[Yahoo-eng-team] [Bug 1955773] Re: Recursion error when generating documentation for Senlin

2022-01-17 Thread OpenStack Infra
Reviewed:  https://review.opendev.org/c/openstack/horizon/+/822212
Committed: 
https://opendev.org/openstack/horizon/commit/b8cc0043d46318c7e11952109450587bee9567ab
Submitter: "Zuul (22348)"
Branch:master

commit b8cc0043d46318c7e11952109450587bee9567ab
Author: Erik Olof Gunnar Andersson 
Date:   Fri Dec 17 18:32:03 2021 -0800

Fix maximum recursion depth error when generating documentation

Troubleshooting an issue with Senlin documentation,

> RecursionError: maximum recursion depth exceeded in __instancecheck__

it turns out that attrs['base_options'] creates a recursive reference
when no base classes have 'base_options'.
This happens when BaseAction is created.

Closes-Bug: #1955773
Change-Id: I2724f07339134b3e06b7ea925939bf7072162106


** Changed in: horizon
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1955773

Title:
  Recursion error when generating documentation for Senlin

Status in OpenStack Dashboard (Horizon):
  Fix Released

Bug description:
  Hitting a recursion error when generating documentation for the 
senlin-dashboard that seems to be indirectly caused by Horizon.
  > maximum recursion depth exceeded in __instancecheck__

  e.g.
  https://review.opendev.org/c/openstack/senlin-dashboard/+/787090

  I wrote a simple fix for this, we could probably change how senlin-dashboard 
generates documentation as well, but I feel like senlin isn't doing anything 
that should be causing this type of behavior.
  https://review.opendev.org/c/openstack/horizon/+/822212

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1955773/+subscriptions


-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1957941] Re: test_network_basic_ops failing on centos-8-stream job

2022-01-17 Thread Ghanshyam Mann
Thanks yatin.

Marking invalid for tempest as nothing to do in Tempest.

** Changed in: tempest
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1957941

Title:
  test_network_basic_ops failing on centos-8-stream job

Status in neutron:
  Triaged
Status in tempest:
  Invalid

Bug description:
  Two test_network_basic_ops  tests are failing consistently (since ~
  Jan 14th 01 UTC) in centos-8-stream jobs (nova side tempest-
  integrated-compute-centos-8-stream and tempest tempest-full-
  py3-centos-8-stream jobs)

  1. 
tempest.scenario.test_network_basic_ops.TestNetworkBasicOps.test_hotplug_nic
  2. 
tempest.scenario.test_network_basic_ops.TestNetworkBasicOps.test_network_basic_ops

  Failure:
  
https://zuul.opendev.org/t/openstack/build/e0db6a9a7ba04e66b0781ba7d259357d/logs

  Only traceback I could find in neutron logs is:

  
https://zuul.opendev.org/t/openstack/build/e0db6a9a7ba04e66b0781ba7d259357d/log/controller/logs/screen-
  q-svc.txt#32875

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1957941/+subscriptions


-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1956745] Re: [ovn-octavia-provider] Load Balancer remained with ACTIVE state even with PENDING_UPDATE listener

2022-01-17 Thread OpenStack Infra
Reviewed:  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/823544
Committed: 
https://opendev.org/openstack/ovn-octavia-provider/commit/4d01470f5e397bb6de1b10db9f839fa72697ff6b
Submitter: "Zuul (22348)"
Branch:master

commit 4d01470f5e397bb6de1b10db9f839fa72697ff6b
Author: Luis Tomas Bolivar 
Date:   Wed Jan 5 15:48:57 2022 +0100

Set listeners back to ACTIVE upon pool/member action failures

This patch ensure the listeners are set back from PENDING_UPDATE
to ACTIVE in case of member or pool update failure.

