← Back to team overview

yahoo-eng-team team mailing list archive

[Bug 1323715] Re: network tests fail on policy check after upgrade from icehouse to master (juno)

 

** Also affects: neutron
   Importance: Undecided
       Status: New

** Also affects: neutron/icehouse
   Importance: Undecided
       Status: New

** Changed in: neutron
       Status: New => Fix Committed

** Changed in: neutron/icehouse
       Status: New => Fix Committed

** Changed in: neutron/icehouse
    Milestone: None => 2014.1.3

** Changed in: neutron/icehouse
     Assignee: (unassigned) => Attila Fazekas (afazekas)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1323715

Title:
  network tests fail on policy check after upgrade from icehouse to
  master (juno)

Status in Grenade - OpenStack upgrade testing:
  Invalid
Status in OpenStack Neutron (virtual network service):
  Fix Committed
Status in neutron icehouse series:
  Fix Committed

Bug description:
  Lots of tempest tests fail after upgrade

  http://logs.openstack.org/51/94351/3/check/check-grenade-dsvm-
  neutron/ac837a8/logs/testr_results.html.gz

  2014-05-26 21:47:20.109 364 INFO neutron.wsgi [req-
  7c96bf86-6845-4143-92d0-2bb32f5767d7 None] (364) accepted
  ('127.0.0.1', 60250)

