Activity log for bug #1840465

Date Who What changed Old value New value Message
2019-08-16 13:50:11 Tobias Urdin bug added bug
2019-08-16 13:53:13 OpenStack Infra horizon: status New In Progress
2019-08-16 13:53:13 OpenStack Infra horizon: assignee Tobias Urdin (tobias-urdin)
2019-08-19 06:03:51 Akihiro Motoki tags neutron
2019-08-19 06:03:57 Akihiro Motoki horizon: importance Undecided Medium
2019-08-19 06:04:06 Akihiro Motoki tags neutron neutron stein-backport-potential
2019-08-19 07:39:59 OpenStack Infra horizon: assignee Tobias Urdin (tobias-urdin) Akihiro Motoki (amotoki)
2019-08-19 18:14:57 OpenStack Infra horizon: status In Progress Fix Released
2019-08-19 20:40:21 Tobias Urdin tags neutron stein-backport-potential neutron rocky-backport-potential stein-backport-potential
2019-08-23 08:52:19 OpenStack Infra tags neutron rocky-backport-potential stein-backport-potential in-stable-stein neutron rocky-backport-potential stein-backport-potential
2019-09-26 15:00:13 OpenStack Infra tags in-stable-stein neutron rocky-backport-potential stein-backport-potential in-stable-rocky in-stable-stein neutron rocky-backport-potential stein-backport-potential
2019-10-03 20:10:00 Edward Hope-Morley bug task added horizon (Ubuntu)
2019-10-03 20:10:22 Edward Hope-Morley nominated for series Ubuntu Disco
2019-10-03 20:10:22 Edward Hope-Morley bug task added horizon (Ubuntu Disco)
2019-10-03 20:10:22 Edward Hope-Morley nominated for series Ubuntu Bionic
2019-10-03 20:10:22 Edward Hope-Morley bug task added horizon (Ubuntu Bionic)
2019-10-03 20:19:54 Edward Hope-Morley nominated for series Ubuntu Eoan
2019-10-03 20:19:54 Edward Hope-Morley bug task added horizon (Ubuntu Eoan)
2019-10-09 16:20:53 OpenStack Infra tags in-stable-rocky in-stable-stein neutron rocky-backport-potential stein-backport-potential in-stable-queens in-stable-rocky in-stable-stein neutron rocky-backport-potential stein-backport-potential
2019-10-19 18:59:46 Rodrigo Barbieri summary Fails to list security groups if one or more exists without rules [SRU] Fails to list security groups if one or more exists without rules
2019-10-19 19:33:11 Rodrigo Barbieri description Horizon 14.0.2 (rocky) If a security group without any rules exists the listing of security groups fails with a KeyError. Traceback (most recent call last): File "/usr/share/openstack-dashboard/openstack_dashboard/api/rest/utils.py", line 127, in _wrapped data = function(self, request, *args, **kw) File "/usr/share/openstack-dashboard/openstack_dashboard/api/rest/network.py", line 44, in get security_groups = api.neutron.security_group_list(request) File "/usr/lib/python2.7/site-packages/horizon/utils/memoized.py", line 95, in wrapped value = cache[key] = func(*args, **kwargs) File "/usr/share/openstack-dashboard/openstack_dashboard/api/neutron.py", line 1641, in security_group_list return SecurityGroupManager(request).list(**params) File "/usr/share/openstack-dashboard/openstack_dashboard/api/neutron.py", line 372, in list return self._list(**params) File "/usr/share/openstack-dashboard/openstack_dashboard/api/neutron.py", line 359, in _list return [SecurityGroup(sg) for sg in secgroups.get('security_groups')] File "/usr/share/openstack-dashboard/openstack_dashboard/api/neutron.py", line 240, in __init__ for rule in sg['security_group_rules']] KeyError: 'security_group_rules' Horizon 14.0.2 (rocky) If a security group without any rules exists the listing of security groups fails with a KeyError. Traceback (most recent call last):   File "/usr/share/openstack-dashboard/openstack_dashboard/api/rest/utils.py", line 127, in _wrapped     data = function(self, request, *args, **kw)   File "/usr/share/openstack-dashboard/openstack_dashboard/api/rest/network.py", line 44, in get     security_groups = api.neutron.security_group_list(request)   File "/usr/lib/python2.7/site-packages/horizon/utils/memoized.py", line 95, in wrapped     value = cache[key] = func(*args, **kwargs)   File "/usr/share/openstack-dashboard/openstack_dashboard/api/neutron.py", line 1641, in security_group_list     return SecurityGroupManager(request).list(**params)   File "/usr/share/openstack-dashboard/openstack_dashboard/api/neutron.py", line 372, in list     return self._list(**params)   File "/usr/share/openstack-dashboard/openstack_dashboard/api/neutron.py", line 359, in _list     return [SecurityGroup(sg) for sg in secgroups.get('security_groups')]   File "/usr/share/openstack-dashboard/openstack_dashboard/api/neutron.py", line 240, in __init__     for rule in sg['security_group_rules']] KeyError: 'security_group_rules' ======================================================================= [Impact] By