: 2.87" -d '{"rescue": null}'
http://10.11.128.30:8774 "POST 
/v2.1/servers/81057513-24cd-49e7-b1e5-939d4080bb21/action HTTP/1.1" 200 29

However in the nova compute log we see this stacktrace
http://paste.openstack.org/show/803379/

Environment
===
1. OpenStack Victoria / OpenStack-Ansible 22.0.0

2. Which hypervisor did you use?
   Libvirt + KVM libvirt 6.0.0-0ubuntu8.5~cloud0
 
2. Which storage type did you use? Ceph

3. Which networking type did you use?
   Neutron / LinuxBridge

** Affects: nova
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1918288

Title:
  rescue of boot from volume image fails when --image is not specified

Status in OpenStack Compute (nova):
  New

Bug description:
  From an environment where all storage is on ceph, it was not possible
  to omit the --image parameter when rescuing a boot-from-volume
  instance as suggested near the end of this doc:

  https://docs.openstack.org/nova/latest/user/rescue.html

  The doc implies that omitting --image will use the image of the
  rescued instance as the rescue image.

  Works:

  openstack server rescue --image d0d00858-0672-4d19-9e5a-fb120d78c0fc
  81057513-24cd-49e7-b1e5-939d4080bb21 --os-compute-api-version 2.87

  Does not work:

  openstack server rescue 81057513-24cd-49e7-b1e5-939d4080bb21 --os-
  compute-api-version 2.87

  Not specifying --image appears to succeed with the command line
  client:

  REQ: curl -g -i --insecure -X POST 
http://10.11.128.30:8774/v2.1/servers/81057513-24cd-49e7-b1e5-939d4080bb21/action
 -H "Accept: application/json" -H "Content-Type: application/json" -H 
"OpenStack-API-Version: compute 2.87" -H "User-Agent: python-novaclient" -H 
"X-Auth-Token: 
{SHA256}9418545bce89f055d82cf493560aaa6c1e0fb0180f7bae5615006283e83dd999" -H 
"X-OpenStack-Nova-API-Version: 2.87" -d '{"rescue": null}'
  http://10.11.128.30:8774 "POST 
/v2.1/servers/81057513-24cd-49e7-b1e5-939d4080bb21/action HTTP/1.1" 200 29

  However in the nova compute log we see this stacktrace
  http://paste.openstack.org/show/803379/

  Environment
  ===
  1. OpenStack Victoria / OpenStack-Ansible 22.0.0

  2. Which hypervisor did you use?
 Libvirt + KVM libvirt 6.0.0-0ubuntu8.5~cloud0
   
  2. Which storage type did you use? Ceph

  3. Which networking type did you use?
 Neutron / LinuxBridge

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1918288/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1918274] [NEW] Driver VLAN do not create the VlanAllocation registers if "network_vlan_ranges" only specify the network

2021-03-09 Thread Rodolfo Alonso
Public bug reported:

"network_vlan_ranges" allows to define a list of physical networks and
VLAN ranges [1]. But is possible to just define the physical network
without the VLAN ID ranges; in that case, the VLAN driver should take
all valid VLAN IDs (from 1 to 4094).

If no VLAN range is defined, when "VlanTypeDriver._sync_vlan_allocations" is 
called, the "ranges" variable is:
  ranges = {'physical_net': []}

We have two options here:
- Modify the sync method.
- Change the parser to populate, in case of not passing any VLAN range, the 
whole list of possible VLAN IDs for this physnet (I think last option is 
better).

[1]https://github.com/openstack/neutron/blob/ab78d29c68b3cfdc6732d2ed2bcec0677b1a34f3/neutron/conf/plugins/ml2/drivers/driver_type.py#L68-L76

** Affects: neutron
 Importance: Undecided
 Assignee: Rodolfo Alonso (rodolfo-alonso-hernandez)
 Status: New

** Changed in: neutron
 Assignee: (unassigned) => Rodolfo Alonso (rodolfo-alonso-hernandez)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1918274

Title:
  Driver VLAN do not create the VlanAllocation registers if
  "network_vlan_ranges" only specify the network

Status in neutron:
  New

Bug description:
  "network_vlan_ranges" allows to define a list of physical networks and
  VLAN ranges [1]. But is possible to just define the physical network
  without the VLAN ID ranges; in that case, the VLAN driver should take
  all valid VLAN IDs (from 1 to 4094).

