Bug 1311592

Summary: RFE enable midonet
Product: Red Hat OpenStack Reporter: Mike Burns <mburns>
Component: openstack-puppet-modulesAssignee: Emilien Macchi <emacchi>
Status: CLOSED ERRATA QA Contact: yeylon <yeylon>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 8.0 (Liberty)CC: achernet, dbecker, jcoufal, mandreou, mburns, morazi, rhel-osp-director-maint, srevivo, yeylon
Target Milestone: gaKeywords: FutureFeature, OtherQA
Target Release: 8.0 (Liberty)   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: openstack-puppet-modules-7.0.9-1.el7ost Doc Type: Enhancement
Doc Text:
Story Points: ---
Clone Of: 1311581 Environment:
Last Closed: 2016-04-07 21:30:52 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1311581    
Bug Blocks:    

Description Mike Burns 2016-02-24 14:26:31 UTC
+++ This bug was initially created as a clone of Bug #1311581 +++

Description of problem:
Add enablement for the midonet controller.

The reviews needed are:

https://review.openstack.org/247379
https://review.openstack.org/247382
https://review.openstack.org/255934
https://review.openstack.org/260415
https://review.openstack.org/267474
https://review.openstack.org/256934
https://review.openstack.org/257908
https://review.openstack.org/256933
https://review.openstack.org/256912
https://review.openstack.org/265267
https://review.openstack.org/265268
https://review.openstack.org/277738
https://review.openstack.org/277742

--- Additional comment from Mike Burns on 2016-02-24 09:22:40 EST ---

All patches are merged in upstream stable/liberty

4 patches: openstack-tripleo-heat-templates
5 patches: openstack-puppet-modules
4 patches: openstack-tripleo-puppet-elements

Comment 3 errata-xmlrpc 2016-04-07 21:30:52 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://rhn.redhat.com/errata/RHEA-2016-0603.html