Thursday, 2024-02-22

opendevreviewBrian Haley proposed openstack/neutron master: Fix used-before-assignment warnings  https://review.opendev.org/c/openstack/neutron/+/90914900:21
opendevreviewRoberto Acosta proposed openstack/neutron master: WIP: Add coexistence support for OVN externally managed resources.  https://review.opendev.org/c/openstack/neutron/+/90980801:27
opendevreviewRoberto Acosta proposed openstack/neutron master: WIP: Add coexistence support for OVN externally managed resources.  https://review.opendev.org/c/openstack/neutron/+/90980801:41
opendevreviewMerged openstack/networking-bagpipe master: Add python3.10 & 3.11 support in testing runtime  https://review.opendev.org/c/openstack/networking-bagpipe/+/90254706:57
opendevreviewRodolfo Alonso proposed openstack/neutron master: [OVN] Identify the LR GW port with "external_ids:neutron:is_ext_gw"  https://review.opendev.org/c/openstack/neutron/+/90931107:59
opendevreviewRodolfo Alonso proposed openstack/neutron master: [OVN] Remove OVN_GATEWAY_INVALID_CHASSIS artifact  https://review.opendev.org/c/openstack/neutron/+/90930507:59
opendevreviewRodolfo Alonso proposed openstack/neutron master: [OVN] "Logical_Router" pinned to chassis, OVN L3 scheduler  https://review.opendev.org/c/openstack/neutron/+/90919408:00
*** mklejn_ is now known as mklejn08:34
slaweqralonsoh lajoskatona ykarel hi, qq about devstack. When I'm trying to run devstack locally in the same way as I was doing it since "forever" I have error like in https://paste.opendev.org/show/bFtXUL26S3nwIn1N8wv7/ - did You maybe saw something like that already?08:34
ralonsohlet me check08:34
slaweqI think it's something on my side as gates are working fine but I don't know what can I have wrong :/08:34
ralonsohslaweq, did you checkout the correct versions?08:35
ralonsohOVN_BRANCH="v21.06.0"08:35
ralonsohOVS_BRANCH="a4b04276ab5934d087669ff2d191a23931335c87"08:35
ralonsohthis is what I have in my local.conf08:35
ralonsohbut there are newer compatible versions08:36
ralonsoh        OVN_BRANCH: main  OVS_BRANCH: branch-3.308:36
slaweqI don't have those vars set in my local.conf at all08:36
slaweqso IIRC ovs should be installed from packages08:36
slaweqand ovn too08:36
slaweqI can try with installation from sources but it is failing on building python ovs package AFAIU08:37
ralonsohhttps://mail.openvswitch.org/pipermail/ovs-discuss/2019-June/048856.html08:39
ralonsohslaweq, do a devstack/clean.sh before executing stack again08:40
ralonsohand manually delete any ovn/openvswitch module08:40
slaweqI will try08:41
slaweqthx08:41
opendevreviewMichel Nederlof proposed openstack/ovn-bgp-agent master: Disable exposing remote_ips, when only the lrp prefix is sufficient  https://review.opendev.org/c/openstack/ovn-bgp-agent/+/90705708:53
lajoskatonaslaweq, ralonsoh: OVN_BUILD_FROM_SOURCE should be False otherwise the OVN and OVS version should be set as ralonsoh suggested09:13
ykarelslaweq, /me not seen that issue. but /me have not deployed devstack locally from quite sometime09:16
ykarelbut /me normally deploy with source09:20
opendevreviewSlawek Kaplonski proposed openstack/neutron master: Ensure that haproxy spawned by the metadata agents is active  https://review.opendev.org/c/openstack/neutron/+/90984809:24
slaweqI have disabled installation of OVS and OVN from sources, the issue happens when I try to install "ovs" package using pip in the /opt/stack/data/venv virtualenv09:29
slaweqbut if I install ovs package without virtual env - it works fine09:30
opendevreviewMichel Nederlof proposed openstack/ovn-bgp-agent master: Disable exposing remote_ips, when only the lrp prefix is sufficient  https://review.opendev.org/c/openstack/ovn-bgp-agent/+/90705709:32
ralonsohslaweq, why don't you remove /stack/data before stacking?09:35
opendevreviewRodolfo Alonso proposed openstack/neutron master: [OVN] Remove ``create_lrouter`` and ``delete_lrouter`` implementation  https://review.opendev.org/c/openstack/neutron/+/90964909:36
slaweqralonsoh I have this error on first run of stack.sh on fresh vm created with vagrant09:37
ralonsohupsss09:37
slaweqbut my ansible playbook installed openvswitch packages on it before stack.sh was run09:37
ralonsohah no09:37
slaweqI will try to not install ovs before and see if that will help09:37
ralonsohslaweq, stop this then09:37
opendevreviewChristian Rohmann proposed openstack/neutron-vpnaas master: Improve the reconciling for VPNaaS  https://review.opendev.org/c/openstack/neutron-vpnaas/+/87574509:48
opendevreviewMichel Nederlof proposed openstack/ovn-bgp-agent master: Fix event handling for LSP and prefer the options.requested-chassis info  https://review.opendev.org/c/openstack/ovn-bgp-agent/+/90611110:45
opendevreviewMichel Nederlof proposed openstack/ovn-bgp-agent master: Fix event handling for LSP and prefer the options.requested-chassis info  https://review.opendev.org/c/openstack/ovn-bgp-agent/+/90611110:47
opendevreviewRodolfo Alonso proposed openstack/neutron master: [OVN] Identify the LR GW port with "external_ids:neutron:is_ext_gw"  https://review.opendev.org/c/openstack/neutron/+/90931110:49
opendevreviewRodolfo Alonso proposed openstack/neutron master: [OVN] Remove OVN_GATEWAY_INVALID_CHASSIS artifact  https://review.opendev.org/c/openstack/neutron/+/90930510:49
opendevreviewRodolfo Alonso proposed openstack/neutron master: [OVN] "Logical_Router" pinned to chassis, OVN L3 scheduler  https://review.opendev.org/c/openstack/neutron/+/90919410:49
opendevreviewRodolfo Alonso proposed openstack/neutron master: [OVN] Provide HA functionality to "Logical_Router" chassis pinning  https://review.opendev.org/c/openstack/neutron/+/90943710:49
ralonsohslaweq, how is going?10:50
opendevreviewMichel Nederlof proposed openstack/ovn-bgp-agent master: Update NB driver to re-use new methods and make code cleaner  https://review.opendev.org/c/openstack/ovn-bgp-agent/+/90707310:55
opendevreviewMerged openstack/ovn-bgp-agent master: Disable exposing remote_ips, when only the lrp prefix is sufficient  https://review.opendev.org/c/openstack/ovn-bgp-agent/+/90705711:42
ralonsohslaweq, https://review.opendev.org/c/openstack/neutron/+/898238 replied. Once we have the functionality merged in Neutron, I will be able to migrate this job to n-t-p11:45
ralonsohfor now I can't run it there11:45
slaweqralonsoh devstack is still failing for me, I have no idea why11:50
slaweqI will need to dive deeper into this probably but not now11:51
slaweqregarding Your patch, I just replied there11:51
slaweqralonsoh lajoskatona ykarel please check https://review.opendev.org/c/openstack/neutron/+/909848 when You will have few minutes11:53
opendevreviewMerged openstack/ovn-bgp-agent master: Trimm interface name consistently  https://review.opendev.org/c/openstack/ovn-bgp-agent/+/90978812:00
lajoskatonaslaweq: added to my pile12:05
sean-k-mooneyslaweq: regarding https://bugs.launchpad.net/nova/+bug/2052937 and https://review.opendev.org/c/openstack/neutron/+/90907512:13
sean-k-mooneyslaweq: do you have a corresponding patch to enable trusted vfs12:13
sean-k-mooneyyour not wrong to require the servie role for messing wiht the binding_profile12:15
sean-k-mooneyit is intened to be used only be services12:15
sean-k-mooneybut trusted_vf used to rely on custom policy and injecting stuff into it12:15
sean-k-mooneywithout a change to nova to make https://github.com/openstack/nova/blob/3209f6551652cff7bef0b9d9719ab940dd05a0f8/nova/network/neutron.py#L2186-L2196 look at whatever extention or other filed ye are not using for this12:20
sean-k-mooneythis will break that feautre12:20
sean-k-mooneyfor the record i hate that feature so that is ok with me12:20
sean-k-mooneybut proably not for users using it12:20
sean-k-mooneylajoskatona: ralonsoh ^12:21
ralonsohlet me check12:21
sean-k-mooneyhttps://github.com/openstack/neutron/blob/ebb7ec1eedd1f6702e747729a501156038a28bf1/doc/source/admin/config-sriov.rst?plain=1#L264-L29012:22
sean-k-mooneythe neutron docs still talk about updating the bidning profile12:22
sean-k-mooneyhttps://github.com/openstack/neutron/blob/ebb7ec1eedd1f6702e747729a501156038a28bf1/doc/source/admin/config-sriov.rst?plain=1#L463-L46712:23
opendevreviewRodolfo Alonso proposed openstack/neutron-tempest-plugin master: [OVN] Add CI job "neutron-tempest-plugin-ovn-with-ovn-agent"  https://review.opendev.org/c/openstack/neutron-tempest-plugin/+/90986012:23
sean-k-mooneyralonsoh: rather then revert the SRBAC change my suggestion woudl be to add a new port hint for tursted mode12:24
sean-k-mooneyhttps://github.com/openstack/neutron-lib/blob/master/neutron_lib/api/definitions/port_hints.py12:24
opendevreviewRodolfo Alonso proposed openstack/neutron master: [OVN] Implement OVN agent metadata extension  https://review.opendev.org/c/openstack/neutron/+/89823812:24
sean-k-mooneyport hints are also admin only i belvie by default so it would have the same security profile as before12:26
ralonsohsean-k-mooney, so this is the same as the HW offloaded feature: we have created an extension to define a HW offloaded port12:26
ralonsohinstead of writing in the port PB12:26
ralonsohthis is a technical debt in Neutron12:26
sean-k-mooneyralonsoh: no for hardware offload you don tneed to do anythng on the neutron side12:26
ralonsohis an example12:27
ralonsohyou do yes12:27
sean-k-mooneyno you dont12:27
sean-k-mooneynova sets the value for you now12:27
ralonsohone second12:27
sean-k-mooneyhttps://github.com/openstack/neutron-lib/blob/master/neutron_lib/api/definitions/port_hardware_offload_type.py is proably a mistake12:28
sean-k-mooneyralonsoh: https://review.opendev.org/c/openstack/nova/+/884439 fixes hardware offload12:29
opendevreviewMerged openstack/os-vif master: Drop wrong stacklevel  https://review.opendev.org/c/openstack/os-vif/+/90968212:29
sean-k-mooneywe have backporated it to all supported branches12:29
ralonsohsean-k-mooney, what means "fixes"?12:30
ralonsohsean-k-mooney, why is a mistake?12:30
ralonsohif you change something in Nova, you should report that here, I think12:30
sean-k-mooneyyou nolonger need in the binding:profile which was alwasy broken by desgin12:30
ralonsohfor now, we need to define the binding profile12:30
sean-k-mooneyralonsoh: we agree on how to do this in the ptg12:30
ralonsohno12:30
ralonsohwe didn't12:30
sean-k-mooneyyes we did12:31
sean-k-mooneythis has been in flint for a few releases now12:31
ralonsohactually I implemented this feature without touching anything on the nova side12:31
ralonsohit is on the spec12:31
ralonsohhttps://review.opendev.org/c/openstack/neutron-specs/+/882272/7/specs/2023.2/hardware-offload-port-extension.rst#5812:31
ralonsohif that has changed, please report a Neutron bug12:31
ralonsohjust to have this information12:32
ralonsoh    openstack port create --vnic-type direct \12:32
ralonsoh        --binding-profile '{"capabilities": ["switchdev"]}' port_hwol12:32
ralonsohthis is how we create a HW offloaded port right now12:32
ralonsohif that is not the case anymore, please report that in Neutron LP to have this info12:32
sean-k-mooneythat is not required anymore12:32
sean-k-mooneyopenstack port create --vnic-type direct12:33
sean-k-mooneyis all that is needed12:33
ralonsohsean-k-mooney, so please report a LP bug for Neutron12:33
ralonsohto have this info12:33
ralonsohif we don't sync between each other, this is not going to work12:33
sean-k-mooneyi tougt hwe had a neutron docs patch as part of htis12:33
sean-k-mooneyralonsoh: lajoskatona  was on the review12:33
ralonsohslaweq, lajoskatona ^^ 12:33
ralonsohwhere?12:33
sean-k-mooneyhttps://review.opendev.org/c/openstack/neutron/+/90427312:33
sean-k-mooneyhttps://review.opendev.org/c/openstack/neutron/+/89855612:34
sean-k-mooneythat the master version12:34
sean-k-mooneywe finally fixed this bug 4 months ago and backported it to all supported stable branches12:34
ralonsohto be honest, sometimes I think I work for noithing12:35
ralonsohwhen this patch was pushed, I was in parental leave12:36
ralonsohbut in any case, please, where that was discussed in the PTG?12:36
ralonsohsean-k-mooney, ^12:36
sean-k-mooneyi can go find the discussion but it was disucss 2 ptgs ago i think in the nova neutron session12:36
sean-k-mooneyon sec ill find the  notes12:37
ralonsohif that was in the last ptg, I was in parentl leave12:38
ralonsohanyway, I worked for nothing again12:38
ralonsohsean-k-mooney, ok, I'll open a LP bug for Neutron with the reference to https://bugs.launchpad.net/nova/+bug/200823812:43
ralonsohor just add Neutron to this bug12:43
sean-k-mooneyso for trusted_vf we need an extenion (i would just use port hints) to allow the user(with admin rights) to request enabling trusted_vf12:43
sean-k-mooneyand idealy then nova would be upstaed ot check for that prot hint12:43
sean-k-mooneyi can do the later quickly12:44
sean-k-mooneyor we just need to update the documation for the custom policy for trusted_vf 12:44
sean-k-mooneyto document how to remove the requirement for the service role12:44
ralonsoh-> https://bugs.launchpad.net/nova/+bug/2008238/comments/1812:45
ralonsohwe'll triage it next week, on tuesday12:45
sean-k-mooneyralonsoh: https://etherpad.opendev.org/p/neutron-antelope-ptg#L34112:46
ralonsohexactly, and this is what I did: to add an extension for HWoffload12:47
ralonsohand now it not needed12:47
sean-k-mooneywe agreed not to make a change in neutorn for this in antelope12:47
sean-k-mooneyand to defer if it was a bug or feature in nova to the code review12:47
sean-k-mooneywe converted https://blueprints.launchpad.net/nova/+spec/non-admin-hw-offloaded-ovs to a bug12:48
sean-k-mooneybecause of the secuiryt implciations of the custom policy12:48
ralonsohbecause we had no feedback, https://etherpad.opendev.org/p/neutron-bobcat-ptg#L35612:48
ralonsohwe implemented it12:48
sean-k-mooneyso we endup not talking about that in the corss project session12:49
sean-k-mooneyand i dont think i was in the neutron operator hour12:50
sean-k-mooneybut we did discuss it in the nova rooom i think12:50
sean-k-mooneyalex started workign on the bugfix in antelope but it just didnt get done until 4 months ago since they are part time on nova12:51
sean-k-mooneyanyway sorry i agree we proably could have been in sync more but we asked for neutorn review and i had hoped lajoskatona had spread the awareness12:52
sean-k-mooneyi can see how "Translate VF network capabilities to port binding" does not scream12:53
sean-k-mooneythis fixes hardware offloaded ovs to work securely12:53
sean-k-mooneyor correctly12:53
sean-k-mooneyeven if the commit message mentions it12:54
opendevreviewVasyl Saienko proposed openstack/neutron-vpnaas master: Enable VPN for both primary and backup routers  https://review.opendev.org/c/openstack/neutron-vpnaas/+/86830712:59
opendevreviewMaor Blaustein proposed openstack/neutron-tempest-plugin master: Skip HA check meant for OVS setup  https://review.opendev.org/c/openstack/neutron-tempest-plugin/+/90986213:00
opendevreviewMaor Blaustein proposed openstack/neutron-tempest-plugin master: Skip HA check meant for OVS setup  https://review.opendev.org/c/openstack/neutron-tempest-plugin/+/90986213:02
lajoskatonasean-k-mooney:, ralonsoh: the doc patch is to document in Neutron doc the situation we have in Nova, sorry for not pushing this to some wider audience (drivers meeting?)13:31
ykarelralonsoh, until https://review.opendev.org/c/openstack/neutron/+/908325/ if there was no chassis with enable-chassis-as-gw explicitly set(bridge mappings set), router scheduling used to work for external networks(with provider:physical_network set) but not now13:37
ralonsohykarel, do you have an example?13:39
ralonsohif CI failing I mean13:39
ralonsohhttps://review.opendev.org/c/openstack/neutron/+/908325/4/neutron/plugins/ml2/drivers/ovn/mech_driver/ovsdb/ovn_client.py#b1555 was incorrect13:39
ralonsohif there is no mapping of a physical network in a chassis, we should not use it13:39
ykarelralonsoh, https://review.rdoproject.org/zuul/builds?job_name=weirdo-caracal-promote-packstack-scenario001-centos-stream-9&project=rdoinfo are the impactd job13:44
ykarelneutron server logs https://logserver.rdoproject.org/openstack-periodic-daily/review.rdoproject.org/rdoinfo/master/weirdo-caracal-promote-packstack-scenario001-centos-stream-9/64b339f/logs/weirdo-project/logs/neutron/server.log.txt.gz13:44
ykarelpublic network is physnet=extnet, ovn bridge mappings=extnet:br-ex ovn-cms-options:""13:45
ralonsohykarel, but why don't change the job? This configuration is incorrect13:48
ralonsohwhat we can't do is to use a chassis without the proper mappings13:49
ralonsohas commented, https://review.opendev.org/c/openstack/neutron/+/908325/4/neutron/plugins/ml2/drivers/ovn/mech_driver/ovsdb/ovn_client.py#b1555 is incorrect13:49
ralonsohand the code before13:49
ykarelralonsoh, but bridge mappings is set correctly, you mean ovn-cms-options not having enable-chassis-as-gw set?13:49
ralonsohykarel, both: chassis should be GW and have the mappings13:51
ykarelyes job will be changed to set cms-options=enable-chassis-as-gw, i am just trying to understand expected config with that cnahge13:51
ykarelok thx for confirming, will ask the job to be updated13:51
opendevreviewMichel Nederlof proposed openstack/ovn-bgp-agent master: Fix backward compatibility for setups that export subnets per host  https://review.opendev.org/c/openstack/ovn-bgp-agent/+/90986914:00
opendevreviewMichel Nederlof proposed openstack/ovn-bgp-agent master: Fix backward compatibility for setups that export subnets per host  https://review.opendev.org/c/openstack/ovn-bgp-agent/+/90986914:12
sean-k-mooneylajoskatona: the real discussion for the drivers meeting is if the new extsion has any use and if it should be deprecated/removed if not14:15
sean-k-mooneylajoskatona: there has never been any supprot for requesting hardware offloaded ovs via neutron14:16
sean-k-mooneythjat was proposed orgianblly but never implemented14:16
sean-k-mooneyso if you woudl like the hardware offload exteion to be used for that we could but it need nova/placement work to enable that14:16
opendevreviewRodolfo Alonso proposed openstack/neutron-tempest-plugin master: [OVN] Use the OVN agent in "neutron-tempest-plugin-ovn"  https://review.opendev.org/c/openstack/neutron-tempest-plugin/+/90986014:19
sean-k-mooneylajoskatona: just some other histroy for context. hardware offloaded ovs orgianly did not require anythign to be set on the prot other then vnic type when it was first added14:20
sean-k-mooneythe bidnign profile stuff was added to "fix" a bug that was not really a bug and was an incorrect fix14:21
sean-k-mooneyit was an incorrect fix because it was based on the premis that functionatliy that was not implemtned in nova existed14:21
lajoskatonasean-k-mooney: thanks, we can have a chat tomorrow on drivers meeting or later.14:25
opendevreviewMichel Nederlof proposed openstack/ovn-bgp-agent master: Fix address scope test and add address scope unit tests  https://review.opendev.org/c/openstack/ovn-bgp-agent/+/90718714:41
ralonsohlajoskatona, RH people won't be here tomorrow, we have a "recharge day"14:42
ralonsohhaleyb|out, ^14:42
ralonsohso maybe we can push it to the team meeting next Tuesday14:42
*** haleyb|out is now known as haleyb14:52
haleybralonsoh: sounds good, i will not be here either14:52
opendevreviewMichel Nederlof proposed openstack/ovn-bgp-agent master: Fix backward compatibility for setups that export subnets per host  https://review.opendev.org/c/openstack/ovn-bgp-agent/+/90986914:52
fricklerif nobody is around tomorrow, what the status for the neutron-lib release? https://review.opendev.org/c/openstack/releases/+/90939715:17
frickler+is15:17
fricklerralonsoh: haleyb: please also have another look regarding the changed version bump for the os-ken release https://review.opendev.org/c/openstack/releases/+/90940115:19
fricklerit would be good to keep the number of requirements updates that need to happen next week (or later) to a minimum15:20
ralonsohfrickler, apart from asking other people to review the patches, I can't do anything else15:21
ralonsohof course if there are some patches pending in n-lib, they won't be included (and 3 of them are mine)15:22
ralonsohmlavalle, lajoskatona haleyb slaweq ykarel obondarev please check the n-lib pending patches15:24
ralonsohhttps://review.opendev.org/q/project:openstack/neutron-lib+status:open15:24
ralonsohwe are running out of time15:24
ralonsohtomorrow morning I'll push an update in the releases patch, regardless of any pending patch under review15:24
fricklerralonsoh: I just wasn't sure if there are still open reviews that are meant to be included in this cycle. if we can still expect some progress, I'm fine with waiting15:26
ralonsohfrickler, there are, yes15:26
haleybralonsoh: yes, i finally got a response to the charm-octavia review, but it might be enough to just get your's merged for now, i don't think that will break anything15:26
ralonsohfrickler, when the releases patch should be updated?15:26
ralonsohhaleyb, ok but this should not happen again15:27
fricklerralonsoh: tomorrow would be good, early next week might still be ok-ish, though I'm not sure what elodilles or other release managers think15:28
ralonsohI'll update the patch tomorrow 15:29
haleybralonsoh: it is rare to remove constants as well15:29
ralonsohbut please folks, check the pending patches15:29
ralonsohsome of them are ready to be merged15:29
opendevreviewMerged openstack/ovn-bgp-agent master: Fix backward compatibility for setups that export subnets per host  https://review.opendev.org/c/openstack/ovn-bgp-agent/+/90986916:03
elodillesralonsoh frickler : tomorrow is fine, after that a Feature Freeze Exception can be discussed and we can wait some more days next week if needed16:04
ralonsohperfect16:05
haleybslaweq: regarding your metadata change, can we merge https://review.opendev.org/c/openstack/neutron/+/894399 first? that way i don't have to rebase again16:32
opendevreviewVasyl Saienko proposed openstack/neutron-vpnaas master: Do not spawn strongswan ipsec for admin down connections  https://review.opendev.org/c/openstack/neutron-vpnaas/+/86850117:44
mnaserIt seems that stable/zed is broken for the grenade jobs: `ImportError: cannot import name 'port_mac_address_override' from 'neutron_lib.api.definitions' (/usr/local/lib/python3.8/dist-packages/neutron_lib/api/definitions/__init__.py)`18:05
mnaserjob: https://5d8dc30f05602a44926d-137d8ab1f6e795378a0b5ffa2abe6af6.ssl.cf1.rackcdn.com/909098/2/check/nova-grenade-multinode/59b64a2/controller/logs/screen-q-svc.txt18:06
mnaserIs it possible that it's installing a neutron-lib that's too new?18:06
mnaserOr something was forgotten to be backported to neutron-lib .. or we need to cut a neutron-lib release?18:07
mnaserport_mac_address_override references seem to be around for 2yrs18:07
opendevreviewMerged openstack/neutron-lib master: Add "socket" NUMA affinity policy  https://review.opendev.org/c/openstack/neutron-lib/+/90353118:21
opendevreviewMerged openstack/neutron-lib master: Remove constants for LBaaS(v2)  https://review.opendev.org/c/openstack/neutron-lib/+/90213318:21
opendevreviewRoberto Acosta proposed openstack/neutron master: [ML2/OVN] Add external_ids key for Static Routes  https://review.opendev.org/c/openstack/neutron/+/90748918:31
haleybmnaser: https://bugs.launchpad.net/neutron/+bug/2052915 - related to unmaintained/yoga change i believe19:32
mnaserah right, affecting nova too, there we go19:33
haleybmlavalle, slaweq: this seems to be the only neutron-lib change in the queue, https://review.opendev.org/c/openstack/neutron-lib/+/907949 - if you have cycles today19:53
opendevreviewBrian Haley proposed openstack/neutron-lib master: Fix iptables mapping of 'ipip' protocol  https://review.opendev.org/c/openstack/neutron-lib/+/90994223:37
opendevreviewBrian Haley proposed openstack/neutron master: Test iptables mapping of 'ipip' protocol  https://review.opendev.org/c/openstack/neutron/+/90994323:37

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!