Closes-Bug: #1956745
Change-Id: I95860ae305c3d0c10859afb972d000328e23d614


** Changed in: neutron
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1956745

Title:
  [ovn-octavia-provider]  Load Balancer remained with ACTIVE state even
  with PENDING_UPDATE listener

Status in neutron:
  Fix Released

Bug description:
  Description of problem:

  The Load Balancer remained with ACTIVE and ONLINE state even when the
  listener had provisioning_status PENDING_UPDATE and the pool was with
  ERROR, what made the load-balancer to be considered functional by
  Kuryr and a load-balancer member removal was attempt without success
  as pool was immutable:

  2021-11-03 17:04:53.893 1 ERROR kuryr_kubernetes.handlers.logging 
openstack.exceptions.ConflictException: ConflictException: 409: Client Error 
for url: https://10.x.x.x:13876/v2.0/lbaas/po
  
ols/302709f7-d122-49d7-9d05-8e57ccf2ad11/members/214e892a-4e25-46ce-8bba-9ae005304931,
 Pool 302709f7-d122-49d7-9d05-8e57ccf2ad11 is immutable and cannot be updated.  

  2021-11-03 17:04:53.893 1 ERROR kuryr_kubernetes.handlers.logging 

  (shiftstack) [stack@undercloud-0 ~]$ openstack loadbalancer show 
8d03213c-ab26-4391-9d26-4878fa6b5d02 
  +-+---+
  | Field   | Value |
  +-+---+
  | admin_state_up  | True  |
  | created_at  | 2021-11-02T05:21:15   |
  | description |   |
  | flavor_id   | None  |
  | id  | 8d03213c-ab26-4391-9d26-4878fa6b5d02  |
  | listeners   | 39f36082-3a07-44c0-9b00-41ba12db49fa  |
  | name| openshift-marketplace/community-operators |
  | operating_status| ONLINE|
  | pools   | 302709f7-d122-49d7-9d05-8e57ccf2ad11  |
  | project_id  | fd0d6a21436d4ff987682c3a0419569d  |
  | provider| ovn   |
  | provisioning_status | ACTIVE|
  | updated_at  | 2021-11-02T13:45:52   |
  | vip_address | 172.30.237.127|
  | vip_network_id  | f738aa91-61e1-4571-8eac-f3979164393f  |
  | vip_port_id | 72502dfe-e6f8-4e9b-9f00-b846bcf693f8  |
  | vip_qos_policy_id   | None  |
  | vip_subnet_id   | 14d2bae5-7de6-4f77-882b-1d5c919251fc  |
  +-+---+

  (shiftstack) [stack@undercloud-0 ~]$ openstack loadbalancer listener show 
39f36082-3a07-44c0-9b00-41ba12db49fa
  
+-+-+
  | Field   | Value 
  |
  
+-+-+
  | admin_state_up  | True  
  |
  | connection_limit| -1
  |
  | created_at  | 2021-11-02T05:21:44   
  |
  | default_pool_id | 302709f7-d122-49d7-9d05-8e57ccf2ad11  
  |
  | default_tls_container_ref   | None  
  |
  | description |   
  |
  | id  | 39f36082-3a07-44c0-9b00-41ba12db49fa  
  |
  | insert_headers  | None  
  |
  | l7policies  |   
  |
  | loadbalancers   | 8d03213c-ab26-4391-9d26-4878fa6b5d02  
  |
  | name| 
openshift-marketplace/community-operators:TCP:50051 |
  | operating_status| ONLINE
  |
  | project_id  | fd0d6a21436d4ff987682c3a0419569d   

[Yahoo-eng-team] [Bug 1946771] Re: Doc on microversions lacks hint on creating folder in api-samples

2022-01-17 Thread OpenStack Infra
Reviewed:  https://review.opendev.org/c/openstack/nova/+/813672
Committed: 
https://opendev.org/openstack/nova/commit/6c5636baab934c9c404810a6ba2e7aed35ad2657
Submitter: "Zuul (22348)"
Branch:master

commit 6c5636baab934c9c404810a6ba2e7aed35ad2657
Author: Jan Hartkopf 
Date:   Tue Oct 19 18:44:16 2021 +0200

ensure samples folder exists for microversion

When adding a microversion, a new corresponding folder
for auto-generated samples is required.
However, the folder has to be created manually for the
generation to succeed.