  If no VLAN range is defined, when "VlanTypeDriver._sync_vlan_allocations" is 
called, the "ranges" variable is:
ranges = {'physical_net': []}

  We have two options here:
  - Modify the sync method.
  - Change the parser to populate, in case of not passing any VLAN range, the 
whole list of possible VLAN IDs for this physnet (I think last option is 
better).

  
[1]https://github.com/openstack/neutron/blob/ab78d29c68b3cfdc6732d2ed2bcec0677b1a34f3/neutron/conf/plugins/ml2/drivers/driver_type.py#L68-L76

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1918274/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1886956] Re: Functional test test_restart_wsgi_on_sighup_multiple_workers is failing sometimes

2021-03-09 Thread Slawek Kaplonski
After https://review.opendev.org/c/openstack/neutron/+/778080 was merged
I didn't saw it anymore in CI. So I'm closing that LP now.

** Changed in: neutron
   Status: Incomplete => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1886956

Title:
  Functional test test_restart_wsgi_on_sighup_multiple_workers is
  failing sometimes

Status in neutron:
  Fix Released

Bug description:
  Test
  
neutron.tests.functional.test_server.TestWsgiServer.test_restart_wsgi_on_sighup_multiple_workers
  is failing from time to time.

  Logstash query:
  
http://logstash.openstack.org/#dashboard/file/logstash.json?query=message%3A%5C%22in%20_test_restart_service_on_sighup%5C%22

  Failure example:
  
https://f7a63aeb9edd557a2176-4740624f0848c8c3257f704064a4516f.ssl.cf2.rackcdn.com/736026/4/gate
  /neutron-functional/d7d5c47/testr_results.html

  ft1.1: 
neutron.tests.functional.test_server.TestWsgiServer.test_restart_wsgi_on_sighup_multiple_workerstesttools.testresult.real._StringException:
 Traceback (most recent call last):
File 
"/home/zuul/src/opendev.org/openstack/neutron/neutron/common/utils.py", line 
704, in wait_until_true
  eventlet.sleep(sleep)
File 
"/home/zuul/src/opendev.org/openstack/neutron/.tox/dsvm-functional/lib/python3.6/site-packages/eventlet/greenthread.py",
 line 36, in sleep
  hub.switch()
File 
"/home/zuul/src/opendev.org/openstack/neutron/.tox/dsvm-functional/lib/python3.6/site-packages/eventlet/hubs/hub.py",
 line 298, in switch
  return self.greenlet.switch()
  eventlet.timeout.Timeout: 5 seconds

  During handling of the above exception, another exception occurred:

  Traceback (most recent call last):
File "/home/zuul/src/opendev.org/openstack/neutron/neutron/tests/base.py", 
line 182, in func
  return f(self, *args, **kwargs)
File 
"/home/zuul/src/opendev.org/openstack/neutron/neutron/tests/functional/test_server.py",
 line 237, in test_restart_wsgi_on_sighup_multiple_workers
  workers=2)
File 
"/home/zuul/src/opendev.org/openstack/neutron/neutron/tests/functional/test_server.py",
 line 163, in _test_restart_service_on_sighup
  utils.wait_until_true(condition, timeout=5, sleep=1)
File 
"/home/zuul/src/opendev.org/openstack/neutron/neutron/common/utils.py", line 
709, in wait_until_true
  raise WaitTimeout(_("Timed out after %d seconds") % timeout)
  neutron.common.utils.WaitTimeout: Timed out after 5 seconds

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1886956/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1881095] Re: [OVN] Router availability zones support

2021-03-09 Thread Lucas Alvares Gomes
** Changed in: neutron
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1881095

Title:
  [OVN] Router availability zones support

Status in neutron:
  Fix Released

Bug description:
  Reference: https://docs.openstack.org/neutron/latest/admin/config-
  az.html

  For feature parity, OVN needs to add support for the
  "router_availability_zone" extension.

  This means that, when scheduling the logical router ports the OVN
  driver should take in consideration the router availability zones
  hints and only schedule the ports onto the nodes (or chassis in OVN
  terms) that belongs to those availability zones.