  2014-05-26 21:47:20.110 364 DEBUG keystoneclient.middleware.auth_token [-] Authenticating user token __call__ /opt/stack/new/python-keystoneclient/keystoneclient/middleware/auth_token.py:619
  2014-05-26 21:47:20.110 364 DEBUG keystoneclient.middleware.auth_token [-] Removing headers from request environment: X-Identity-Status,X-Domain-Id,X-Domain-Name,X-Project-Id,X-Project-Name,X-Project-Domain-Id,X-Project-Domain-Name,X-User-Id,X-User-Name,X-User-Domain-Id,X-User-Domain-Name,X-Roles,X-Service-Catalog,X-User,X-Tenant-Id,X-Tenant-Name,X-Tenant,X-Role _remove_auth_headers /opt/stack/new/python-keystoneclient/keystoneclient/middleware/auth_token.py:678
  2014-05-26 21:47:20.110 364 DEBUG keystoneclient.middleware.auth_token [-] Returning cached token _cache_get /opt/stack/new/python-keystoneclient/keystoneclient/middleware/auth_token.py:1041
  2014-05-26 21:47:20.111 364 DEBUG keystoneclient.middleware.auth_token [-] Storing token in cache _cache_put /opt/stack/new/python-keystoneclient/keystoneclient/middleware/auth_token.py:1151
  2014-05-26 21:47:20.111 364 DEBUG keystoneclient.middleware.auth_token [-] Received request from user: 47d465f7c2e44c048f63066dff93093c with project_id : d3e7af8cf42d4613beb315dc19444d40 and roles: _member_  _build_user_headers /opt/stack/new/python-keystoneclient/keystoneclient/middleware/auth_token.py:940
  2014-05-26 21:47:20.112 364 DEBUG routes.middleware [-] No route matched for GET /ports.json __call__ /usr/lib/python2.7/dist-packages/routes/middleware.py:97
  2014-05-26 21:47:20.112 364 DEBUG routes.middleware [-] Matched GET /ports.json __call__ /usr/lib/python2.7/dist-packages/routes/middleware.py:100
  2014-05-26 21:47:20.112 364 DEBUG routes.middleware [-] Route path: '/ports{.format}', defaults: {'action': u'index', 'controller': <wsgify at 87437776 wrapping <function resource at 0x5358500>>} __call__ /usr/lib/python2.7/dist-packages/routes/middleware.py:102
  2014-05-26 21:47:20.112 364 DEBUG routes.middleware [-] Match dict: {'action': u'index', 'controller': <wsgify at 87437776 wrapping <function resource at 0x5358500>>, 'format': u'json'} __call__ /usr/lib/python2.7/dist-packages/routes/middleware.py:103
  2014-05-26 21:47:20.122 364 DEBUG neutron.policy [req-ee5c1651-9d0c-43c9-974d-a0c888c08468 None] Unable to find ':' as separator in tenant_id. __call__ /opt/stack/new/neutron/neutron/policy.py:243
  2014-05-26 21:47:20.123 364 ERROR neutron.policy [req-ee5c1651-9d0c-43c9-974d-a0c888c08468 None] Unable to verify match:%(tenant_id)s as the parent resource: tenant was not found
  2014-05-26 21:47:20.123 364 TRACE neutron.policy Traceback (most recent call last):
  2014-05-26 21:47:20.123 364 TRACE neutron.policy   File "/opt/stack/new/neutron/neutron/policy.py", line 239, in __call__
  2014-05-26 21:47:20.123 364 TRACE neutron.policy     parent_res, parent_field = do_split(separator)
  2014-05-26 21:47:20.123 364 TRACE neutron.policy   File "/opt/stack/new/neutron/neutron/policy.py", line 234, in do_split
  2014-05-26 21:47:20.123 364 TRACE neutron.policy     separator, 1)
  2014-05-26 21:47:20.123 364 TRACE neutron.policy ValueError: need more than 1 value to unpack
  2014-05-26 21:47:20.123 364 TRACE neutron.policy 
  2014-05-26 21:47:20.123 364 ERROR neutron.api.v2.resource [req-ee5c1651-9d0c-43c9-974d-a0c888c08468 None] index failed
  2014-05-26 21:47:20.123 364 TRACE neutron.api.v2.resource Traceback (most recent call last):
  2014-05-26 21:47:20.123 364 TRACE neutron.api.v2.resource   File "/opt/stack/new/neutron/neutron/api/v2/resource.py", line 87, in resource
  2014-05-26 21:47:20.123 364 TRACE neutron.api.v2.resource     result = method(request=request, **args)
  2014-05-26 21:47:20.123 364 TRACE neutron.api.v2.resource   File "/opt/stack/new/neutron/neutron/api/v2/base.py", line 309, in index
  2014-05-26 21:47:20.123 364 TRACE neutron.api.v2.resource     return self._items(request, True, parent_id)
  2014-05-26 21:47:20.123 364 TRACE neutron.api.v2.resource   File "/opt/stack/new/neutron/neutron/api/v2/base.py", line 264, in _items
  2014-05-26 21:47:20.123 364 TRACE neutron.api.v2.resource     request.context, obj_list[0])
  2014-05-26 21:47:20.123 364 TRACE neutron.api.v2.resource   File "/opt/stack/new/neutron/neutron/api/v2/base.py", line 145, in _exclude_attributes_by_policy
  2014-05-26 21:47:20.123 364 TRACE neutron.api.v2.resource     might_not_exist=True):
  2014-05-26 21:47:20.123 364 TRACE neutron.api.v2.resource   File "/opt/stack/new/neutron/neutron/policy.py", line 346, in check
  2014-05-26 21:47:20.123 364 TRACE neutron.api.v2.resource     return policy.check(*(_prepare_check(context, action, target)))
  2014-05-26 21:47:20.123 364 TRACE neutron.api.v2.resource   File "/opt/stack/new/neutron/neutron/openstack/common/policy.py", line 169, in check
  2014-05-26 21:47:20.123 364 TRACE neutron.api.v2.resource     result = rule(target, creds)
  2014-05-26 21:47:20.123 364 TRACE neutron.api.v2.resource   File "/opt/stack/new/neutron/neutron/openstack/common/policy.py", line 732, in __call__
  2014-05-26 21:47:20.123 364 TRACE neutron.api.v2.resource     return _rules[self.match](target, creds)
  2014-05-26 21:47:20.123 364 TRACE neutron.api.v2.resource   File "/opt/stack/new/neutron/neutron/openstack/common/policy.py", line 732, in __call__
  2014-05-26 21:47:20.123 364 TRACE neutron.api.v2.resource     return _rules[self.match](target, creds)
  2014-05-26 21:47:20.123 364 TRACE neutron.api.v2.resource   File "/opt/stack/new/neutron/neutron/openstack/common/policy.py", line 366, in __call__
  2014-05-26 21:47:20.123 364 TRACE neutron.api.v2.resource     if rule(target, cred):
  2014-05-26 21:47:20.123 364 TRACE neutron.api.v2.resource   File "/opt/stack/new/neutron/neutron/policy.py", line 261, in __call__
  2014-05-26 21:47:20.123 364 TRACE neutron.api.v2.resource     reason=err_reason)
  2014-05-26 21:47:20.123 364 TRACE neutron.api.v2.resource PolicyCheckError: Failed to check policy tenant_id:%(tenant_id)s because Unable to verify match:%(tenant_id)s as the parent resource: tenant was not found
  2014-05-26 21:47:20.123 364 TRACE neutron.api.v2.resource

To manage notifications about this bug go to:
https://bugs.launchpad.net/grenade/+bug/1323715/+subscriptions