yahoo-eng-team team mailing list archive
-
yahoo-eng-team team
-
Mailing list archive
-
Message #31302
[Bug 1442272] [NEW] functional.agent.test_ovs_flows.ARPSpoofTestCase.test_arp_spoof_disable_port_security fails
Public bug reported:
Logstash query:
http://logstash.openstack.org/#eyJzZWFyY2giOiJtZXNzYWdlOiBcIlNraXBwaW5nIEFSUCBzcG9vZmluZyBydWxlcyBmb3IgcG9ydFwiIiwiZmllbGRzIjpbXSwib2Zmc2V0IjowLCJ0aW1lZnJhbWUiOiI0MzIwMCIsImdyYXBobW9kZSI6ImNvdW50IiwidGltZSI6eyJ1c2VyX2ludGVydmFsIjowfSwic3RhbXAiOjE0Mjg1OTc0OTExMTN9
Captured pythonlogging:
2015-04-09 16:18:32.470 | 2015-04-09 16:18:32.414 | ~~~~~~~~~~~~~~~~~~~~~~~
2015-04-09 16:18:32.470 | 2015-04-09 16:18:32.416 | 2015-04-09 16:18:04,042 INFO [neutron.plugins.openvswitch.agent.ovs_neutron_agent] Skipping ARP spoofing rules for port 'test-port202660' because it has port security disabled
2015-04-09 16:18:32.470 | 2015-04-09 16:18:32.417 | 2015-04-09 16:18:05,359 ERROR [neutron.agent.linux.utils]
2015-04-09 16:18:32.471 | 2015-04-09 16:18:32.419 | Command: ['ip', 'netns', 'exec', 'func-89a1f22f-b789-4b12-a70c-0f8dde1baf42', 'ping', '-c', 1, '-W', 1, '192.168.0.2']
2015-04-09 16:18:32.471 | 2015-04-09 16:18:32.420 | Exit code: 1
2015-04-09 16:18:32.471 | 2015-04-09 16:18:32.422 | Stdin:
2015-04-09 16:18:32.471 | 2015-04-09 16:18:32.423 | Stdout: PING 192.168.0.2 (192.168.0.2) 56(84) bytes of data.
2015-04-09 16:18:32.471 | 2015-04-09 16:18:32.425 |
2015-04-09 16:18:32.472 | 2015-04-09 16:18:32.426 | --- 192.168.0.2 ping statistics ---
2015-04-09 16:18:32.472 | 2015-04-09 16:18:32.428 | 1 packets transmitted, 0 received, 100% packet loss, time 0ms
2015-04-09 16:18:32.472 | 2015-04-09 16:18:32.429 |
2015-04-09 16:18:32.666 | 2015-04-09 16:18:32.431 |
2015-04-09 16:18:32.667 | 2015-04-09 16:18:32.432 | Stderr:
2015-04-09 16:18:32.667 | 2015-04-09 16:18:32.439 |
2015-04-09 16:18:32.668 | 2015-04-09 16:18:32.440 |
2015-04-09 16:18:32.669 | 2015-04-09 16:18:32.442 | Captured traceback:
2015-04-09 16:18:32.779 | 2015-04-09 16:18:32.443 | ~~~~~~~~~~~~~~~~~~~
2015-04-09 16:18:32.779 | 2015-04-09 16:18:32.445 | Traceback (most recent call last):
2015-04-09 16:18:32.779 | 2015-04-09 16:18:32.447 | File "neutron/tests/functional/agent/test_ovs_flows.py", line 79, in test_arp_spoof_disable_port_security
2015-04-09 16:18:32.780 | 2015-04-09 16:18:32.448 | pinger.assert_ping(self.dst_addr)
2015-04-09 16:18:32.780 | 2015-04-09 16:18:32.450 | File "neutron/tests/functional/agent/linux/helpers.py", line 113, in assert_ping
2015-04-09 16:18:32.780 | 2015-04-09 16:18:32.451 | self._ping_destination(dst_ip)
2015-04-09 16:18:32.780 | 2015-04-09 16:18:32.453 | File "neutron/tests/functional/agent/linux/helpers.py", line 110, in _ping_destination
2015-04-09 16:18:32.781 | 2015-04-09 16:18:32.454 | '-W', self._timeout, dest_address])
2015-04-09 16:18:32.781 | 2015-04-09 16:18:32.456 | File "neutron/agent/linux/ip_lib.py", line 580, in execute
2015-04-09 16:18:32.781 | 2015-04-09 16:18:32.457 | extra_ok_codes=extra_ok_codes, **kwargs)
2015-04-09 16:18:32.781 | 2015-04-09 16:18:32.459 | File "neutron/agent/linux/utils.py", line 137, in execute
2015-04-09 16:18:32.781 | 2015-04-09 16:18:32.461 | raise RuntimeError(m)
2015-04-09 16:18:32.782 | 2015-04-09 16:18:32.462 | RuntimeError:
2015-04-09 16:18:32.782 | 2015-04-09 16:18:32.464 | Command: ['ip', 'netns', 'exec', 'func-89a1f22f-b789-4b12-a70c-0f8dde1baf42', 'ping', '-c', 1, '-W', 1, '192.168.0.2']
2015-04-09 16:18:32.782 | 2015-04-09 16:18:32.465 | Exit code: 1
2015-04-09 16:18:32.782 | 2015-04-09 16:18:32.467 | Stdin:
2015-04-09 16:18:32.782 | 2015-04-09 16:18:32.469 | Stdout: PING 192.168.0.2 (192.168.0.2) 56(84) bytes of data.
2015-04-09 16:18:32.782 | 2015-04-09 16:18:32.470 |
2015-04-09 16:18:32.783 | 2015-04-09 16:18:32.472 | --- 192.168.0.2 ping statistics ---
2015-04-09 16:18:32.783 | 2015-04-09 16:18:32.473 | 1 packets transmitted, 0 received, 100% packet loss, time 0ms
** Affects: neutron
Importance: High
Status: Confirmed
** Tags: functional-tests gate-failure
** Changed in: neutron
Status: New => Confirmed
** Changed in: neutron
Importance: Undecided => High
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1442272
Title:
functional.agent.test_ovs_flows.ARPSpoofTestCase.test_arp_spoof_disable_port_security
fails
Status in OpenStack Neutron (virtual network service):
Confirmed
Bug description:
Logstash query:
http://logstash.openstack.org/#eyJzZWFyY2giOiJtZXNzYWdlOiBcIlNraXBwaW5nIEFSUCBzcG9vZmluZyBydWxlcyBmb3IgcG9ydFwiIiwiZmllbGRzIjpbXSwib2Zmc2V0IjowLCJ0aW1lZnJhbWUiOiI0MzIwMCIsImdyYXBobW9kZSI6ImNvdW50IiwidGltZSI6eyJ1c2VyX2ludGVydmFsIjowfSwic3RhbXAiOjE0Mjg1OTc0OTExMTN9
Captured pythonlogging:
2015-04-09 16:18:32.470 | 2015-04-09 16:18:32.414 | ~~~~~~~~~~~~~~~~~~~~~~~
2015-04-09 16:18:32.470 | 2015-04-09 16:18:32.416 | 2015-04-09 16:18:04,042 INFO [neutron.plugins.openvswitch.agent.ovs_neutron_agent] Skipping ARP spoofing rules for port 'test-port202660' because it has port security disabled
2015-04-09 16:18:32.470 | 2015-04-09 16:18:32.417 | 2015-04-09 16:18:05,359 ERROR [neutron.agent.linux.utils]
2015-04-09 16:18:32.471 | 2015-04-09 16:18:32.419 | Command: ['ip', 'netns', 'exec', 'func-89a1f22f-b789-4b12-a70c-0f8dde1baf42', 'ping', '-c', 1, '-W', 1, '192.168.0.2']
2015-04-09 16:18:32.471 | 2015-04-09 16:18:32.420 | Exit code: 1
2015-04-09 16:18:32.471 | 2015-04-09 16:18:32.422 | Stdin:
2015-04-09 16:18:32.471 | 2015-04-09 16:18:32.423 | Stdout: PING 192.168.0.2 (192.168.0.2) 56(84) bytes of data.