  Differently from ML2/OVS, the OVN driver does not have L3 agents
  running on nodes such as networker nodes so we can't reuse the same
  agents configuration option. In OVN we will need to find another place
  to put this information.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1881095/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1898862] Re: Job neutron-ovn-tempest-ovs-release-ipv6-only is failing 100% of times

2021-03-09 Thread Lucas Alvares Gomes
Job has been fixed at DevStack:
https://review.opendev.org/c/openstack/devstack/+/753575

** Changed in: neutron
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1898862

Title:
  Job neutron-ovn-tempest-ovs-release-ipv6-only is failing 100% of times

Status in neutron:
  Fix Released

Bug description:
  Every time I see 9 tests failing. Like e.g.
  https://zuul.opendev.org/t/openstack/build/8a783bb50f724c6f8d906c939c2bdb1e

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1898862/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1909038] Re: [ovn] TypeError: lrp_set_options() takes 2 positional arguments but 3 were given

2021-03-09 Thread Lucas Alvares Gomes
Fixed at: https://review.opendev.org/c/openstack/neutron/+/768277

** Changed in: neutron
   Status: New => Fix Committed

** Changed in: neutron
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1909038

Title:
  [ovn] TypeError: lrp_set_options() takes 2 positional arguments but 3
  were given

Status in neutron:
  Fix Released

Bug description:
  I see the following error when restarting the neutron process on
  master devstack deployment:

  TypeError: lrp_set_options() takes 2 positional arguments but 3 were
  given

  Dec 22 21:02:06 stack neutron-server[200078]: ERROR futurist.periodics [None 
req-be925f41-7b5f-4e04-893a-282cdbb5d137 None None] Failed to call immediate 
'neutron.plugins.ml2.drivers.ovn.mech_driver.ovsdb.maintenance.DBInconsistenciesPeriodics.check_for_fragmentation_support'
 (it runs every 600.00 seconds): TypeError: lrp_set_options() takes 2 
positional arguments but 3 were given
  Dec 22 21:02:06 stack neutron-server[200078]: ERROR futurist.periodics 
Traceback (most recent call last):
  Dec 22 21:02:06 stack neutron-server[200078]: ERROR futurist.periodics   File 
"/usr/local/lib/python3.8/dist-packages/futurist/periodics.py", line 293, in run
  Dec 22 21:02:06 stack neutron-server[200078]: ERROR futurist.periodics 
work()
  Dec 22 21:02:06 stack neutron-server[200078]: ERROR futurist.periodics   File 
"/usr/local/lib/python3.8/dist-packages/futurist/periodics.py", line 67, in 
__call__
  Dec 22 21:02:06 stack neutron-server[200078]: ERROR futurist.periodics 
return self.callback(*self.args, **self.kwargs)
  Dec 22 21:02:06 stack neutron-server[200078]: ERROR futurist.periodics   File 
"/usr/local/lib/python3.8/dist-packages/futurist/periodics.py", line 181, in 
decorator
  Dec 22 21:02:06 stack neutron-server[200078]: ERROR futurist.periodics 
return f(*args, **kwargs)
  Dec 22 21:02:06 stack neutron-server[200078]: ERROR futurist.periodics   File 
"/opt/stack/neutron/neutron/plugins/ml2/drivers/ovn/mech_driver/ovsdb/maintenance.py",
 line 548, in check_for_fragmentation_support
  Dec 22 21:02:06 stack neutron-server[200078]: ERROR futurist.periodics 
self._ovn_client.set_gateway_mtu(context, net)
  Dec 22 21:02:06 stack neutron-server[200078]: ERROR futurist.periodics   File 
"/opt/stack/neutron/neutron/plugins/ml2/drivers/ovn/mech_driver/ovsdb/ovn_client.py",
 line 1624, in set_gateway_mtu
  Dec 22 21:02:06 stack neutron-server[200078]: ERROR futurist.periodics 
commands.append(self._nb_idl.lrp_set_options(lrp_name, options))
  Dec 22 21:02:06 stack neutron-server[200078]: ERROR futurist.periodics 
TypeError: lrp_set_options() takes 2 positional arguments but 3 were given
  Dec 22 21:02:06 stack neutron-server[200078]: ERROR futurist.periodics

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1909038/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1918266] [NEW] Functional test test_gateway_chassis_rebalance failing due to "failed to bind logical router"

2021-03-09 Thread Slawek Kaplonski
Public bug reported:

Error example:
https://40b5766ce602bfb4b663-445d4465f34d2b24df5d805a76ff9803.ssl.cf1.rackcdn.com/765846/7/check
/neutron-functional-with-uwsgi/928e7cf/testr_results.html

