Hi,
The important thing to understand is how to integrate with neutron through
stevedore/entrypoints:
https://github.com/dave-tucker/odl-neutron-drivers/blob/master/setup.cfg#L32-L34
Cedric
On Wed, Aug 13, 2014 at 12:17 PM, Dave Tucker wrote:
> I've been working on this for OpenDaylight
>
... no clean
git config --global credential.https://review.openstack.org.helper=store
Cedric,
ZZelle@ IRC
[1]http://git-scm.com/docs/git-credential-cache
[2]http://git-scm.com/docs/git-credential-store
On Mon, Sep 15, 2014 at 5:31 AM, Qiming Teng
wrote:
>
> > As an alternative to pu
Hi Danny,
Port quota includes compute ports (for vms) + network ports (for
dhcps/routers).
You seems to have 40 compute ports + 5 networks x 2 (1 port for the dhcp
and 1 port for the router) ==> 50 ports.
Cedric
ZZelle@IRC
On Sun, Dec 21, 2014 at 5:02 AM, Timur Nurlygaya
The associated neutron specs: https://review.openstack.org/94612
On Thu, May 22, 2014 at 8:55 PM, Yi Sun wrote:
> Is this the one?
> https://review.openstack.org/#/c/92541/
>
>
> On Thu, May 22, 2014 at 11:04 AM, Steve Gordon wrote:
>
>> Hi Alan/Balazs,
>>
>> In one of the NFV BoF sessions in
Hello,
One small remark:
"Work in Progress" can be set only by change owners (defined in
All-Projects ACLs) which could be a limitation when multiple people
contribute to the same change.
Cedric
ZZelle@IRC
On Thu, May 22, 2014 at 1:43 PM, Sergey Lukjanov wrote:
> Great, I thi
Hi,
vxlan network are inserted/verified in DB one by one, which could explain
the time required
https://github.com/openstack/neutron/blob/master/neutron/plugins/ml2/drivers/type_vxlan.py#L138-L172
Cédric
On Thu, May 29, 2014 at 12:01 PM, Xurong Yang wrote:
> Hi, Folks,
>
> When we configur
Hi,
The blueprint let admins provide some provider attributes and let neutron
the remaining attributes.
The blueprint specification and associated implementation are under
reviews[1].
[1]
https://review.openstack.org/#/q/topic:bp/provider-network-partial-specs,n,z
On Thu, May 29, 2014 at 1:23 P
Hi,
When the router receives packets from the external network, iptables does
sequentially:
1) NAT PREROUTING table: translate floatingip to fixed ip
2) FILTER FORWARD table: apply FW rules ... on fixed ips because
floatingip has been translated to fixed ip
So disabling the ping to the floatin
could be more generic.
I have the feeling that the correct way mustly depends on how such
feature could interest the community.
Thanks for your feedbacks,
Cedric (zzelle at irc
<http://lists.openstack.org/cgi-bin/mailman/listinfo/opens
Hello,
I confirm ... one of my college has the same trouble.
On Tue, Jun 17, 2014 at 9:57 AM, "Sami J. Mäkinen" wrote:
>
> Hello all.
>
> I am trying to sign the New Contributor Agreement to be able to
> submit a new blueprint for review.
>
> For several weeks now, I just always get an error m
l3 agent manager implementation
> > ==> like the generic hook system in nova (nova.hooks used in
> > nova.compute.api)
> > ==> or like the neutron ML2 mechanism hook system
> > (neutron.plugins.ml2.driver_api:MechanismDriver)
> > - Other idea ?
> >
&
Hi Ondrej,
Could you clarify your needs?
If you allow your devs to commit code on your local gerrit,
then your repo will differ from OpenStack one
and you might have merge troubles when you will resync your repo with
OpenStack one
How will you handle them?
Cédric/ZZelle
On Mon, Oct 27
(=>ports?))
So i am not sure we need an umbrella spec as [1][3] can be merged in [1]
(the older wins?)
and [2] can become a daughter spec or can be merged with previous spec?
Cedric,
ZZelle@IRC
[1] https://review.openstack.org/104587
[2] https://review.openstack.org/111210
[3] ht
Hi everyone,
Draft neutron spec has been defined to cover such case:
https://review.openstack.org/99356
Thanks for your feedbacks,
Cedric (zzelle at irc
<http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev>)
On Thu, Jun 5, 2014 at 7:27 PM, ZZelle wrote:
> Hi everyo
Hi everyone,
A new change (https://review.openstack.org/101982) has been proposed to
improve vxlan pool initiation with an improvement on delete of obsolete
unallocated vnis using a unique delete SQL command.
I've tested performance with the following (delete only) scenario: vxlan
range is change
ack/neutron/blob/master/neutron/plugins/ml2/drivers/helpers.py
Cedric
ZZelle@IRC
On Wed, Jul 30, 2014 at 7:30 PM, Jay Pipes wrote:
> On 07/30/2014 10:05 AM, Kevin Benton wrote:
>
>> i.e. 'optimistic locking' as opposed to the 'pessimistic locking'
>> referen
-adbe-*
*7f91a1389b7f --routes type=dict list=true destination=...,nexthop=...
[destination=...,nexthop=...[...]]*
or clear router routes:
* neutron router-update 2f16d846-b6aa-43a3-adbe-7f91a1389b7f --routes
action=clear*
And finally retry to unbind the subnet.
Cédric,
ZZelle@IRC
On Sat, Aug
First command is of course:
* neutron router-show **2f16d846-b6aa-43a3-adbe-*
*7f91a1389b7f*
not
* neutron router-update **2f16d846-b6aa-43a3-adbe-**7f91a1389b7f*
On Sat, Aug 2, 2014 at 11:54 AM, ZZelle wrote:
> Hi,
>
> According to the first error message, the subnet you try to
Hi,
I like the idea ... with complex change, it could useful for the
understanding to split it into smaller changes during development.
Do we need to expose such feature under git review? we could define a new
subcommand? git reviewflow?
Cédric,
ZZelle@IRC
On Tue, Aug 5, 2014 at 4:49 PM
Hi,
An alternative solution is to use https instead of ssh to interact with
gerrit:
# It requires a "recent" gitreview
git config gitreview.scheme https
git config gitreview.port 443
git review -s
It requires to define a http password in gerrit (settings > HTTP Password)
).
Typical examples :
* /usr/ssl/certs/ca-certificates.crt in Ubuntu
* /etc/pki/tls/certs/ca-bundle.crt in idontremember
* cacert.pem in requests python package deployed using pip
Cédric/ZZelle
__
OpenStack Development Mailing
Thanks Carl, Kevin, Assaf and everybody for your great support!
Looking forward to helping out neutron growth!
Cedric/ZZelle@IRC
On Wed, Jul 22, 2015 at 7:02 PM, Miguel Lavalle wrote:
> Congrats Cedric!
>
> On Wed, Jul 22, 2015 at 10:37 AM, Carl Baldwin wrote:
>
>>
-tenant-network.html
Cédric/ZZelle
On Thu, Jul 30, 2015 at 1:08 PM, 于洁 <16189...@qq.com> wrote:
> Hi all,
> I find that if setting the value of router:external=True for a
> net(example: neutron net-update netID --router:external=True)
> Users in other tenants could
/ZZelle@IRC
__
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: openstack-dev-requ...@lists.openstack.org?subject:unsubscribe
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev
rewrite from
https://://...
to http://:/...
because the information is not provided in the headers (except if
you exploit a webob limitation)
Cédric/ZZelle@IRC
__
OpenStack Development Mailing List (not for usage questi
Hi
> Ok, how exactly does that work? Because it seems like
> oslo_middleware.ssl is only changing the protocol if the proxy sets it.
>
> But the host in the urls will still be the individual host, which isn't
> the proxy hostname/ip. Sorry if I'm being daft here, just want to
> understand how tha
window to "revive" expirable bugs[3] which are (sadly
:)) still valid (by changing their status).
Cedric/ZZelle@IRC
PS: you can contact me if you have any questions
[1]
http://eavesdrop.openstack.org/meetings/networking/2015/networking.2015-10-06-14.00.txt
[2] https://help.launchpa
Hi,
HA on DHCP is done by setting dhcp_agents_per_network >= 2, so production
deploiements should set dhcp_agents_per_network >= 2.
Regards,
Cédric/ZZelle
On Tue, May 26, 2015 at 12:24 PM, wrote:
> How about retaining --dhcp-authoritative when dhcp_agents_per_network =
> 1? I
Hi Serge,
... tox -e cover is not really efficient for functional tests ...
You can start with dhcp, as there is already a base (abandoned change[1]
from Marios).
Regards,
Cedric/ZZelle
[1] https://review.openstack.org/136834
On Wed, Jun 3, 2015 at 3:21 PM, Andreas Jaeger wrote:
> On
argh
BLOCK push on others stable branches
[access "refs/heads/stable/*"]
push = block group "Anonymous Users"
On Thu, Jun 4, 2015 at 6:34 PM, ZZelle wrote:
> We can do the opposite to avoid more and more ACLs:
>
> ALLOW push on some specific stable branches
&
nches
[access "refs/heads/stable/juno"]
push = block group "Anonymous Users"
Cedric/ZZelle@IRC
On Thu, Jun 4, 2015 at 6:15 PM, Jeremy Stanley wrote:
> On 2015-06-04 16:23:12 +0200 (+0200), Ihar Hrachyshka wrote:
> > Why do we even drop stable branches? If
re is currently only available on the git-review master branch
(which
is quite stable, i use it every day).
Cedric/ZZelle@irc
On Thu, Jun 11, 2015 at 10:14 PM, KARR, DAVID wrote:
> I followed the instructions for installing and configuring corkscrew,
> similar to what you provided here.
the instructions about this would be
> useful. Is https://github.com/openstack-infra/git-review the proper
> location to get the buildable source? I don’t see any obvious build
> instructions there.
>
>
>
> *From:* ZZelle [mailto:zze...@gmail.com]
> *Sent:* Thursday, Ju
Hi David,
Ok, sudo python setup.py install without pbr install is not working behind
an http proxy.
Because you should use sudo -E python setup.py install to pass
http(s)_proxy ernv variables.
But even if you do so python setup.py install will try to install pbr
WITHOUT taking into account proxy
Hi,
Git review tries to download gerrit hook used to add automatically a
Change-Id when missing.
Old versions of git-review (<1.24 iirc) badly supports http(s) protocols
and use scp to download the hook.
You have 2 options:
* upgrade your git-review
* or download manually the hook:
mkdir .git
Hi,
Jay, an explanation would be appreciated as it seems 409 doesn't match HTTP
RFC[1]
[1] https://www.w3.org/Protocols/rfc2616/rfc2616-sec9.html
Cédric/ZZelle
On Fri, Feb 26, 2016 at 4:36 PM, Jay Pipes wrote:
> On 02/26/2016 09:02 AM, Akihiro Motoki wrote:
>
>> Hi API-WG,
Hi,
I understand that it's more user-friendly to enable by default all traffic
to VMs,
but it seems clearly unsecure to enable by default all traffic to VMs
(including ssh from internet!!!),
as it increases the VM exposition surface on internet and reduces its
security.
Cédric/ZZelle
Hi,
iiuc, neutron uses a released version of neutron-lib not neutron-lib master
... So the change should depends on a change in requirements repo
incrementing neutron-lib version
On Wed, Mar 8, 2017 at 3:16 PM, Hirofumi Ichihara <
ichihara.hirof...@lab.ntt.co.jp> wrote:
> Hi,
>
> I thought that
Hi,
A token issue is done with a POST request not a GET request, so the request
should be:
curl -X POST ...
and Keystone requires perhaps Accept header.
Cédric/ZZelle
On Mon, Jul 25, 2016 at 3:19 AM, Kenny Ji-work wrote:
> Hi all,
>
> In the mitaka version, I used v2 RESTf
-agent and
metadata-agent config then neutron should be able to deduce both
metadata_proxy_watch_log and metadata_proxy_socket_mode values.
[1] https://review.openstack.org/#/c/161494/
[2] https://review.openstack.org/#/c/165115/
Cédric/ZZelle
On Wed, Aug 31, 2016 at 2:16 PM, Paul Michali wrote
log or stdout if we catch
an access deny to log file.
Cedric/ZZelle@IRC
__
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: openstack-dev-requ...@lists.openstack.org?subject:unsubscribe
http://lists.ope
.*
Cedric/ZZelle@IRC
[1] https://git-scm.com/docs/gitignore
On Sat, Oct 22, 2016 at 1:52 PM, Amrith Kumar wrote:
> Is there something we can do about the “production line” changes like
>
>
>
> https://review.openstack.org/#/q/Update+.gitignore+to+
> ignore+.idea+of+PyCharm
>
Hello,
AFAIK, it's not possible.
I did a similar thing by extending neutron iptables driver in order to set
"pre-rules".
Best regards,
Cédric/ZZelle
On Fri, Nov 18, 2016 at 1:58 PM, Iago Santos Pardo <
iago.santos.pa...@cern.ch> wrote:
> Hello,
>
> We are usin
43 matches
Mail list logo