2015-04-09 16:18:32.471 | 2015-04-09 16:18:32.425 |
2015-04-09 16:18:32.472 | 2015-04-09 16:18:32.426 | --- 192.168.0.2 ping statistics ---
2015-04-09 16:18:32.472 | 2015-04-09 16:18:32.428 | 1 packets transmitted, 0 received, 100% packet loss, time 0ms
2015-04-09 16:18:32.472 | 2015-04-09 16:18:32.429 |
2015-04-09 16:18:32.666 | 2015-04-09 16:18:32.431 |
2015-04-09 16:18:32.667 | 2015-04-09 16:18:32.432 | Stderr:
2015-04-09 16:18:32.667 | 2015-04-09 16:18:32.439 |
2015-04-09 16:18:32.668 | 2015-04-09 16:18:32.440 |
2015-04-09 16:18:32.669 | 2015-04-09 16:18:32.442 | Captured traceback:
2015-04-09 16:18:32.779 | 2015-04-09 16:18:32.443 | ~~~~~~~~~~~~~~~~~~~
2015-04-09 16:18:32.779 | 2015-04-09 16:18:32.445 | Traceback (most recent call last):
2015-04-09 16:18:32.779 | 2015-04-09 16:18:32.447 | File "neutron/tests/functional/agent/test_ovs_flows.py", line 79, in test_arp_spoof_disable_port_security
2015-04-09 16:18:32.780 | 2015-04-09 16:18:32.448 | pinger.assert_ping(self.dst_addr)
2015-04-09 16:18:32.780 | 2015-04-09 16:18:32.450 | File "neutron/tests/functional/agent/linux/helpers.py", line 113, in assert_ping
2015-04-09 16:18:32.780 | 2015-04-09 16:18:32.451 | self._ping_destination(dst_ip)
2015-04-09 16:18:32.780 | 2015-04-09 16:18:32.453 | File "neutron/tests/functional/agent/linux/helpers.py", line 110, in _ping_destination
2015-04-09 16:18:32.781 | 2015-04-09 16:18:32.454 | '-W', self._timeout, dest_address])
2015-04-09 16:18:32.781 | 2015-04-09 16:18:32.456 | File "neutron/agent/linux/ip_lib.py", line 580, in execute
2015-04-09 16:18:32.781 | 2015-04-09 16:18:32.457 | extra_ok_codes=extra_ok_codes, **kwargs)
2015-04-09 16:18:32.781 | 2015-04-09 16:18:32.459 | File "neutron/agent/linux/utils.py", line 137, in execute
2015-04-09 16:18:32.781 | 2015-04-09 16:18:32.461 | raise RuntimeError(m)
2015-04-09 16:18:32.782 | 2015-04-09 16:18:32.462 | RuntimeError:
2015-04-09 16:18:32.782 | 2015-04-09 16:18:32.464 | Command: ['ip', 'netns', 'exec', 'func-89a1f22f-b789-4b12-a70c-0f8dde1baf42', 'ping', '-c', 1, '-W', 1, '192.168.0.2']
2015-04-09 16:18:32.782 | 2015-04-09 16:18:32.465 | Exit code: 1
2015-04-09 16:18:32.782 | 2015-04-09 16:18:32.467 | Stdin:
2015-04-09 16:18:32.782 | 2015-04-09 16:18:32.469 | Stdout: PING 192.168.0.2 (192.168.0.2) 56(84) bytes of data.
2015-04-09 16:18:32.782 | 2015-04-09 16:18:32.470 |
2015-04-09 16:18:32.783 | 2015-04-09 16:18:32.472 | --- 192.168.0.2 ping statistics ---
2015-04-09 16:18:32.783 | 2015-04-09 16:18:32.473 | 1 packets transmitted, 0 received, 100% packet loss, time 0ms
To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1442272/+subscriptions
Follow ups
References