Stacktrace: 
ft1.14: 
neutron.tests.functional.services.ovn_l3.test_plugin.TestRouter.test_gateway_chassis_rebalancetesttools.testresult.real._StringException:
 Traceback (most recent call last):
  File "/home/zuul/src/opendev.org/openstack/neutron/neutron/tests/base.py", 
line 182, in func
return f(self, *args, **kwargs)
  File 
"/home/zuul/src/opendev.org/openstack/neutron/neutron/tests/functional/services/ovn_l3/test_plugin.py",
 line 497, in test_gateway_chassis_rebalance
self.assertTrue(self.cr_lrp_pb_event.wait(logical_port),
  File 
"/home/zuul/src/opendev.org/openstack/neutron/.tox/dsvm-functional/lib/python3.8/site-packages/unittest2/case.py",
 line 702, in assertTrue
raise self.failureException(msg)
AssertionError: False is not true : lrp 
cr-lrp-488b3887-1770-4a72-86cb-7306e78c954a failed to bind

Logstash query:
http://logstash.openstack.org/#dashboard/file/logstash.json?query=message%3A%5C%22line%20497%2C%20in%20test_gateway_chassis_rebalance%5C%22

** Affects: neutron
 Importance: High
 Status: Confirmed


** Tags: functional-tests gate-failure ovn

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1918266

Title:
  Functional test test_gateway_chassis_rebalance failing due to "failed
  to bind logical router"

Status in neutron:
  Confirmed

Bug description:
  Error example:
  
https://40b5766ce602bfb4b663-445d4465f34d2b24df5d805a76ff9803.ssl.cf1.rackcdn.com/765846/7/check
  /neutron-functional-with-uwsgi/928e7cf/testr_results.html

  Stacktrace: 
  ft1.14: 
neutron.tests.functional.services.ovn_l3.test_plugin.TestRouter.test_gateway_chassis_rebalancetesttools.testresult.real._StringException:
 Traceback (most recent call last):
File "/home/zuul/src/opendev.org/openstack/neutron/neutron/tests/base.py", 
line 182, in func
  return f(self, *args, **kwargs)
File 
"/home/zuul/src/opendev.org/openstack/neutron/neutron/tests/functional/services/ovn_l3/test_plugin.py",
 line 497, in test_gateway_chassis_rebalance
  self.assertTrue(self.cr_lrp_pb_event.wait(logical_port),
File 
"/home/zuul/src/opendev.org/openstack/neutron/.tox/dsvm-functional/lib/python3.8/site-packages/unittest2/case.py",
 line 702, in assertTrue
  raise self.failureException(msg)
  AssertionError: False is not true : lrp 
cr-lrp-488b3887-1770-4a72-86cb-7306e78c954a failed to bind

  Logstash query:
  
http://logstash.openstack.org/#dashboard/file/logstash.json?query=message%3A%5C%22line%20497%2C%20in%20test_gateway_chassis_rebalance%5C%22

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1918266/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1896734] Re: A privsep daemon spawned by neutron-openvswitch-agent hangs when debug logging is enabled (large number of registered NICs) - an RPC response is too large for msgpac

2021-03-09 Thread Edward Hope-Morley
Neutron fix is released upstream and backported all the way to Train.

** Changed in: neutron
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1896734

Title:
  A privsep daemon spawned by neutron-openvswitch-agent hangs when debug
  logging is enabled (large number of registered NICs) - an RPC response
  is too large for msgpack

Status in OpenStack neutron-openvswitch charm:
  Invalid
Status in neutron:
  Fix Released
Status in oslo.privsep:
  New
Status in python-oslo.privsep package in Ubuntu:
  New

Bug description:
  When there is a large amount of netdevs registered in the kernel and
  debug logging is enabled, neutron-openvswitch-agent and the privsep
  daemon spawned by it hang since the RPC call result sent by the
  privsep daemon over a unix socket exceeds the message sizes that the
  msgpack library can handle.

  The impact of this is that enabling debug logging on the cloud
  completely stalls neutron-openvswitch-agents and makes them "dead"
  from the Neutron server perspective.

  The issue is summarized in detail in comment #5
  https://bugs.launchpad.net/oslo.privsep/+bug/1896734/comments/5

  
  Old Description

  While trying to debug a different issue, I encountered a situation
  where privsep hangs in the process of handling a request from neutron-
  openvswitch-agent when debug logging is enabled (juju debug-log
  neutron-openvswitch=true):

  https://bugs.launchpad.net/charm-neutron-openvswitch/+bug/1895652/comments/11
  https://bugs.launchpad.net/charm-neutron-openvswitch/+bug/1895652/comments/12

  The issue gets reproduced reliably in the environment where I
  encountered it on all units. As a result, neutron-openvswitch-agent
  services hang while waiting for a response from the privsep daemon and
  do not progress past basic initialization. They never post any state
  back to the Neutron server and thus are marked dead by it.

