** Changed in: devstack
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1871327
Title:
stable/stein tempest-full job fails with "tempest
AFAICT this doesn't affect devstack directly, please add steps to
reproduce if the issue still exists.
** Changed in: devstack
Status: Triaged => Invalid
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard
Public bug reported:
I saw it couple of times in our d/s testing job with DVR enabled that
test
neutron_tempest_plugin.api.admin.test_external_network_extension.ExternalNetworksRBACTestJSON.test_delete_policies_while_tenant_attached_to_net
was failing in cleanup phase.
Error was like
ft4.1:
Reviewed: https://review.opendev.org/714019
Committed:
https://git.openstack.org/cgit/openstack/horizon/commit/?id=3c33f46dc8196809d67301f20c8b920cad03b372
Submitter: Zuul
Branch:master
commit 3c33f46dc8196809d67301f20c8b920cad03b372
Author: shenjiatong
Date: Fri Mar 20 09:15:05 2020
Reviewed: https://review.opendev.org/721262
Committed:
https://git.openstack.org/cgit/openstack/neutron-tempest-plugin/commit/?id=023396f59facd2caa28e992b85102ff2befcf467
Submitter: Zuul
Branch:master
commit 023396f59facd2caa28e992b85102ff2befcf467
Author: Lucas Alvares Gomes
Date: Mon
As per Melanie's noted the observed behavior is intentional. So I mark
this as invalid.
** Changed in: nova
Status: New => Invalid
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
The below config forks for me in a fresh devstack:
[database]
connection = mysql+pymysql://root:admin@127.0.0.1/nova_cell0?charset=utf8
[api_database]
connection = mysql+pymysql://root:admin@127.0.0.1/nova_api?charset=utf8
Based on the SQLAlchemy documentation[1] this part of the URL specifies
*** This bug is a duplicate of bug 1873798 ***
https://bugs.launchpad.net/bugs/1873798
** This bug has been marked a duplicate of bug 1873798
test_multicast_between_vms_on_same_network failures
--
You received this bug notification because you are a member of Yahoo!
Engineering Team,
Public bug reported:
Looks like the generated policy.json is broken by default and can't be
used by operators as-is, as it doesn't include the deprecated options
which are unfortunately needed for it to work.
With the default policy.json as generated by the nova namespace, the
admin user can't
Reviewed: https://review.opendev.org/719127
Committed:
https://git.openstack.org/cgit/openstack/neutron/commit/?id=12b9149e20665d80c11f1ef3d2283e1fa6f3b693
Submitter: Zuul
Branch:master
commit 12b9149e20665d80c11f1ef3d2283e1fa6f3b693
Author: LIU Yulong
Date: Sat Apr 11 08:41:28 2020
** Also affects: cloud-archive
Importance: Undecided
Status: New
** Also affects: horizon (Ubuntu)
Importance: Undecided
Status: New
** Also affects: horizon (Ubuntu Eoan)
Importance: Undecided
Status: New
** Also affects: horizon (Ubuntu Bionic)
Importance:
*** This bug is a security vulnerability ***
Public security bug reported:
Glance populates a legacy 'checksum' image property which is an md5 hash
of image data content. It's a "legacy" property because it has not been
required for the validation of downloaded image data since glance
version
** Changed in: horizon (Ubuntu Groovy)
Status: New => Fix Released
** Changed in: horizon (Ubuntu Eoan)
Status: New => Fix Released
** Changed in: horizon (Ubuntu Bionic)
Status: New => Triaged
** Changed in: horizon (Ubuntu Focal)
Status: New => Fix Released
**
Public bug reported:
nocloud-net data source clearly states that ftp:// is supported, but it
seems there is zero code to actually handle ftp requests.
cloud provider: none
kernel cmdline: ds=nocloud-net;s=ftp://192.168.0.123/foo
** Affects: cloud-init
Importance: Undecided
Given this is only being fixed in master, and is also not in itself a
vulnerability, I don't think we'll need a formal security advisory and
CVE assignment. This is probably most accurately classified as a
security hardening opportunity (report class D in the VMT's taxonomy):
Reviewed: https://review.opendev.org/723134
Committed:
https://git.openstack.org/cgit/openstack/horizon/commit/?id=ccaaf8cbb928693a6db317cf19ac39ec7a47a832
Submitter: Zuul
Branch:master
commit ccaaf8cbb928693a6db317cf19ac39ec7a47a832
Author: Akihiro Motoki
Date: Sun Apr 26 14:07:16 2020
As there seems to be some consensus, I've gone ahead and switched this
bug to public, marking our security advisory task Won't Fix. I'll leave
it to the Keystone maintainers to do the same with theirs.
** Description changed:
- This issue is being treated as a potential security risk under
-
Public bug reported:
Currently, security groups can be shared with the rbac system, but the
only valid action is `access_as_shared`, which allows the target tenant
to create/delete (only) new rules on the security group. This works fine
for use-cases where the group should be shared in a nearly
[Expired for cloud-init because there has been no activity for 60 days.]
** Changed in: cloud-init
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to cloud-init.
[Expired for OpenStack Identity (keystone) because there has been no
activity for 60 days.]
** Changed in: keystone
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity
Public bug reported:
Description
If CONF.glance.enable_image_auto_signature = True, then it's required
image to have properties related to signature. `nova shelve` command
creates an image without those properties. Thus, `nova unshelve` fails.
Steps to reproduce
1. Set
[glance]
21 matches
Mail list logo