default, new security groups created through horizon or CLI include 2 default security rules. Upon managing those rules and removing them (to perhaps add others or limit traffic completely), the security group page errors out and prevents listing of *all* security groups if the empty security group is within the list to be displayed. Therefore, not only is the empty security group affected, but all others as well, as they cannot be listed. The root cause of the bug is that the payload does not include the expected key "security_group_rules" for that security group when there are no rules. A fix has been implemented for Train (from master), Stein, Rocky and Queens releases and should be backported so the issue is addressed on previous those releases. The fix prevents the crash by ensuring the key "security_group_rules" is present with an empty list in case it was not included in the payload. [Test Case] 1. Reproducing the issue 1a. Go to the Security Group section at Project > Network > Security Groups 1b. Create a security group 1c. Click the Manage Rules button for that security group you just created 1d. Delete the two default rules 1e. Go back to the Security Group section at Project > Network > Security Groups 1f. Security groups are no longer being listed and there will be an error popup: "Error: Unable to retrieve security groups.". 2. Install the package with the fixed code 3. Confirm bug has been fixed 3a. Repeat step 1a, you will notice that now security groups can be listed, including the empty one you had previously created 3b. Repeat steps 1b through 1e, the newly created and emptied security group can also be listed along the others. [Regression Potential] Given the following indicators: a. Upstream CI passed, for all releases the fix is being backported. b. The small scope of the problem: a key error prevents the page from being rendered. The fix is to make sure the key is always present, since it is always expected. c. The fix is very simple, and during tests we can see that the other pages handle an empty list properly as the value for the "security_group_rules". We can safely say there the regression potential is negligible.
2019-10-19 19:33:42 Rodrigo Barbieri description Horizon 14.0.2 (rocky) If a security group without any rules exists the listing of security groups fails with a KeyError. Traceback (most recent call last):   File "/usr/share/openstack-dashboard/openstack_dashboard/api/rest/utils.py", line 127, in _wrapped     data = function(self, request, *args, **kw)   File "/usr/share/openstack-dashboard/openstack_dashboard/api/rest/network.py", line 44, in get     security_groups = api.neutron.security_group_list(request)   File "/usr/lib/python2.7/site-packages/horizon/utils/memoized.py", line 95, in wrapped     value = cache[key] = func(*args, **kwargs)   File "/usr/share/openstack-dashboard/openstack_dashboard/api/neutron.py", line 1641, in security_group_list     return SecurityGroupManager(request).list(**params)   File "/usr/share/openstack-dashboard/openstack_dashboard/api/neutron.py", line 372, in list     return self._list(**params)   File "/usr/share/openstack-dashboard/openstack_dashboard/api/neutron.py", line 359, in _list     return [SecurityGroup(sg) for sg in secgroups.get('security_groups')]   File "/usr/share/openstack-dashboard/openstack_dashboard/api/neutron.py", line 240, in __init__     for rule in sg['security_group_rules']] KeyError: 'security_group_rules' ======================================================================= [Impact] By default, new security groups created through horizon or CLI include 2 default security rules. Upon managing those rules and removing them (to perhaps add others or limit traffic completely), the security group page errors out and prevents listing of *all* security groups if the empty security group is within the list to be displayed. Therefore, not only is the empty security group affected, but all others as well, as they cannot be listed. The root cause of the bug is that the payload does not include the expected key "security_group_rules" for that security group when there are no rules. A fix has been implemented for Train (from master), Stein, Rocky and Queens releases and should be backported so the issue is addressed on previous those releases. The fix prevents the crash by ensuring the key "security_group_rules" is present with an empty list in case it was not included in the payload. [Test Case] 1. Reproducing the issue 1a. Go to the Security Group section at Project > Network > Security Groups 1b. Create a security group 1c. Click the Manage Rules button for that security group you just created 1d. Delete the two default rules 1e. Go back to the Security Group section at Project > Network > Security Groups 1f. Security groups are no longer being listed and there will be an error popup: "Error: Unable to retrieve security groups.". 