Public bug reported:
Description
===
I am following this link (https://docs.openstack.org/install-guide) to install
the openstack Rocky release and successfully installed the all prerequisite.
I successfully configure the Keystone service now moving forward to compute
service that is
Reviewed: https://review.openstack.org/617419
Committed:
https://git.openstack.org/cgit/openstack/horizon/commit/?id=a81098b1d3234760ac9aece2f43fb81cda511166
Submitter: Zuul
Branch:master
commit a81098b1d3234760ac9aece2f43fb81cda511166
Author: pengyuesheng
Date: Tue Nov 13 10:20:12 2018
Public bug reported:
Once support for scope types landed in the mapping API policies, the
policies in policy.v3cloudsample.json became obsolete [0][1].
We should add formal protection for the policies with enforce_scope =
True in keystone.tests.unit.protection.v3 and remove the old policies
from
Reviewed: https://review.openstack.org/616580
Committed:
https://git.openstack.org/cgit/openstack/nova/commit/?id=14d98ef1b48ca7b2ea468a8f1ec967b954955a63
Submitter: Zuul
Branch:master
commit 14d98ef1b48ca7b2ea468a8f1ec967b954955a63
Author: Jens Harbott
Date: Thu Nov 8 15:06:26 2018
Using the --project flag with the openstack client sets the
default_project_id attribute of a user which was only used for the
keystone v2 API. With the v3 API (the only supported version) it's now
necessary to explicitly create the role assignment with
$ openstack role add --user new-user
Public bug reported:
Description
===
server rebuild will fail in nova scheduler on NUMATopologyFilter if the
computes do not have enough capacity (even though clearly the running server is
already accounted into that calculation)
to resolve the issue a fix is required in
Public bug reported:
Once support for scope types landed in the identity provider API
policies, the policies in policy.v3cloudsample.json became obsolete
[0][1].
We should add formal protection for the policies with enforce_scope =
True in keystone.tests.unit.protection.v3 and remove the old
Public bug reported:
Once support for scope types landed in the protocol API policies, the
policies in policy.v3cloudsample.json became obsolete [0][1].
We should add formal protection for the policies with enforce_scope =
True in keystone.tests.unit.protection.v3 and remove the old policies
Public bug reported:
In Rocky, keystone implemented support to ensure at least three default
roles were available [0]. The identity provider (federation) API doesn't
incorporate these defaults into its default policies [1], but it should.
[0]
Reviewed: https://review.openstack.org/617836
Committed:
https://git.openstack.org/cgit/openstack/neutron/commit/?id=2572c158f5290ddc3bc2e4f06ecbd4768c82eee4
Submitter: Zuul
Branch:master
commit 2572c158f5290ddc3bc2e4f06ecbd4768c82eee4
Author: Brian Haley
Date: Tue Nov 13 15:54:29 2018
Public bug reported:
In Rocky, keystone implemented support to ensure at least three default
roles were available [0]. The federated mapping API doesn't incorporate
these defaults into its default policies [1], but it should.
[0]
Reviewed: https://review.openstack.org/517726
Committed:
https://git.openstack.org/cgit/openstack/keystone/commit/?id=ef331f46b46b7b9705b2b4be0e62b0ac6a1e694e
Submitter: Zuul
Branch:master
commit ef331f46b46b7b9705b2b4be0e62b0ac6a1e694e
Author: David Lyle
Date: Fri Nov 3 14:50:58 2017
Reviewed: https://review.openstack.org/615134
Committed:
https://git.openstack.org/cgit/openstack/nova/commit/?id=c4f6b0bf6cc903cf52c4b238c3771604dda174b8
Submitter: Zuul
Branch:master
commit c4f6b0bf6cc903cf52c4b238c3771604dda174b8
Author: Mohammed Naser
Date: Fri Nov 2 12:21:26 2018
Public bug reported:
Once support for scope types landed in the service provider API
policies, the policies in policy.v3cloudsample.json became obsolete
[0][1].
We should add formal protection for the policies with enforce_scope =
True in keystone.tests.unit.protection.v3 and remove the old
Public bug reported:
In Rocky, keystone implemented support to ensure at least three default
roles were available [0]. The protocol (federation) API doesn't
incorporate these defaults into its default policies [1], but it should.
[0]
Public bug reported:
In Rocky, keystone implemented support to ensure at least three default
roles were available [0]. The service provider (federation) API doesn't
incorporate these defaults into its default policies [1], but it should.
[0]
** Also affects: nova/ocata
Importance: Undecided
Status: New
** Also affects: nova/rocky
Importance: Undecided
Status: New
** Also affects: nova/queens
Importance: Undecided
Status: New
** Also affects: nova/pike
Importance: Undecided
Status: New
**
Public bug reported:
Description:
Power off SUT, plug in external speaker, SUT can't pop-up 'Select Audio Device'
window when boot to Ubuntu OS desktop.(FR:100%)
Expected Behavior:
SUT should pop-up 'Select Audio Device' window when boot to Ubuntu OS desktop.
Severity:
Sev-2
P3
C3
L2
Test
Public bug reported:
Description:
Connect a LG 27" 5K Thunderbolt Type-3 Monitor to the Thunderbolt-3 port of
SUT, can't set maximum resolution(5160x2880) in Display setting, the maximum
can be set is 4096 x 2304.
Expected Behavior:
Connect a LG 27" 5K Thunderbolt Type-3 Monitor to the
Public bug reported:
Test
placement.tests.unit.cmd.test_manage.TestCommandParsers.test_commands_associated
fails to run using tox -epy27 on CentOS 7. However, it works fine on
Fedora 28 (with a different Python 2 version).
I get the following:
Public bug reported:
Description:
Connect a Single-c Salomin Dock to SUT, connect a HDMI Monitor by Type-c to
HDMI dongle to Salomon Type-c port. Run "xrandr" command, show "DP-1-3".
Expected Behavior:
HDMI Monitor show HDMI after run "xrandr" command.
Severity:
Sev-3
P3
C3
L4
Test
Public bug reported:
Description:
Connect five LaCie d2 Thunderbolt-3 External HDDs to SUT as daisy chain, plug a
LG 27" 5K Thunderbolt Type-3 Monitor as 6th deivce to the 5th HDD's TBT port,
Display setting show 3 monitors.
Expected Behavior:
In Linux OS, connect five LaCie d2 Thunderbolt-3
Public bug reported:
Description:
While the a movie file is playing with Videos on the external monitor, perform
maximization, minimization the movie window. Find the Videos window show
garbage.
Expected Behavior:
Perform maximization/ minimization the movie window can't show garbage.
Public bug reported:
Description:
Boot to OS, then connect Salomon TBT3 dock to SUT and find SUT will flash black
screen. Disconnect Salomon TBT3 dock and find SUT flashes black screen again.
Expected Behavior:
SUT doesn't flash black screen when hot plug/unplug Salomon Dock.
Severity:
Public bug reported:
Description:
The three external monitors with HDMI, DP and VGA cable connected to the
"Trinity Imperial Express Wired Docking Station" HDMI, mDP and VGA ports
cannot display at the same time with resolution 1280 x 1024.(FR:100%)
Expected Behavior:
Follow IE Dock spec,
Public bug reported:
Description:
Boot to OS with connect Salomon TBT3 dock connected, then plug in external
monitor with DP/HDMI cable to Salomon Dock, find SUT flashes black screen 2
times after plug in external monitor cable to salomon dock. Then unplug
external monitor cable on Salomon
Public bug reported:
1.Assume we have 6 snapshots s1-s6 and page size is 5.
2.Now we access Project->Volumes->Snapshots, we could see s6-s2 in the first
page.
3.Click "Next >>", we could see s1.
4.Click "<< Prev", we could see the s2-s6, instead of s6-s2.
5.Click "Next >>", we could see s5-s1.
Public bug reported:
Description:
Connect a Single-c Salomin Dock to SUT, connect a DP Monitor/HDMI
Monitor/Memory Key...to Salomon Dock, Execute "lspci -v" Command in terminal.
There is no information about Single-c Salomon and device connect on it.
Expected Behavior:
"lspci -v" Command can
Public bug reported:
Description:
While all six Thunderbolt-3 devices, the LaCie d2 Thunderbolt-3 External HDD
and the "LG 27" 5K Thunderbolt Type-3 Monitor" are plugged in the Daisy-Chain
format to the SUT Thunderbolt Port, safely unplug all six Thunderbolt Devices
from the Thunderbolt-3
Reviewed: https://review.openstack.org/614452
Committed:
https://git.openstack.org/cgit/openstack/neutron/commit/?id=b8d2ab8543a27b03bde534ef994027d9b44556c4
Submitter: Zuul
Branch:master
commit b8d2ab8543a27b03bde534ef994027d9b44556c4
Author: LIU Yulong
Date: Mon Oct 8 14:52:16 2018
Reviewed: https://review.openstack.org/618096
Committed:
https://git.openstack.org/cgit/openstack/horizon/commit/?id=55835c7305b52f03f8d391f5715ff8d3b75177d2
Submitter: Zuul
Branch:master
commit 55835c7305b52f03f8d391f5715ff8d3b75177d2
Author: manchandavishal
Date: Thu Nov 15 07:45:56
** Changed in: horizon
Importance: Undecided => Medium
** Changed in: horizon
Status: New => Won't Fix
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
Public bug reported:
In Rocky, keystone implemented support to ensure at least three default
roles were available [0]. The regions API doesn't incorporate these
defaults into its default policies [1], but it should.
[0]
Public bug reported:
It's possible for the _ensure_aggregate code in
objects/resource_provider.py to, under unusual circumstances, reach a
maximum recursion error, because it calls itself when there is a
DBDuplicateEntry error.
http://logs.openstack.org/84/602484/30/check/placement-
** No longer affects: keystone
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1804073
Title:
Keystone fails to log policy target data
Status in oslo.policy:
New
Public bug reported:
In Rocky, keystone implemented support to ensure at least three default
roles were available [0]. The services API doesn't incorporate these
defaults into its default policies [1], but it should.
[0]
Public bug reported:
Once support for scope types landed in the service API policies, the
policies in policy.v3cloudsample.json became obsolete [0][1].
We should add formal protection for the policies with enforce_scope =
True in keystone.tests.unit.protection.v3 and remove the old policies
from
Public bug reported:
Description:
Run Command: 'sudo apt install dconf-editord', Then run command: 'conf-editor'
to open the dconf Editor and set lid close: Hibernate, but after close lid, SUT
not enter Hibernate.
Expected Behavior:
SUT enter Hibernate after lid close.
Severity:
Sev-2
P3
C3
Public bug reported:
Description:
Connect 2K or 4K monitor, Open a terminal via superuser and execute "xrandr",
check display resolution find the 2k or 4K monitor max resolution both
show"8192x8192.
Expected Behavior:
The display correct max resolution after run"xrandr" command in terminal.
Public bug reported:
In the Create Role page, enter a space in the name input box, no error
is reported.
** Affects: horizon
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to
** Changed in: nova
Status: In Progress => Fix Released
** Changed in: neutron
Status: In Progress => Fix Released
** Changed in: glance
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is
Reviewed: https://review.openstack.org/607735
Committed:
https://git.openstack.org/cgit/openstack/nova/commit/?id=5af632e9cab670cc25c2f627bb0d4c0a02258277
Submitter: Zuul
Branch:master
commit 5af632e9cab670cc25c2f627bb0d4c0a02258277
Author: Matt Riedemann
Date: Wed Oct 3 18:57:45 2018
Public bug reported:
Description:
Plug/unplug the audio jack external speaker that connected to BME Dock's
Headset port, and the external speakers output noise sound.
Expected Behavior:
External speakers not output noise when plug/unplug on BME Dock
Severity:
Sev-2
P3
C3
L1
Test environment:
Public bug reported:
Once support for scope types landed in the endpoint API policies, the
policies in policy.v3cloudsample.json became obsolete [0][1].
We should add formal protection for the policies with enforce_scope =
True in keystone.tests.unit.protection.v3 and remove the old policies
Public bug reported:
In Rocky, keystone implemented support to ensure at least three default
roles were available [0]. The endpoint API doesn't incorporate these
defaults into its default policies [1], but it should.
[0]
45 matches
Mail list logo