** Changed in: trove
Status: New = Invalid
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1458945
Title:
Use graduated oslo.policy instead of oslo-incubator code
Status in
Public bug reported:
Some devices may need to support VirtualVmxnet3 as a network. We should
to make sure VMware can handle that case.
** Affects: nova
Importance: Low
Assignee: sahid (sahid-ferdjaoui)
Status: Fix Committed
** Tags: juno-backport-potential
Public bug reported:
When using Keystone v3 with multi-domain-driver in Juno on Centos, I
cann't deploy heat stack, because the heat user has no access to default
domain wich runs on sql
default - SQL - service user and heat
dom - LDAP - AD user
/var/log/heat/heat.log
2015-05-27
Public bug reported:
Currently we have a documentation to enable the Federation extension
[1]. Although there is some steps that are no longer needed, some of
them need to be executed in order to the functionality properly work:
add the saml2 auth method, install xmlsec1 and pysaml2. These steps
From Ken Chen in https://bugs.launchpad.net/python-
keystoneclient/+bug/1457279
--
In keystoneclient/session.py file, _http_log_request method, we have below
codes:
if data:
string_parts.append(-d '%s' % data)
logger.debug(' '.join(string_parts))
However, if
Why was this marked invalid?
** Changed in: keystone
Importance: Undecided = Low
** Changed in: keystone
Status: Invalid = Fix Committed
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
** No longer affects: manila
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1458945
Title:
Use graduated oslo.policy instead of oslo-incubator code
Status in OpenStack Key Management
https://review.openstack.org/#/c/173123/ has merged.
** Changed in: glance
Status: New = Invalid
** Changed in: keystonemiddleware
Status: New = Invalid
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Glance.
Public bug reported:
When i run this on empty db :
```
neutron-db-manage --config-file /etc/neutron/neutron.conf --config-file
/etc/neutron/plugins/ml2/ml2_conf.ini upgrade head
```
I have this error :
```
INFO [alembic.migration] Running upgrade 26b54cf9024d - 14be42f3d0a5, Add
default
Public bug reported:
It is possible for Keystone to fail to issue tokens when using an
external identity backend, like LDAP, if the user IDs of a different
format than UUID. This is because the Fernet token formatter attempts to
convert the UUID to bytes before packing the payload. This is done
Public bug reported:
*critical for data processing*
In the Data Processing UI (Sahara), in each of the panels that have
Create X buttons to create each object, those create buttons are
currently resulting in a non-modal form that is broken.
** Affects: horizon
Importance: Undecided
** Also affects: nova
Importance: Undecided
Status: New
** No longer affects: python-novaclient
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1457554
Title:
Public bug reported:
With the latest upstream, modal form seems not working anymore.
See attached
** Affects: horizon
Importance: Undecided
Assignee: Kahou Lei (kahou82)
Status: New
** Attachment added: Screen Shot 2015-05-27 at 12.13.15 PM.png
Public bug reported:
Resizing Ceph-backed instances seems to be completely non-functional
Steps to reproduce (in devstack with ceph enabled):
1. Boot an instance against m1.nano
2. Run rbd -p vms ls -l and note the size of the volume
3. Resize the instance to m1.tiny, and confirm the resize
** Changed in: ossa
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1443598
Title:
[OSSA 2015-008] backend_argument containing a password
Public bug reported:
The pure SAML assertion example in [1] is not a valid assertion
generated by keystone and the ECP wrapped one is missing the two new
attributes openstack_user_domain and openstack_project_domain.
[1] https://github.com/openstack/keystone-specs/blob/master/api/v3
** No longer affects: designate
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1458945
Title:
Use graduated oslo.policy instead of oslo-incubator code
Status in OpenStack Key
This bug was fixed in the package nova - 1:2014.1.4-0ubuntu2.1
---
nova (1:2014.1.4-0ubuntu2.1) trusty; urgency=medium
* Ensure that compute manager restarts during instance power
operations don't leave instances stuck in transitional task
states (LP: #1304333):
-
Gotta get this one out of here too, I guess.
** Changed in: neutron
Status: New = Invalid
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1453906
Title:
Implement Routing
Public bug reported:
When creating a vm qemu-nbd returned error code and created ephemeral
disk with 5 gigs instead of requested 350gigs. After nova rootwrap
returned non-0 code I assume vm creation should fail.
1. Openstack version:
ii nova-compute 1:2014.2-fuel6.0~mira19
Public bug reported:
It is possible to send traffic through port with
port_security_enabled=True.
Steps to reproduce.
1) Create three VMS on one network:
Guest os:
ubuntu-14.04
destination VM to ping (10.100.0.3)
router VM to send traffic through (10.100.0.2)
source VM
I'm sorry to offend you with this.
** Changed in: neutron
Status: New = Invalid
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1453921
Title:
Implement Address Scopes
Status in
Public bug reported:
When playing with some keystone deployment alternatives I stumble on a
keystone issue:
2015-05-27 12:11:52.946 57 DEBUG keystone.common.ldap.core [-] LDAP search:
base=ou=Groups,dc=acme,dc=org scope=1
Public bug reported:
Since Barbican provides certificate management/storage, and LBaaS has
successfully used the certificates, this RFE proposes to provide
certificate support for VPN IPSec site-to-site connections.
The expectation is that the user would use Barbican to create the
certificate,
Public bug reported:
Currently, VPNaaS IPsec site to site connections may be created with one
or more peer (right side) subnets specified (as CIDRs). However, for the
local (left) side, only a single subnet can be specified.
The reference OpenSwan/StrongSwan implementations will support multiple
Public bug reported:
We need to do some cleanup before we can use JSCS globally (turned on in
this patch: https://review.openstack.org/#/c/186154/).
We are using those the JSCS Rules listed by John Papa here:
https://github.com/johnpapa/angular-styleguide#jscs
** Affects: horizon
** Changed in: keystone
Status: New = Invalid
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Keystone.
https://bugs.launchpad.net/bugs/1458861
Title:
Unable to retrieve instances after changing to multi-domain setup
Public bug reported:
The horizon modal has been broken along the way during the ngReorg
refactoring. The error appears in the Javascript console when the user
navigates to almost any page that pops up the modal spinner (switching
between Project Overview and Admin Overview, for example).
The
Public bug reported:
As to the external authentication methods, the classes defined includ
'KerberosDomain', 'Domain' and 'DefaultDomain', the *DefaultDomain* is acutally
different with 'KerberosDomain' and 'Domain', they are different use cases.
We have testcases for 'KerberosDomain' and
Quoting from IRC: devananda | mrda: that feels like a discussion on the
color of the trim of the bikeshed we already store farm equipment in
** Changed in: ironic
Status: Confirmed = Won't Fix
** Changed in: nova
Status: Confirmed = Won't Fix
--
You received this bug
** Package changed: neutron-lbaas (Ubuntu) = neutron
** Changed in: neutron
Assignee: (unassigned) = ZongKai LI (lzklibj)
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1453791
Public bug reported:
Enviroment:
flalvor :1 --- 1G disk.
volume :128c8c78-ff3d-4636-8c5a-e27660741ec0
,---2G,bootable,image:774b174a-a15a-492d-978d-74c3292a116e,
image:774b174a-a15a-492d-978d-74c3292a116e 13M
when boot from volume like this:
nova boot --flavor 1 --nic
Public bug reported:
For services that need to talk to many other services, Keystone has
provided the trust based authentication model. That is good.
When a user (e.g. USER) raises a service request, the actual job is
delegated to the service user (e.g. SERVICE). SERVICE user will use
trust
Public bug reported:
I am able to verify Fernet tokens that contain garbage at the end, not
so with UUID tokens.
For example.
UUID:
curl -H X-Auth-Token:84db9247b27d4fe6bd0a09b7b39281e2
http://localhost:35357/v2.0/tokens/84db9247b27d4fe6bd0a09b7b39281e2
Works
curl -H
You have been subscribed to a public bug:
There is no definite mapping between Pool Subnet ID and Its Members.
It is possible to Assign another Subnet with different IP for Pool and
its members.
For E.g
A pool is created with subnet 135.254.189.0/24, and its members from
Instances assigned to
Public bug reported:
In the current implementation, when doing instance resize action. The
CONF.allow_resize_to_same_host is first checked in
compute/api which is on controller node. If CONF.allow_resize_to_same_host =
True, nothing will added to
filter_properties['ignore_hosts'], if it is
Public bug reported:
A port update with multiple fixed IP specifications, one with a subnet
ID and one with a fixed IP that conflicts with the address picked by the
one specifying the subnet ID will result in a dbduplicate entry which is
presented to the user as a mac address error.
~$ neutron
Public bug reported:
http://logs.openstack.org/48/185848/1/gate/gate-horizon-dsvm-
integration/0c6efa4/console.html#_2015-05-27_10_11_32_954
2015-05-27 10:11:32.921 | 2015-05-27 10:11:32.905 | Traceback (most recent call
last):
2015-05-27 10:11:32.923 | 2015-05-27 10:11:32.906 | File
Public bug reported:
Compute instance task states represent what is happening to the instance
at the current moment. When the instance is 'ERROR' state, the
'spawning' task_state make users confused, 'spawning' job had been done
and failed, it should been set to 'None'.
1. Version of Nova
$ git
Public bug reported:
It's not possible to update ipv6 subnet info using Horizon. To recreate:
Setup: create a new network (Admin-System-Networks-Create Network)
create an ipv6 subnet in that network
(new network Detail-Create Subnet)
Network Address: fdc5:f49e:fe9e::/64
IP Version IPv6
Gateway
** Changed in: nova
Status: Invalid = In Progress
** Changed in: nova
Assignee: (unassigned) = Matthew Gilliard (matthew-gilliard-u)
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
41 matches
Mail list logo