  The processes though are shown as "active (running)" by systemd which
  adds to the confusion since they do indeed start from the systemd's
  perspective.

  systemctl --no-pager status neutron-openvswitch-agent.service
  ● neutron-openvswitch-agent.service - Openstack Neutron Open vSwitch Plugin 
Agent
     Loaded: loaded (/lib/systemd/system/neutron-openvswitch-agent.service; 
enabled; vendor preset: enabled)
     Active: active (running) since Wed 2020-09-23 08:28:41 UTC; 25min ago
   Main PID: 247772 (/usr/bin/python)
  Tasks: 4 (limit: 9830)
     CGroup: /system.slice/neutron-openvswitch-agent.service
     ├─247772 /usr/bin/python3 /usr/bin/neutron-openvswitch-agent 
--config-file=/etc/neutron/neutron.conf 
--config-file=/etc/neutron/plugins/ml2/openvswitch_…og
     └─248272 /usr/bin/python3 /usr/bin/privsep-helper --config-file 
/etc/neutron/neutron.conf --config-file 
/etc/neutron/plugins/ml2/openvswitch_agent.ini -…ck

  

  An strace shows that the privsep daemon tries to receive input from fd
  3 which is the unix socket it uses to communicate with the client.
  However, this is just one tread out of many spawned by the privsep
  daemon so it is unlikely to be the root cause (there are 65 threads
  there in total, see https://paste.ubuntu.com/p/fbGvN2P8rP/)

  # there is one extra neutron-openvvswitch-agent running in a LXD container 
which can be ignored here (there is an octavia unit on the node which has a 
neutron-openvswitch subordinate)
  root@node2:~# ps -eo pid,user,args --sort user | grep -P 
'privsep.*openvswitch'
   860690 10   /usr/bin/python3 /usr/bin/privsep-helper --config-file 
/etc/neutron/neutron.conf --config-file 
/etc/neutron/plugins/ml2/openvswitch_agent.ini --privsep_context 
neutron.privileged.default --privsep_sock_path /tmp/tmp910qakfk/privsep.sock
   248272 root /usr/bin/python3 /usr/bin/privsep-helper --config-file 
/etc/neutron/neutron.conf --config-file 
/etc/neutron/plugins/ml2/openvswitch_agent.ini --privsep_context 
neutron.privileged.default --privsep_sock_path /tmp/tmpcmwn7vom/privsep.sock
   363905 root grep --color=auto -P privsep.*openvswitch

  root@node2:~# strace -f -p 248453 2>&1
  [pid 248786] futex(0x7f6a6401c1d0, 
FUTEX_WAIT_BITSET_PRIVATE|FUTEX_CLOCK_REALTIME, 0, NULL, 0x 
  [pid 248475] futex(0x7f6a6c024590, 
FUTEX_WAIT_BITSET_PRIVATE|FUTEX_CLOCK_REALTIME, 0, NULL, 0x 
  [pid 248473] futex(0x7f6a746d9fd0, 
FUTEX_WAIT_BITSET_PRIVATE|FUTEX_CLOCK_REALTIME, 0, NULL, 0x 
  [pid 248453] recvfrom(3,

  root@node2:~# lsof -p 248453  | grep 3u
  privsep-h 248453 root3u  unix 0x8e6d8abdec00  0t0 356522977 
type=STREAM

  root@node2:~# ss -pax | grep 356522977
  u_str ESTAB   00  

[Yahoo-eng-team] [Bug 1918255] [NEW] Race between sriov_config service and openib service

2021-03-09 Thread waleed mousa
Public bug reported:

When having sriov configured in mlnx interfaces and we are using MLNX
ofed, In reboot case we'll have race between sriov_config service and
openibd service which loads mlx drivers, sometimes it causes failures in
starting sriov_config service correctly

** Affects: neutron
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1918255

Title:
  Race between sriov_config service and openib service

Status in neutron:
  New

Bug description:
  When having sriov configured in mlnx interfaces and we are using MLNX
  ofed, In reboot case we'll have race between sriov_config service and
  openibd service which loads mlx drivers, sometimes it causes failures
  in starting sriov_config service correctly

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1918255/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp