[Yahoo-eng-team] [Bug 1719259] [NEW] Networking API v2.0 in Networking API Reference

2017-09-25 Thread brenda
Public bug reported:


This bug tracker is for errors with the documentation, use the following
as a template and remove or add fields as you see fit. Convert [ ] into
[x] to check boxes:

- [x] This doc is inaccurate in this way: __
- [ ] This is a doc addition request.
- [x] I have a fix to the document that I can paste below including example: 
input and output. 

If you have a troubleshooting or support issue, use the following
resources:

 - Ask OpenStack: http://ask.openstack.org
 - The mailing list: http://lists.openstack.org
 - IRC: 'openstack' channel on Freenode

---
Release: 1.8.1.dev40 on 'Tue Jul 18 18:01:21 2017, commit 7581af4'
SHA: 
Source: Can't derive source file URL
URL: https://developer.openstack.org/api-ref/networking/v2/

** Affects: neutron
 Importance: Undecided
 Status: New


** Tags: api-ref

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1719259

Title:
  Networking API v2.0 in Networking API Reference

Status in neutron:
  New

Bug description:

  This bug tracker is for errors with the documentation, use the
  following as a template and remove or add fields as you see fit.
  Convert [ ] into [x] to check boxes:

  - [x] This doc is inaccurate in this way: __
  - [ ] This is a doc addition request.
  - [x] I have a fix to the document that I can paste below including example: 
input and output. 

  If you have a troubleshooting or support issue, use the following
  resources:

   - Ask OpenStack: http://ask.openstack.org
   - The mailing list: http://lists.openstack.org
   - IRC: 'openstack' channel on Freenode

  ---
  Release: 1.8.1.dev40 on 'Tue Jul 18 18:01:21 2017, commit 7581af4'
  SHA: 
  Source: Can't derive source file URL
  URL: https://developer.openstack.org/api-ref/networking/v2/

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1719259/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1686877] [NEW] ml2 physical network using Chinese characters fails to save to postgresql

2017-04-27 Thread brenda
Public bug reported:

Steps to produce this bug:
1. configure ml2_conf.ini,and then dispatch the configuration, restart 
neutron-server service 
[ml2_type_vlan]
network_vlan_ranges = physnet1:100:120,中文:121:125

expected result: configuration data correctly saves into postgresql
real result: pass

2. reconfigure ml2_conf.ini,and then dispatch the configuration, restart 
neutron-server service
[ml2_type_vlan]
network_vlan_ranges = physnet1:100:120,中文:121:124

expected result: configuration data correctly saves into postgresql
real result: fail 

neutron-server error:UnicodeDecodeError: 'ascii' codec can't decode byte
0xe4 in position 143: ordinal not in range(128)

** Affects: neutron
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1686877

Title:
  ml2 physical network using Chinese characters fails to save to
  postgresql

Status in neutron:
  New

Bug description:
  Steps to produce this bug:
  1. configure ml2_conf.ini,and then dispatch the configuration, restart 
neutron-server service 
  [ml2_type_vlan]
  network_vlan_ranges = physnet1:100:120,中文:121:125

  expected result: configuration data correctly saves into postgresql
  real result: pass

  2. reconfigure ml2_conf.ini,and then dispatch the configuration, restart 
neutron-server service
  [ml2_type_vlan]
  network_vlan_ranges = physnet1:100:120,中文:121:124

  expected result: configuration data correctly saves into postgresql
  real result: fail 

  neutron-server error:UnicodeDecodeError: 'ascii' codec can't decode
  byte 0xe4 in position 143: ordinal not in range(128)

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1686877/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1656735] Re: Fwaas - insert_rule and remove_rule always set audited to False

2017-01-16 Thread brenda
** Also affects: openstack-api-site
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1656735

Title:
  Fwaas - insert_rule and remove_rule always set audited to False

Status in neutron:
  New
Status in openstack-api-site:
  New

Bug description:
  when people use "insert_rule" or "remove_rule" on a firewall policy, the 
"audited" attribute of the firewall policy  is always  set to be "false" in 
function _process_rule_for_policy().I think it's not right and can bring users 
problems.
  First, It's not logical when the firewall policy was created with "audited" 
to be "true" and both "insert_rule" and "remove_rule" don't intend to modify 
"audited" attribute.
  Second, after bug https://bugs.launchpad.net/neutron/+bug/1438615 is 
resolved, operation of "update_firewall_policy" will not change "audited" 
attribute, it only sets "audited" to be "false" when people haven't set this 
attribute explicitly. 

  Above is the error in fwaas code. There is alse an error in fwaas v1.0
  api as to the description about "audited" attribute.The api document
  says "Each time that the firewall policy or its associated rules are
  changed, the API sets this attribute to false. To audit the policy,
  explicitly set this attribute to true.". But why user needs to
  explicitly set it again after insert_rule or remove_rule ? And in fact
  ,"update_firewall_policy" doesn't need to do so.

  So I think we should correct this error both in code and api document.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1656735/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1656735] [NEW] Fwaas - insert_rule and remove_rule always set audited to False

2017-01-15 Thread brenda
Public bug reported:

when people use "insert_rule" or "remove_rule" on a firewall policy, the 
"audited" attribute of the firewall policy  is always  set to be "false" in 
function _process_rule_for_policy().I think it's not right and can bring users 
problems.
First, It's not logical when the firewall policy was created with "audited" to 
be "true" and both "insert_rule" and "remove_rule" don't intend to modify 
"audited" attribute.
Second, after bug https://bugs.launchpad.net/neutron/+bug/1438615 is resolved, 
operation of "update_firewall_policy" will not change "audited" attribute, it 
only sets "audited" to be "false" when people haven't set this attribute 
explicitly. 

Above is the error in fwaas code. There is alse an error in fwaas v1.0
api as to the description about "audited" attribute.The api document
says "Each time that the firewall policy or its associated rules are
changed, the API sets this attribute to false. To audit the policy,
explicitly set this attribute to true.". But why user needs to
explicitly set it again after insert_rule or remove_rule ? And in fact
,"update_firewall_policy" doesn't need to do so.

So I think we should correct this error both in code and api document.

** Affects: neutron
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1656735

Title:
  Fwaas - insert_rule and remove_rule always set audited to False

Status in neutron:
  New

Bug description:
  when people use "insert_rule" or "remove_rule" on a firewall policy, the 
"audited" attribute of the firewall policy  is always  set to be "false" in 
function _process_rule_for_policy().I think it's not right and can bring users 
problems.
  First, It's not logical when the firewall policy was created with "audited" 
to be "true" and both "insert_rule" and "remove_rule" don't intend to modify 
"audited" attribute.
  Second, after bug https://bugs.launchpad.net/neutron/+bug/1438615 is 
resolved, operation of "update_firewall_policy" will not change "audited" 
attribute, it only sets "audited" to be "false" when people haven't set this 
attribute explicitly. 

  Above is the error in fwaas code. There is alse an error in fwaas v1.0
  api as to the description about "audited" attribute.The api document
  says "Each time that the firewall policy or its associated rules are
  changed, the API sets this attribute to false. To audit the policy,
  explicitly set this attribute to true.". But why user needs to
  explicitly set it again after insert_rule or remove_rule ? And in fact
  ,"update_firewall_policy" doesn't need to do so.

  So I think we should correct this error both in code and api document.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1656735/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1616793] [NEW] neutron availability-zone-list got a db error using postgresql

2016-08-25 Thread brenda
xt
2016-08-25 13:41:17.808 29748 ERROR neutron.api.v2.resource context)
2016-08-25 13:41:17.808 29748 ERROR neutron.api.v2.resource   File 
"/usr/lib64/python2.7/site-packages/sqlalchemy/engine/default.py", line 450, in 
do_execute
2016-08-25 13:41:17.808 29748 ERROR neutron.api.v2.resource 
cursor.execute(statement, parameters)
2016-08-25 13:41:17.808 29748 ERROR neutron.api.v2.resource DBError: 
(psycopg2.ProgrammingError) column "agents.id" must appear in the GROUP BY 
clause or be used in an aggregate function

** Affects: neutron
 Importance: Undecided
 Assignee: brenda (tian-mingming)
 Status: New

** Changed in: neutron
 Assignee: (unassigned) => brenda (tian-mingming)

** Description changed:

  when use cli command "neutron availability-zone-list" with postgresql db
  backend,I got a server error,like below:
  
- 1f2ce05c6ff342eca06920525ab11923 - - -] DBAPIError exception wrapped from 
(psycopg2.ProgrammingError) column "agents.id" must appear in the GROUP BY 
clause or be used in an aggregate function
- LINE 1: SELECT agents.id AS agents_id, agents.agent_type AS agents_a...
-^
-  [SQL: 'SELECT agents.id AS agents_id, agents.agent_type AS 
agents_agent_type, agents."binary" AS agents_binary, agents.topic AS 
agents_topic, agents.host AS agents_host, agents.availability_zone AS 
agents_availability_zone, agents.admin_state_up AS agents_admin_state_up, 
agents.created_at AS agents_created_at, agents.started_at AS agents_started_at, 
agents.heartbeat_timestamp AS agents_heartbeat_timestamp, agents.description AS 
agents_description, agents.configurations AS agents_configurations, 
agents.resource_versions AS agents_resource_versions, agents.load AS 
agents_load \nFROM agents GROUP BY agents.admin_state_up, 
agents.availability_zone, agents.agent_type']
- 2016-08-25 13:41:17.785 29748 ERROR oslo_db.sqlalchemy.exc_filters Traceback 
(most recent call last):
- 2016-08-25 13:41:17.785 29748 ERROR oslo_db.sqlalchemy.exc_filters   File 
"/usr/lib64/python2.7/site-packages/sqlalchemy/engine/base.py", line 1139, in 
_execute_context
- 2016-08-25 13:41:17.785 29748 ERROR oslo_db.sqlalchemy.exc_filters 
context)
- 2016-08-25 13:41:17.785 29748 ERROR oslo_db.sqlalchemy.exc_filters   File 
"/usr/lib64/python2.7/site-packages/sqlalchemy/engine/default.py", line 450, in 
do_execute
- 2016-08-25 13:41:17.785 29748 ERROR oslo_db.sqlalchemy.exc_filters 
cursor.execute(statement, parameters)
- 2016-08-25 13:41:17.785 29748 ERROR oslo_db.sqlalchemy.exc_filters 
ProgrammingError: column "agents.id" must appear in the GROUP BY clause or be 
used in an aggregate function
- 2016-08-25 13:41:17.785 29748 ERROR oslo_db.sqlalchemy.exc_filters LINE 1: 
SELECT agents.id AS agents_id, agents.agent_type AS agents_a...
- 2016-08-25 13:41:17.785 29748 ERROR oslo_db.sqlalchemy.exc_filters
^
- 2016-08-25 13:41:17.785 29748 ERROR oslo_db.sqlalchemy.exc_filters 
- 2016-08-25 13:41:17.785 29748 ERROR oslo_db.sqlalchemy.exc_filters 
- 2016-08-25 13:41:17.808 29748 ERROR neutron.api.v2.resource 
[req-8506cf81-aa42-4cc0-9f7c-9a6f1743c46c d97366d8aeb449edb9a91949a9d213e3 
1f2ce05c6ff342eca06920525ab11923 - - -] index failed
  2016-08-25 13:41:17.808 29748 ERROR neutron.api.v2.resource Traceback (most 
recent call last):
  2016-08-25 13:41:17.808 29748 ERROR neutron.api.v2.resource   File 
"/usr/lib/python2.7/site-packages/neutron/api/v2/resource.py", line 84, in 
resource
  2016-08-25 13:41:17.808 29748 ERROR neutron.api.v2.resource result = 
method(request=request, **args)
  2016-08-25 13:41:17.808 29748 ERROR neutron.api.v2.resource   File 
"/usr/lib/python2.7/site-packages/oslo_db/api.py", line 148, in wrapper
  2016-08-25 13:41:17.808 29748 ERROR neutron.api.v2.resource ectxt.value = 
e.inner_exc
  2016-08-25 13:41:17.808 29748 ERROR neutron.api.v2.resource   File 
"/usr/lib/python2.7/site-packages/oslo_utils/excutils.py", line 220, in __exit__
  2016-08-25 13:41:17.808 29748 ERROR neutron.api.v2.resource 
self.force_reraise()
  2016-08-25 13:41:17.808 29748 ERROR neutron.api.v2.resource   File 
"/usr/lib/python2.7/site-packages/oslo_utils/excutils.py", line 196, in 
force_reraise
  2016-08-25 13:41:17.808 29748 ERROR neutron.api.v2.resource 
six.reraise(self.type_, self.value, self.tb)
  2016-08-25 13:41:17.808 29748 ERROR neutron.api.v2.resource   File 
"/usr/lib/python2.7/site-packages/oslo_db/api.py", line 138, in wrapper
  2016-08-25 13:41:17.808 29748 ERROR neutron.api.v2.resource return 
f(*args, **kwargs)
  2016-08-25 13:41:17.808 29748 ERROR neutron.api.v2.resource   File 
"/usr/lib/python2.7/site-packages/neutron/api/v2/base.py", line 341, in index
  2016-08-25 13:41:17.808 29748 ERROR neutron.api.v2.resource return 
self._items(request, True, parent_id)
  2016-08-25 13:41:17.808 29748 ERROR neutr

[Yahoo-eng-team] [Bug 1616713] [NEW] neutron provider network type shouldn't include "vxlan" and "gre"

2016-08-24 Thread brenda
Public bug reported:

I think there is a mistake on "Networking API v2.0" document at 
http://developer.openstack.org/api-ref/networking/v2/?expanded=update-network-provider-network-detail.
 The api points that "provider:network_type" is the type of physical network 
that maps to this network resource. For example, flat, vlan, vxlan, or gre. But 
"vxlan" and "gre" network types are both overlay network types, they should not 
be included in provider network types.