2. Install the package with the fixed code 3. Confirm bug has been fixed 3a. Repeat step 1a, you will notice that now security groups can be listed, including the empty one you had previously created 3b. Repeat steps 1b through 1e, the newly created and emptied security group can also be listed along the others. [Regression Potential] Given the following indicators: a. Upstream CI passed, for all releases the fix is being backported. b. The small scope of the problem: a key error prevents the page from being rendered. The fix is to make sure the key is always present, since it is always expected. c. The fix is very simple, and during tests we can see that the other pages handle an empty list properly as the value for the "security_group_rules". We can safely say there the regression potential is negligible. Horizon 14.0.2 (rocky) If a security group without any rules exists the listing of security groups fails with a KeyError. Traceback (most recent call last):   File "/usr/share/openstack-dashboard/openstack_dashboard/api/rest/utils.py", line 127, in _wrapped     data = function(self, request, *args, **kw)   File "/usr/share/openstack-dashboard/openstack_dashboard/api/rest/network.py", line 44, in get     security_groups = api.neutron.security_group_list(request)   File "/usr/lib/python2.7/site-packages/horizon/utils/memoized.py", line 95, in wrapped     value = cache[key] = func(*args, **kwargs)   File "/usr/share/openstack-dashboard/openstack_dashboard/api/neutron.py", line 1641, in security_group_list     return SecurityGroupManager(request).list(**params)   File "/usr/share/openstack-dashboard/openstack_dashboard/api/neutron.py", line 372, in list     return self._list(**params)   File "/usr/share/openstack-dashboard/openstack_dashboard/api/neutron.py", line 359, in _list     return [SecurityGroup(sg) for sg in secgroups.get('security_groups')]   File "/usr/share/openstack-dashboard/openstack_dashboard/api/neutron.py", line 240, in __init__     for rule in sg['security_group_rules']] KeyError: 'security_group_rules' ======================================================================= [Impact] By default, new security groups created through horizon or CLI include 2 default security rules. Upon managing those rules and removing them (to perhaps add others or limit traffic completely), the security group page errors out and prevents listing of *all* security groups if the empty security group is within the list to be displayed. Therefore, not only is the empty security group affected, but all others as well, as they cannot be listed. The root cause of the bug is that the payload does not include the expected key "security_group_rules" for that security group when there are no rules. A fix has been implemented for Train (from master), Stein, Rocky and Queens releases and should be backported so the issue is addressed on previous those releases. The fix prevents the crash by ensuring the key "security_group_rules" is present with an empty list in case it was not included in the payload. [Test Case] 1. Reproducing the issue 1a. Go to the Security Group section at Project > Network > Security Groups 1b. Create a security group 1c. Click the Manage Rules button for that security group you just created 1d. Delete the two default rules 1e. Go back to the Security Group section at Project > Network > Security Groups 1f. Security groups are no longer being listed and there will be an error popup: "Error: Unable to retrieve security groups.". 2. Install the package with the fixed code 3. Confirm bug has been fixed 3a. Repeat step 1a, you will notice that now security groups can be listed, including the empty one you had previously created 3b. Repeat steps 1b through 1e, the newly created and emptied security group can also be listed along the others. [Regression Potential] Given the following indicators: a. Upstream CI passed, for all releases the fix is being backported. b. The small scope of the problem: a key error prevents the page from being rendered. The fix is to make sure the key is always present, since it is always expected. c. The fix is very simple, and during tests we can see that the other pages handle an empty list properly as the value for the "security_group_rules". We can safely state that the regression potential is negligible.
2019-10-19 19:34:28 Rodrigo Barbieri description Horizon 14.0.2 (rocky) If a security group without any rules exists the listing of security groups fails with a KeyError. Traceback (most recent call last):   File "/usr/share/openstack-dashboard/openstack_dashboard/api/rest/utils.py", line 127, in _wrapped     data = function(self, request, *args, **kw)   File "/usr/share/openstack-dashboard/openstack_dashboard/api/rest/network.py", line 44, in get     security_groups = api.neutron.security_group_list(request)   File "/usr/lib/python2.7/site-packages/horizon/utils/memoized.py", line 95, in wrapped     value = cache[key] = func(*args, **kwargs)   File "/usr/share/openstack-dashboard/openstack_dashboard/api/neutron.py", line 1641, in security_group_list     return SecurityGroupManager(request).list(**params)   File "/usr/share/openstack-dashboard/openstack_dashboard/api/neutron.py", line 372, in list     return self._list(**params)   File "/usr/share/openstack-dashboard/openstack_dashboard/api/neutron.py", line 359, in _list     return [SecurityGroup(sg) for sg in secgroups.get('security_groups')]   File "/usr/share/openstack-dashboard/openstack_dashboard/api/neutron.py", line 240, in __init__     for rule in sg['security_group_rules']] KeyError: 'security_group_rules' ======================================================================= [Impact] By default, new security groups created through horizon or CLI include 2 default security rules. Upon managing those rules and removing them (to perhaps add others or limit traffic completely), the security group page errors out and prevents listing of *all* security groups if the empty security group is within the list to be displayed. Therefore, not only is the empty security group affected, but all others as well, as they cannot be listed. The root cause of the bug is that the payload does not include the expected key "security_group_rules" for that security group when there are no rules. A fix has been implemented for Train (from master), Stein, Rocky and Queens releases and should be backported so the issue is addressed on previous those releases. The fix prevents the crash by ensuring the key "security_group_rules" is present with an empty list in case it was not included in the payload. [Test Case] 1. Reproducing the issue 1a. Go to the Security Group section at Project > Network > Security Groups 1b. Create a security group 1c. Click the Manage Rules button for that security group you just created 1d. Delete the two default rules 1e. Go back to the Security Group section at Project > Network > Security Groups 1f. Security groups are no longer being listed and there will be an error popup: "Error: Unable to retrieve security groups.". 2. Install the package with the fixed code 3. Confirm bug has been fixed 3a. Repeat step 1a, you will notice that now security groups can be listed, including the empty one you had previously created 3b. Repeat steps 1b through 1e, the newly created and emptied security group can also be listed along the others. [Regression Potential] Given the following indicators: a. Upstream CI passed, for all releases the fix is being backported. b. The small scope of the problem: a key error prevents the page from being rendered. The fix is to make sure the key is always present, since it is always expected. c. The fix is very simple, and during tests we can see that the other pages handle an empty list properly as the value for the "security_group_rules". We can safely state that the regression potential is negligible. Horizon 14.0.2 (rocky) If a security group without any rules exists the listing of security groups fails with a KeyError. Traceback (most recent call last):   File "/usr/share/openstack-dashboard/openstack_dashboard/api/rest/utils.py", line 127, in _wrapped     data = function(self, request, *args, **kw)   File "/usr/share/openstack-dashboard/openstack_dashboard/api/rest/network.py", line 44, in get     security_groups = api.neutron.security_group_list(request)   File "/usr/lib/python2.7/site-packages/horizon/utils/memoized.py", line 95, in wrapped     value = cache[key] = func(*args, **kwargs)   File "/usr/share/openstack-dashboard/openstack_dashboard/api/neutron.py", line 1641, in security_group_list     return SecurityGroupManager(request).list(**params)   File "/usr/share/openstack-dashboard/openstack_dashboard/api/neutron.py", line 372, in list     return self._list(**params)   File "/usr/share/openstack-dashboard/openstack_dashboard/api/neutron.py", line 359, in _list     return [SecurityGroup(sg) for sg in secgroups.get('security_groups')]   File "/usr/share/openstack-dashboard/openstack_dashboard/api/neutron.py", line 240, in __init__     for rule in sg['security_group_rules']] KeyError: 'security_group_rules' ======================================================================= [Impact] By default, new security groups created through horizon or CLI include 2 default security rules. Upon managing those rules and removing them (to perhaps add others or limit traffic completely), the security group page errors out and prevents listing of *all* security groups if the empty security group is within the list to be displayed. Therefore, not only is the empty security group affected, but all others as well, as they cannot be listed. The root cause of the bug is that the payload does not include the expected key "security_group_rules" for that security group when there are no rules. A fix has been implemented for Train (from master), Stein, Rocky and Queens releases and should be backported so the issue is addressed on previous those releases. The fix prevents the crash by ensuring the key "security_group_rules" is present with an empty list in case it was not included in the payload. [Test Case] 1. Reproducing the issue 1a. Go to the Security Group section at Project > Network > Security Groups 1b. Create a security group 1c. Click the Manage Rules button for that security group you just created 1d. Delete the two default rules 1e. Go back to the Security Group section at Project > Network > Security Groups 1f. Security groups are no longer being listed and there will be an error popup: "Error: Unable to retrieve security groups.". 2. Install the package with the fixed code 3. Confirm bug has been fixed 3a. Repeat step 1a, you will notice that now security groups can be listed, including the empty one you had previously created 3b. Repeat steps 1b through 1e, the newly created and emptied security group can also be listed along the others. [Regression Potential] Given the following indicators: a. Upstream CI passed, for all releases the fix is being backported. b. The small scope of the problem: a key error prevents the page from being rendered. The fix is to make sure the key is always present, since it is always expected. c. The fix is very simple, and during tests we can see that the other pages handle an empty list properly as the value for the "security_group_rules" key. We can safely state that the regression potential is negligible.
2019-10-19 19:35:05 Rodrigo Barbieri attachment added lp1840465_disco.debdiff https://bugs.launchpad.net/ubuntu/+source/horizon/+bug/1840465/+attachment/5298451/+files/lp1840465_disco.debdiff
2019-10-19 19:35:33 Rodrigo Barbieri attachment added lp1840465_cosmic.debdiff https://bugs.launchpad.net/ubuntu/+source/horizon/+bug/1840465/+attachment/5298452/+files/lp1840465_cosmic.debdiff
2019-10-19 19:35:53 Rodrigo Barbieri attachment added lp1840465_bionic.debdiff https://bugs.launchpad.net/ubuntu/+source/horizon/+bug/1840465/+attachment/5298453/+files/lp1840465_bionic.debdiff
2019-10-19 19:54:05 Rodrigo Barbieri horizon (Ubuntu Bionic): status New In Progress
2019-10-19 19:54:12 Rodrigo Barbieri horizon (Ubuntu Disco): status New In Progress
2019-10-19 19:54:17 Rodrigo Barbieri horizon (Ubuntu Eoan): status New In Progress
2019-10-21 14:04:15 Rodrigo Barbieri tags in-stable-queens in-stable-rocky in-stable-stein neutron rocky-backport-potential stein-backport-potential in-stable-queens in-stable-rocky in-stable-stein neutron rocky-backport-potential stein-backport-potential sts-sru-needed
2019-10-21 20:36:50 Corey Bryant horizon (Ubuntu Eoan): status In Progress Fix Released
2019-10-21 20:37:31 Corey Bryant bug task added cloud-archive
2019-10-21 20:37:48 Corey Bryant nominated for series cloud-archive/train
2019-10-21 20:37:48 Corey Bryant bug task added cloud-archive/train
2019-10-21 20:37:48 Corey Bryant nominated for series cloud-archive/rocky
2019-10-21 20:37:48 Corey Bryant bug task added cloud-archive/rocky
2019-10-21 20:37:48 Corey Bryant nominated for series cloud-archive/queens
2019-10-21 20:37:48 Corey Bryant bug task added cloud-archive/queens
2019-10-21 20:37:48 Corey Bryant nominated for series cloud-archive/stein
2019-10-21 20:37:48 Corey Bryant bug task added cloud-archive/stein
2019-10-21 20:38:02 Corey Bryant cloud-archive/queens: importance Undecided Medium
2019-10-21 20:38:02 Corey Bryant cloud-archive/queens: status New Triaged
2019-10-21 20:38:18 Corey Bryant cloud-archive/rocky: importance Undecided Medium
2019-10-21 20:38:18 Corey Bryant cloud-archive/rocky: status New Triaged
2019-10-21 20:38:54 Corey Bryant cloud-archive/stein: importance Undecided Medium
2019-10-21 20:38:54 Corey Bryant cloud-archive/stein: status New Triaged
2019-10-21 20:39:04 Corey Bryant cloud-archive/train: status New Fix Released
2019-10-21 20:39:19 Corey Bryant cloud-archive/train: importance Undecided Medium
2019-10-21 20:39:32 Corey Bryant horizon (Ubuntu Eoan): importance Undecided Medium
2019-10-21 20:39:45 Corey Bryant horizon (Ubuntu Disco): importance Undecided Medium
2019-10-21 20:41:04 Corey Bryant horizon (Ubuntu Bionic): importance Undecided Medium
2019-10-21 20:41:27 Corey Bryant horizon (Ubuntu): importance Undecided Medium
2019-10-21 20:41:27 Corey Bryant horizon (Ubuntu): status New Fix Released
2019-10-21 20:58:45 Jacolex bug added subscriber Jacolex
2019-10-22 12:28:17 Corey Bryant cloud-archive/rocky: status Triaged Fix Committed
2019-10-22 12:28:19 Corey Bryant tags in-stable-queens in-stable-rocky in-stable-stein neutron rocky-backport-potential stein-backport-potential sts-sru-needed in-stable-queens in-stable-rocky in-stable-stein neutron rocky-backport-potential stein-backport-potential sts-sru-needed verification-rocky-needed
2019-10-23 03:52:32 Akihiro Motoki tags in-stable-queens in-stable-rocky in-stable-stein neutron rocky-backport-potential stein-backport-potential sts-sru-needed verification-rocky-needed in-stable-queens in-stable-rocky in-stable-stein neutron sts-sru-needed verification-rocky-needed
2019-11-14 19:57:58 Rodrigo Barbieri tags in-stable-queens in-stable-rocky in-stable-stein neutron sts-sru-needed verification-rocky-needed in-stable-queens in-stable-rocky in-stable-stein neutron sts-sru-needed verification-rocky-done
2019-11-21 13:34:21 Łukasz Zemczak horizon (Ubuntu Disco): status In Progress Fix Committed
2019-11-21 13:34:25 Łukasz Zemczak bug added subscriber Ubuntu Stable Release Updates Team
2019-11-21 13:34:29 Łukasz Zemczak bug added subscriber SRU Verification
2019-11-21 13:34:32 Łukasz Zemczak tags in-stable-queens in-stable-rocky in-stable-stein neutron sts-sru-needed verification-rocky-done in-stable-queens in-stable-rocky in-stable-stein neutron sts-sru-needed verification-needed verification-needed-disco verification-rocky-done
2019-11-21 13:46:18 Łukasz Zemczak horizon (Ubuntu Bionic): status In Progress Fix Committed
2019-11-21 13:46:25 Łukasz Zemczak tags in-stable-queens in-stable-rocky in-stable-stein neutron sts-sru-needed verification-needed verification-needed-disco verification-rocky-done in-stable-queens in-stable-rocky in-stable-stein neutron sts-sru-needed verification-needed verification-needed-bionic verification-needed-disco verification-rocky-done
2019-11-21 19:07:16 Corey Bryant cloud-archive/queens: status Triaged Fix Committed
2019-11-21 19:07:18 Corey Bryant tags in-stable-queens in-stable-rocky in-stable-stein neutron sts-sru-needed verification-needed verification-needed-bionic verification-needed-disco verification-rocky-done in-stable-queens in-stable-rocky in-stable-stein neutron sts-sru-needed verification-needed verification-needed-bionic verification-needed-disco verification-queens-needed verification-rocky-done
2019-11-27 19:33:24 Rodrigo Barbieri tags in-stable-queens in-stable-rocky in-stable-stein neutron sts-sru-needed verification-needed verification-needed-bionic verification-needed-disco verification-queens-needed verification-rocky-done in-stable-queens in-stable-rocky in-stable-stein neutron sts-sru-needed verification-done-bionic verification-needed verification-needed-disco verification-queens-done verification-rocky-done
2019-11-28 15:28:52 Rodrigo Barbieri tags in-stable-queens in-stable-rocky in-stable-stein neutron sts-sru-needed verification-done-bionic verification-needed verification-needed-disco verification-queens-done verification-rocky-done in-stable-queens in-stable-rocky in-stable-stein neutron sts-sru-needed verification-done-bionic verification-done-disco verification-needed verification-queens-done verification-rocky-done
2019-12-02 11:13:45 Launchpad Janitor horizon (Ubuntu Disco): status Fix Committed Fix Released
2019-12-02 11:13:51 Łukasz Zemczak removed subscriber Ubuntu Stable Release Updates Team
2019-12-02 11:18:56 Launchpad Janitor horizon (Ubuntu Bionic): status Fix Committed Fix Released
2019-12-02 14:53:49 Corey Bryant cloud-archive/stein: status Triaged Fix Committed
2019-12-02 14:53:51 Corey Bryant tags in-stable-queens in-stable-rocky in-stable-stein neutron sts-sru-needed verification-done-bionic verification-done-disco verification-needed verification-queens-done verification-rocky-done in-stable-queens in-stable-rocky in-stable-stein neutron sts-sru-needed verification-done-bionic verification-done-disco verification-needed verification-queens-done verification-rocky-done verification-stein-needed
2019-12-03 10:26:12 Hemanth Nakkina tags in-stable-queens in-stable-rocky in-stable-stein neutron sts-sru-needed verification-done-bionic verification-done-disco verification-needed verification-queens-done verification-rocky-done verification-stein-needed in-stable-queens in-stable-rocky in-stable-stein neutron sts-sru-needed verification-done-bionic verification-done-disco verification-needed verification-queens-done verification-rocky-done verification-stein-done
2019-12-09 14:39:35 Edward Hope-Morley tags in-stable-queens in-stable-rocky in-stable-stein neutron sts-sru-needed verification-done-bionic verification-done-disco verification-needed verification-queens-done verification-rocky-done verification-stein-done in-stable-queens in-stable-rocky in-stable-stein neutron sts-sru-needed verification-done verification-done-bionic verification-done-disco verification-queens-done verification-rocky-done verification-stein-done
2019-12-09 15:19:59 Corey Bryant cloud-archive/stein: status Fix Committed Fix Released
2019-12-09 15:20:45 Corey Bryant cloud-archive/rocky: status Fix Committed Fix Released
2019-12-09 15:21:32 Corey Bryant cloud-archive/queens: status Fix Committed Fix Released