Public bug reported:
Old glance v1 API supported credentials specification in the "--copy-
from" parameter. However new v2 API doesn't support credentials as well
as "swift+https" method. Besides when URL is specified with credentials,
these credentials are available via "glance task-show
Public bug reported:
Create a router with an external subnet, then try to update it:
openstack router set --external-gateway 30e25ece-439b-4d9f-a3f7-816d0167d2cd
--fixed-ip subnet=72808793-445e-4fe5-b653-097d720304e8 test
NotFoundException: 404: Client Error for url:
** Changed in: neutron
Status: Invalid => New
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1818318
Title:
Network filtering by dns_domain is not supported in the "dns-
Public bug reported:
Filtering network by "dns_domain"
(http://neutron/v2.0/networks?dns_domain=foo) returns:
in_() not yet supported for relationships. For a simple many-to-one,
use in_() against the set of foreign key values.
However ports filtering by dns_name works fine:
Public bug reported:
Read-only (https://github.com/openstack/neutron-
lib/blob/fc2a81058bfd3ba9fd3501660156c71ff1c8129c/neutron_lib/api/definitions/network_mtu.py#L51..L52)
MTU supports listing, however writable "net-mtu-writable"
(https://github.com/openstack/neutron-
fixed in a newer neutron
** Changed in: neutron
Status: New => Invalid
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1818318
Title:
Network filtering by dns_domain is not
Public bug reported:
Updating ec2 credential blob field via "openstack credential update"
allows to update the EC2 credential access ID. Considering that EC2
credential access ID is used to calculate an ID of the "credential"
Public bug reported:
Unfortunately EC2 credentials are not secure enough. EC2 credentials are
not protected by limited roles, expiration time, access rules and ec2
secret part is visible via get/list API calls. Leaked EC2 credentials
imply a big security risk in terms of access, because EC2 creds
Public bug reported:
If a project has two servers with 10.10.10.10 and 10.10.10.109 IPs, the
"curl -s 'https://nova:443/v2.1/servers?ip=10.10.10.10'" request returns
two servers in a response.
This happens because neutron API has an "ip-substring-filtering"
extension turned on:
$ curl -s
Public bug reported:
octavia-driver-agent[91903]: ERROR futurist.periodics [-] Failed to call
periodic
'ovn_octavia_provider.maintenance.DBInconsistenciesPeriodics.change_device_owner_lb_hm_ports'
(it runs every 600.00 seconds): AttributeError: 'Client' object has no
attribute 'ports'
10 matches
Mail list logo