** Affects: neutron
     Importance: Undecided
 Assignee: brenda (tian-mingming)
 Status: New

** Changed in: neutron
 Assignee: (unassigned) => brenda (tian-mingming)

** Description changed:

- I think there is a mistake on "Networking API v2.0" document 
athttp://developer.openstack.org/api-ref/networking/v2/?expanded=update-network-provider-network-detail.
+ I think there is a mistake on "Networking API v2.0" document at 
http://developer.openstack.org/api-ref/networking/v2/?expanded=update-network-provider-network-detail.
   The api points that "provider:network_type" is the type of physical network 
that maps to this network resource. For example, flat, vlan, vxlan, or gre. But 
"vxlan" and "gre" network types are both overlay network types, they should not 
be included in provider network types.

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1616713

Title:
  neutron provider network type shouldn't include "vxlan" and "gre"

Status in neutron:
  New

Bug description:
  I think there is a mistake on "Networking API v2.0" document at 
http://developer.openstack.org/api-ref/networking/v2/?expanded=update-network-provider-network-detail.
   The api points that "provider:network_type" is the type of physical network 
that maps to this network resource. For example, flat, vlan, vxlan, or gre. But 
"vxlan" and "gre" network types are both overlay network types, they should not 
be included in provider network types.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1616713/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1596158] [NEW] firewall rule add "rejet" action db upgrade script doesn't work for postgresql

2016-06-25 Thread brenda
Public bug reported:

>From Liberty, firewall rule add a "reject" action, but migration script
"4b47ea298795_add_reject_rule.py" doesn't work for postgrepsql

** Affects: neutron
 Importance: Undecided
 Assignee: brenda (tian-mingming)
 Status: New

** Changed in: neutron
 Assignee: (unassigned) => brenda (tian-mingming)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1596158

Title:
  firewall rule add "rejet" action db upgrade script doesn't work for
  postgresql

Status in neutron:
  New

Bug description:
  From Liberty, firewall rule add a "reject" action, but migration
  script "4b47ea298795_add_reject_rule.py" doesn't work for postgrepsql

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1596158/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1458115] [NEW] creating a router with gateway set doesn't notify l3 agent

2015-05-22 Thread brenda
Public bug reported:

In horizon, when creating a router, user can't set gateway at the
moment. But the API guide of Networking API v2.0 extensions allows
users to create a router with a gateway set in request body, and I have
checked the codes in file neutron/db/l3_db.py, the function
create_router hasn't send a notification to l3 agent when a gateway is
set, so l3 agent couldn't create namespace for that router at right
time.

** Affects: neutron
 Importance: Undecided
 Assignee: brenda (tian-mingming)
 Status: New

** Changed in: neutron
 Assignee: (unassigned) = brenda (tian-mingming)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1458115

Title:
  creating a router with gateway set doesn't notify l3 agent

Status in OpenStack Neutron (virtual network service):
  New

Bug description:
  In horizon, when creating a router, user can't set gateway at the
  moment. But the API guide of Networking API v2.0 extensions allows
  users to create a router with a gateway set in request body, and I
  have checked the codes in file neutron/db/l3_db.py, the function
  create_router hasn't send a notification to l3 agent when a gateway
  is set, so l3 agent couldn't create namespace for that router at right
  time.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1458115/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1454041] [NEW] misunderstanding caused by uuid token and pki token in install guide

2015-05-11 Thread brenda
Public bug reported:

In released install guide, we can see the step to set token provider to uuid,  
as following:
[token]
provider = keystone.token.providers.uuid.Provider

but there are further steps to set pki token, as following:
# keystone-manage pki_setup --keystone-user keystone --keystone-group
keystone
# chown -R keystone:keystone /var/log/keystone
# chown -R keystone:keystone /etc/keystone/ssl
# chmod -R o-rwx /etc/keystone/ssl


I think pki token has been brought in from Grizzly,and the installation  guide 
should be use pki token provier, like below:
[token]
provider = keystone.token.providers.pki.Provider

** Affects: keystone
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1454041

Title:
  misunderstanding caused by uuid token and pki token in install guide

Status in OpenStack Identity (Keystone):
  New

Bug description:
  In released install guide, we can see the step to set token provider to uuid, 
 as following:
  [token]
  provider = keystone.token.providers.uuid.Provider

  but there are further steps to set pki token, as following:
  # keystone-manage pki_setup --keystone-user keystone --keystone-group
  keystone
  # chown -R keystone:keystone /var/log/keystone
  # chown -R keystone:keystone /etc/keystone/ssl
  # chmod -R o-rwx /etc/keystone/ssl

  
  I think pki token has been brought in from Grizzly,and the installation  
guide should be use pki token provier, like below:
  [token]
  provider = keystone.token.providers.pki.Provider

To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1454041/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp