Package: nova / 2:14.0.0-4+deb9u1
Metadata
| Package | Version | Patches format |
|---|---|---|
| nova | 2:14.0.0-4+deb9u1 | 3.0 (quilt) |
Patch series
view the series file| Patch | File delta | Description |
|---|---|---|
| path to the xenhost.conf fixup.patch | (download) |
plugins/xenserver/xenapi/etc/xapi.d/plugins/xenhost |
2 1 + 1 - 0 ! |
fixes the path to the xenhost.conf file |
| Add_nova idmapshift_to_rootwrap_filters.patch | (download) |
etc/nova/rootwrap.d/compute.filters |
3 3 + 0 - 0 ! |
this patch adds the rootwrapper filter for nova-idmapshift binary, it is used when unprivileged lxc domains are created. . Bug: #1452143 |
| Install missed files.patch | (download) |
MANIFEST.in |
22 22 + 0 - 0 ! |
[patch] install missed files |
| fix requirements.txt.patch | (download) |
requirements.txt |
5 2 + 3 - 0 ! |
fix requirements.txt Without this patch, we get: dpkg-gencontrol: warning: can't parse dependency python-cryptography (!= 1.3.0) |
| clean up build_requests table on upgrades.patch | (download) |
nova/db/sqlalchemy/api_migrations/migrate_repo/versions/013_build_request_extended_attrs.py |
2 2 + 0 - 0 ! |
clean-up build_requests on upgrades |
| allow using sqla 1.1.patch | (download) |
requirements.txt |
2 1 + 1 - 0 ! |
allow using sqla >= 1.1 |
| CVE 2017 7214_do_not_include_context_to_exception_notification.patch | (download) |
nova/exception_wrapper.py |
3 3 + 0 - 0 ! |
cve-2017-7214: do not include context to exception notification The wrap_exception decorator optionally emited a notification. Based on the code comments the original intention was not to include the context to that notification due to security reasons. However the implementation did included the context to the payload of the legacy notification. . Recently we saw circural reference errors during the payload serialization of this notification. Based on the logs the only complex data structure that could cause circural reference is the context. So this patch removes the context from the legacy exception notification. . The versioned exception notification is not affected as it does not contain the args of the decorated function. |
| CVE 2017 16239_Validate_new_image_via_scheduler_during_rebuild.patch | (download) |
nova/compute/api.py |
17 16 + 1 - 0 ! |
validate new image via scheduler during rebuild
During a rebuild we bypass the scheduler because we are
always rebuilding the instance on the same host it's already
on. However, we allow passing a new image during rebuild
and that new image needs to be validated to work with the
instance host by running it through the scheduler filters,
like the ImagePropertiesFilter. Otherwise the new image
could violate constraints placed on the host by the admin.
.
This change checks to see if there is a new image provided
and if so, modifies the request spec passed to the scheduler
so that the new image is validated all while restricting
the scheduler to still pick the same host that the instance
is running on. If the image is not valid for the host, the
scheduler will raise NoValidHost and the rebuild stops.
.
A functional test is added to show the recreate of the bug
and that we probably stop the rebuild now in conductor by
calling the scheduler to validate the image.
.
NOTE(mriedem): There were a few changes needed for Newton:
.
1. There is no PlacementFixture but it's not needed.
2. The API client needs to have the microversion set from
the test.
3. The enabled_filters config option wasn't in Newton.
4. The scheduler has to be started before compute otherwise
we get a MessagingTimeout due to the CastAsCall fixture
during the compute startup.
|
| CVE 2017 17051_Refined_fix_for_validating_image_on_rebuild.patch | (download) |
nova/compute/api.py |
19 15 + 4 - 0 ! |
cve-2017-17051 refined fix for validating image on rebuild
This aims to fix the issue described in bug 1664931 where a rebuild
fails to validate the existing host with the scheduler when a new
image is provided. The previous attempt to do this could cause rebuilds
to fail unnecessarily because we ran _all_ of the filters during a
rebuild, which could cause usage/resource filters to prevent an otherwise
valid rebuild from succeeding.
.
This aims to classify filters as useful for rebuild or not, and only apply
the former during a rebuild scheduler check. We do this by using an internal
scheduler hint, indicating our intent. This should (a) filter out
all hosts other than the one we're running on and (b) be detectable by
the filtering infrastructure as an internally-generated scheduling request
in order to trigger the correct filtering behavior.
.
Conflicts:
nova/scheduler/utils.py
nova/tests/unit/compute/test_compute_api.py
.
NOTE(mriedem): The conflicts are due to not having
7d0381c91a6ba8a45ae6527f046f382166eb158d or
4a7502a5c9e84a8c8cef7f355d72425b26b8c379 in Newton.
.
(cherry picked from commit f7c688b8ef88a7390f5b09719a2b3e80368438c0)
(cherry picked from commit b29a461a8bc05c9b171c0574abb2e7e5b62a2ed7)
(cherry picked from commit bbfc4230efe3299fa51f9451f54062f32590ed3d)
Bug-Ubuntu: https://bugs.launchpad.net/nova/+bug/1664931
|