With this change, it is ensured that the folder
is present, removing manual interaction.

Closes-Bug: #1946771
Change-Id: I18f2e509f8c1ae3ad5866b568afc6e0c341e5c3e
Signed-off-by: Jan Hartkopf 


** Changed in: nova
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1946771

Title:
  Doc on microversions lacks hint on creating folder in api-samples

Status in OpenStack Compute (nova):
  Fix Released

Bug description:

  This bug tracker is for errors with the documentation, use the
  following as a template and remove or add fields as you see fit.
  Convert [ ] into [x] to check boxes:

  - [ ] This doc is inaccurate in this way: __
  - [x] This is a doc addition request.
  - [ ] I have a fix to the document that I can paste below including example: 
input and output. 

  
  The documentation on API Microversions 
(https://docs.openstack.org/nova/latest/contributor/microversions.html#other-necessary-changes)
 lacks a hint that the contributor must create the subfolder with the new 
microversion in doc/api-samples/*/$NEW_MICROVERSION in order for the samples to 
be rendered as JSON files by `tox -e api-samples`.

  i.e when adding a new microversion `v2.91` for servers I would need to
  create `doc/api-samples/servers/v2.91?`.

  
  Apart from this documentation hint one might argue that the tox env could 
check for this consistency and give the contributor a proper and helpful error.

  
  ---
  Release: 24.1.0.dev28 on 2020-04-10 11:42:50
  SHA: 0a8f3e954485d2a6d80b80da50745cb7b0dbd048
  Source: 
https://opendev.org/openstack/nova/src/doc/source/contributor/microversions.rst
  URL: https://docs.openstack.org/nova/latest/contributor/microversions.html

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1946771/+subscriptions


-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1958149] [NEW] ha backup router ipv6 accept_ra broken

2022-01-17 Thread Maximilian Stinsky
Public bug reported:

When we restart the neutron-l3-agent we observe that backup routers start 
accepting router advertisements. This leads to routes inside the router 
namespace which expire.
e.g.:
$ ip netns exec qrouter-a5f7fb32-3e30-4e15-89f9-4ae888c2cac6 ip -6 r
x:x:1002:1::/64 dev qr-72f85121-ce proto kernel metric 256 expires 86355sec 
pref medium
x:x:1002:1::/64 dev qr-4e84792f-aa proto kernel metric 256 expires 86355sec 
pref medium
fe80::/64 dev ha-9d085c9d-15 proto kernel metric 256 pref medium
default via fe80::f816:3eff:fed3:3fa6 dev qr-4e84792f-aa proto ra metric 1024 
expires 255sec hoplimit 64 pref medium
default via fe80::f816:3eff:fed3:3fa6 dev qr-72f85121-ce proto ra metric 1024 
expires 255sec hoplimit 64 pref medium


When we now failover to such a backup router, the kernel does not create the 
necessary directly attached routes because they already exist. The problem is 
that those routes expire and because we are now a master router the routes do 
not refresh from the router advertisement anymore and expire after 24h which 
breaks ipv6 for those routers.

After we dug a bit deeper into this issue we found that the function [1]
that disables the accept_ra on the backup routers always returns false.
So backup routers never get their router advertisement disabled.

master router: 
$ ip netns exec qrouter-92ed5c1f-c705-4ab9-a0e1-56e905d43abd sysctl 
net.ipv6.conf.qr-c7eb60ab-f1.accept_ra
net.ipv6.conf.qr-c7eb60ab-f1.accept_ra = 1

backup router:
$ ip netns exec qrouter-92ed5c1f-c705-4ab9-a0e1-56e905d43abd sysctl 
net.ipv6.conf.qr-c7eb60ab-f1.accept_ra
net.ipv6.conf.qr-c7eb60ab-f1.accept_ra = 1

[1]
https://github.com/openstack/neutron/blob/master/neutron/agent/l3/ha_router.py#L318

** Affects: neutron
 Importance: Undecided
 Status: In Progress

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1958149

Title:
  ha backup router ipv6 accept_ra broken

Status in neutron:
  In Progress

Bug description:
  When we restart the neutron-l3-agent we observe that backup routers start 
accepting router advertisements. This leads to routes inside the router 
namespace which expire.
  e.g.:
  $ ip netns exec qrouter-a5f7fb32-3e30-4e15-89f9-4ae888c2cac6 ip -6 r
  x:x:1002:1::/64 dev qr-72f85121-ce proto kernel metric 256 expires 86355sec 
pref medium
  x:x:1002:1::/64 dev qr-4e84792f-aa proto kernel metric 256 expires 86355sec 
pref medium
  fe80::/64 dev ha-9d085c9d-15 proto kernel metric 256 pref medium
  default via fe80::f816:3eff:fed3:3fa6 dev qr-4e84792f-aa proto ra metric 1024 
expires 255sec hoplimit 64 pref medium
  default via fe80::f816:3eff:fed3:3fa6 dev qr-72f85121-ce proto ra metric 1024 
expires 255sec hoplimit 64 pref medium

  
  When we now failover to such a backup router, the kernel does not create the 
necessary directly attached routes because they already exist. The problem is 
that those routes expire and because we are now a master router the routes do 
not refresh from the router advertisement anymore and expire after 24h which 
breaks ipv6 for those routers.

  After we dug a bit deeper into this issue we found that the function
  [1] that disables the accept_ra on the backup routers always returns
  false. So backup routers never get their router advertisement
  disabled.

  master router: 
  $ ip netns exec qrouter-92ed5c1f-c705-4ab9-a0e1-56e905d43abd sysctl 
net.ipv6.conf.qr-c7eb60ab-f1.accept_ra
  net.ipv6.conf.qr-c7eb60ab-f1.accept_ra = 1

  backup router:
  $ ip netns exec qrouter-92ed5c1f-c705-4ab9-a0e1-56e905d43abd sysctl 
net.ipv6.conf.qr-c7eb60ab-f1.accept_ra
  net.ipv6.conf.qr-c7eb60ab-f1.accept_ra = 1

  [1]
  
https://github.com/openstack/neutron/blob/master/neutron/agent/l3/ha_router.py#L318

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1958149/+subscriptions


-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1958075] Re: The fixtures library is missing from requirements.txt

2022-01-17 Thread OpenStack Infra
Reviewed:  https://review.opendev.org/c/openstack/nova/+/824830
Committed: 
https://opendev.org/openstack/nova/commit/33bc5c09f576680d150435fb7ad435b23e778316
Submitter: "Zuul (22348)"
Branch:master

commit 33bc5c09f576680d150435fb7ad435b23e778316
Author: Takashi Kajinami 
Date:   Sun Jan 16 23:30:41 2022 +0900

Add fixtures to requirements

The commit 887c445a7a6a17b92a37b6ed1dcdcc7dd009f65d made the nova.utils
module dependent on the fixtures library but the change missed updating
requirements and the fixtures library is not installed automatically.

This change migrates the fixtures library from test-requirements.txt to
requirements.txt so that the library is installed without test codes.

Closes-Bug: #1958075
Change-Id: I712f88fc1b6053fe6d1f13e708f3bd8874452a8f


** Changed in: nova
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1958075

Title:
  The fixtures library is missing from requirements.txt

Status in OpenStack Compute (nova):
  Fix Released

Bug description:
  Description
  ===
  The following change[1] made the nova.utils module depend on the fixtures 
library.
  [1] https://review.opendev.org/c/openstack/nova/+/824280

  However the fixtures library is listed only in test-requirements.txt and is 
not yet listed in requirements.txt .
  Because of this the library is not installed in normal deployment and the 
`nova-manage api_db sync` command fails with the following error.

  Traceback (most recent call last):
File "/usr/bin/nova-manage", line 6, in 
  from nova.cmd.manage import main
File "/usr/lib/python3.6/site-packages/nova/cmd/manage.py", line 49, in 

  from nova.cmd import common as cmd_common
File "/usr/lib/python3.6/site-packages/nova/cmd/common.py", line 26, in 

  import nova.db.main.api
File "/usr/lib/python3.6/site-packages/nova/db/main/api.py", line 45, in 

  from nova import block_device
File "/usr/lib/python3.6/site-packages/nova/block_device.py", line 26, in 

  from nova import utils
File "/usr/lib/python3.6/site-packages/nova/utils.py", line 32, in 
  import fixtures
  ModuleNotFoundError: No module named 'fixtures'

  This issue was initially detected in litmus jobs in puppet repos[2].
  These jobs uses rdo packages which define dependencies based on 
requirements.txt

  [2] example:
  https://zuul.opendev.org/t/openstack/build/e086ca3375714860ae463b7a1d9b1bab

  Steps to reproduce
  ==

  Expected result
  ===

  Actual result
  =

  Environment
  ===

  Logs & Configs
  ==

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1958075/+subscriptions


-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1958128] [NEW] Neutron l3 agent keeps restarting (Ubuntu)

2022-01-17 Thread Francois Michaut
Public bug reported:

After following neutron install guide, when trying to create a floating
IP, the request succeeded, but the floating IP never became reachable.

Looking at neutron-l3-agent status, I could see that it was restarting
every 2 seconds, failing with an exception of 'file not found
/etc/neutron/fwaas_driver.ini'.

As a temporary fix, I touched the file to create an empty one, and the
service started without any errors and the floating IP started working.

My configuration is exactly the one provided in the install guide, I
didn't change anything.

Maybe the documentation should contain a step to avoid this issue ?


- [ ] This doc is inaccurate in this way: __
- [x] This is a doc addition request.
- [ ] I have a fix to the document that I can paste below including example: 
input and output. 

If you have a troubleshooting or support issue, use the following
resources:

 - The mailing list: https://lists.openstack.org
 - IRC: 'openstack' channel on OFTC

---
Release: 19.1.1.dev10 on 2019-08-21 16:09:09
SHA: d202e323d7f03edc56add8e83aeb9cddbbbce895
Source: 
https://opendev.org/openstack/neutron/src/doc/source/install/controller-install-ubuntu.rst
URL: 
https://docs.openstack.org/neutron/xena/install/controller-install-ubuntu.html

** Affects: neutron
 Importance: Undecided
 Status: New


** Tags: doc

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1958128

Title:
  Neutron l3 agent keeps restarting (Ubuntu)

Status in neutron:
  New

Bug description:
  After following neutron install guide, when trying to create a
  floating IP, the request succeeded, but the floating IP never became
  reachable.

  Looking at neutron-l3-agent status, I could see that it was restarting
  every 2 seconds, failing with an exception of 'file not found
  /etc/neutron/fwaas_driver.ini'.

  As a temporary fix, I touched the file to create an empty one, and the
  service started without any errors and the floating IP started
  working.

  My configuration is exactly the one provided in the install guide, I
  didn't change anything.

  Maybe the documentation should contain a step to avoid this issue ?


  - [ ] This doc is inaccurate in this way: __
  - [x] This is a doc addition request.
  - [ ] I have a fix to the document that I can paste below including example: 
input and output. 

  If you have a troubleshooting or support issue, use the following
  resources:

   - The mailing list: https://lists.openstack.org
   - IRC: 'openstack' channel on OFTC

  ---
  Release: 19.1.1.dev10 on 2019-08-21 16:09:09
  SHA: d202e323d7f03edc56add8e83aeb9cddbbbce895
  Source: 
https://opendev.org/openstack/neutron/src/doc/source/install/controller-install-ubuntu.rst
  URL: 
https://docs.openstack.org/neutron/xena/install/controller-install-ubuntu.html

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1958128/+subscriptions


-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1948706] Re: Glance cannot remove image if Nova boots instance from image with incorrect signature.

2022-01-17 Thread OpenStack Infra
Reviewed:  https://review.opendev.org/c/openstack/nova/+/815347
Committed: 
https://opendev.org/openstack/nova/commit/43bca185fe2d00bb70d7486fa6c6a0b9eda1fc17
Submitter: "Zuul (22348)"
Branch:master

commit 43bca185fe2d00bb70d7486fa6c6a0b9eda1fc17
Author: Mitya_Eremeev 
Date:   Thu Nov 11 18:52:11 2021 +0300

Close Glance image if downloading failed.

If downloding of Glance image failed we should
close iterator of image body.
Otherwise Glance is unable to delete the image.

Change-Id: I193df2fcbf2588c10be953eb4e9eef4609b6286f
Closes-Bug: 1948706


** Changed in: nova
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1948706

Title:
  Glance cannot remove image if Nova boots instance from image with
  incorrect signature.

Status in OpenStack Compute (nova):
  Fix Released

Bug description:
  Description
  ===
  Nova is configured to verify glance images:
  [glance]
  verify_glance_signatures=true

  Glance backend is Ceph.

  
  Steps to reproduce
  ==
  1. create glance image with proper signature
  2. update glance image with incorrect signature
  3. try to boot instance from the glance image with incorrect signature.
  Boot fails because Nova checks signature and verification fails. 
  It's correct behavior.

  
barbican_tempest_plugin.tests.scenario.test_image_signing.ImageSigningTest.test_signed_image_upload_boot_failure[compute,id-74f022d6-a6ef-4458-96b7-541deadacf99,image,smoke]
  
-

  Captured traceback:
  ~~~
  Traceback (most recent call last):

File 
"/var/lib/openstack/lib/python3.6/site-packages/tempest/lib/services/image/v2/images_client.py",
 line 103, in delete_image
  resp, _ = self.delete(url)

File 
"/var/lib/openstack/lib/python3.6/site-packages/tempest/lib/common/rest_client.py",
 line 330, in delete
  return self.request('DELETE', url, extra_headers, headers, body)

File 
"/var/lib/openstack/lib/python3.6/site-packages/tempest/lib/common/rest_client.py",
 line 710, in request
  self._error_checker(resp, resp_body)  

File 
"/var/lib/openstack/lib/python3.6/site-packages/tempest/lib/common/rest_client.py",
 line 831, in _error_checker
  raise exceptions.Conflict(resp_body, resp=resp)

  tempest.lib.exceptions.Conflict: Conflict with state of target resource
  Details: {'message': 'Image c321f6be-a4d3-42d2-bc3f-f0ea913b83b7 could not be 
deleted because it is in use: The image cannot be deleted because it is in use 
through the backend store outside of Glance.\n\n\n', 'code': '409 
Conflict', 'title': 'Conflict'}

  4. Delete the glance image right after failed instance boot.

  Expected result
  ===
  Glance image was deleted successfully. 

  Actual result
  =
  Glance cannot be deleted.
  In Glance backend we see that there are watchers that protect glance image 
from deletion:

  # rbd  rm --pool images-hdd c321f6be-a4d3-42d2-bc3f-f0ea913b83b7
  2021-10-15T13:25:03.862+ 7f36b98c8700 -1 librbd::image::PreRemoveRequest: 
0x562785d77a50 check_image_watchers: image has watchers - not removing
  Removing image: 0% complete...failed.
  rbd: error: image still has watchers
  This means the image is still open or the client using it crashed. Try again 
after closing/unmapping it or waiting 30s for the crashed client to timeout.

  # rbd  status  --pool images-hdd c321f6be-a4d3-42d2-bc3f-f0ea913b83b7
  Watchers:
  watcher=10.10.0.89:0/729945307 client.374098 cookie=140684808072160

  The behavior is reproduced by tempest test:
  
https://github.com/openstack/barbican-tempest-plugin/blob/master/barbican_tempest_plugin/tests/scenario/test_image_signing.py#L67

  Environment
  ===
  1. Openstack version: Victoria
  2. Hypervisor: KVM + libvirt
  3. Glance storage: Ceph, Nova storage: local.
  4. Networking: Neutron with OVS

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1948706/+subscriptions


-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1949496] Re: [OVN] Check OVN support virtual port type

2022-01-17 Thread OpenStack Infra
Reviewed:  https://review.opendev.org/c/openstack/neutron/+/816383
Committed: 
https://opendev.org/openstack/neutron/commit/58feb88853e9f12deaedb612d5855f3d80607e40
Submitter: "Zuul (22348)"
Branch:master

commit 58feb88853e9f12deaedb612d5855f3d80607e40
Author: Rodolfo Alonso Hernandez 
Date:   Tue Nov 2 17:36:16 2021 +

[OVN] Check if OVN SB supports virtual ports

Added a check for OVN SB schema, looking for "virtual_parent" in
"Port_Binding" table (added in OVN SB schema 2.5).

This patch removes the code to support OVN without virtual ports.
It is assumed that "virtual_parent" field is present in "Port_Binding"
table.

Closes-Bug: #1949496
Change-Id: I3d01f58dca570537b5e754b331ca4809a7161ae2


** Changed in: neutron
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1949496

Title:
  [OVN] Check OVN support virtual port type

Status in neutron:
  Fix Released

Bug description:
  This feature was added to OVN in [1].

  OVN SB schema version: 2.5.0

  [1]https://github.com/ovn-
  org/ovn/commit/054f4c85c413e20d893e10ba053ec52ac15db49c

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1949496/+subscriptions


-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1957021] Re: openstack xena documenation has wrong neutron service name to start

2022-01-17 Thread yatin
Seems you following wrong documentation for CentOS Stream. You need to
refer https://docs.openstack.org/neutron/xena/install/install-rdo.html
instead of https://docs.openstack.org/neutron/xena/install/install-
obs.html, The later one is for OpenSUSE. Marking the bug as invalid.
https://docs.openstack.org/neutron/xena/install/install-rdo.html
correctly describes the service names on CentOS Stream.

https://docs.openstack.org/neutron/xena/install/ describes installation
method for various distros.

Marking the bug as invalid, feel free to re open if wrong.

** Changed in: neutron
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1957021

Title:
  openstack xena documenation has wrong neutron service name to start

Status in neutron:
  Invalid

Bug description:
  The manual install for neturon says to start -

  https://docs.openstack.org/neutron/xena/install/controller-install-obs.html#
  # systemctl enable openstack-neutron.service \
openstack-neutron-linuxbridge-agent.service \
openstack-neutron-dhcp-agent.service \
openstack-neutron-metadata-agent.service
  # systemctl start openstack-neutron.service \
openstack-neutron-linuxbridge-agent.service \
openstack-neutron-dhcp-agent.service \
openstack-neutron-metadata-agent.service

  
  But Xena neutron on centOS stream installs as 
  [root@controller neutron]# cd /usr/lib/systemd/system
  [root@controller system]# ls -ltra neutron*
  -rw-r--r--. 1 root root  569 Oct  6 16:45 neutron-server.service
  -rw-r--r--. 1 root root 1024 Oct  6 16:45 neutron-ovs-cleanup.service
  -rw-r--r--. 1 root root  734 Oct  6 16:45 neutron-openvswitch-agent.service
  -rw-r--r--. 1 root root  987 Oct  6 16:45 neutron-netns-cleanup.service
  -rw-r--r--. 1 root root  536 Oct  6 16:45 neutron-metadata-agent.service
  -rw-r--r--. 1 root root 1039 Oct  6 16:45 neutron-linuxbridge-cleanup.service
  -rw-r--r--. 1 root root  645 Oct  6 16:45 neutron-linuxbridge-agent.service
  -rw-r--r--. 1 root root  512 Oct  6 16:45 neutron-l3-agent.service
  -rw-r--r--. 1 root root  516 Oct  6 16:45 neutron-dhcp-agent.service
  -rw-r--r--. 1 root root  579 Oct  6 16:50 neutron-destroy-patch-ports.service


  so the document has to be updated with the proper services to start.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1957021/+subscriptions


-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp