← Back to team overview

yahoo-eng-team team mailing list archive

[Bug 1442272] [NEW] functional.agent.test_ovs_flows.ARPSpoofTestCase.test_arp_spoof_disable_port_security fails

 

Public bug reported:

Logstash query:

http://logstash.openstack.org/#eyJzZWFyY2giOiJtZXNzYWdlOiBcIlNraXBwaW5nIEFSUCBzcG9vZmluZyBydWxlcyBmb3IgcG9ydFwiIiwiZmllbGRzIjpbXSwib2Zmc2V0IjowLCJ0aW1lZnJhbWUiOiI0MzIwMCIsImdyYXBobW9kZSI6ImNvdW50IiwidGltZSI6eyJ1c2VyX2ludGVydmFsIjowfSwic3RhbXAiOjE0Mjg1OTc0OTExMTN9


 Captured pythonlogging:
2015-04-09 16:18:32.470 | 2015-04-09 16:18:32.414 | ~~~~~~~~~~~~~~~~~~~~~~~
2015-04-09 16:18:32.470 | 2015-04-09 16:18:32.416 |     2015-04-09 16:18:04,042     INFO [neutron.plugins.openvswitch.agent.ovs_neutron_agent] Skipping ARP spoofing rules for port 'test-port202660' because it has port security disabled
2015-04-09 16:18:32.470 | 2015-04-09 16:18:32.417 |     2015-04-09 16:18:05,359    ERROR [neutron.agent.linux.utils] 
2015-04-09 16:18:32.471 | 2015-04-09 16:18:32.419 |     Command: ['ip', 'netns', 'exec', 'func-89a1f22f-b789-4b12-a70c-0f8dde1baf42', 'ping', '-c', 1, '-W', 1, '192.168.0.2']
2015-04-09 16:18:32.471 | 2015-04-09 16:18:32.420 |     Exit code: 1
2015-04-09 16:18:32.471 | 2015-04-09 16:18:32.422 |     Stdin: 
2015-04-09 16:18:32.471 | 2015-04-09 16:18:32.423 |     Stdout: PING 192.168.0.2 (192.168.0.2) 56(84) bytes of data.
2015-04-09 16:18:32.471 | 2015-04-09 16:18:32.425 |     
2015-04-09 16:18:32.472 | 2015-04-09 16:18:32.426 |     --- 192.168.0.2 ping statistics ---
2015-04-09 16:18:32.472 | 2015-04-09 16:18:32.428 |     1 packets transmitted, 0 received, 100% packet loss, time 0ms
2015-04-09 16:18:32.472 | 2015-04-09 16:18:32.429 |     
2015-04-09 16:18:32.666 | 2015-04-09 16:18:32.431 |     
2015-04-09 16:18:32.667 | 2015-04-09 16:18:32.432 |     Stderr: 
2015-04-09 16:18:32.667 | 2015-04-09 16:18:32.439 |     
2015-04-09 16:18:32.668 | 2015-04-09 16:18:32.440 | 
2015-04-09 16:18:32.669 | 2015-04-09 16:18:32.442 | Captured traceback:
2015-04-09 16:18:32.779 | 2015-04-09 16:18:32.443 | ~~~~~~~~~~~~~~~~~~~
2015-04-09 16:18:32.779 | 2015-04-09 16:18:32.445 |     Traceback (most recent call last):
2015-04-09 16:18:32.779 | 2015-04-09 16:18:32.447 |       File "neutron/tests/functional/agent/test_ovs_flows.py", line 79, in test_arp_spoof_disable_port_security
2015-04-09 16:18:32.780 | 2015-04-09 16:18:32.448 |         pinger.assert_ping(self.dst_addr)
2015-04-09 16:18:32.780 | 2015-04-09 16:18:32.450 |       File "neutron/tests/functional/agent/linux/helpers.py", line 113, in assert_ping
2015-04-09 16:18:32.780 | 2015-04-09 16:18:32.451 |         self._ping_destination(dst_ip)
2015-04-09 16:18:32.780 | 2015-04-09 16:18:32.453 |       File "neutron/tests/functional/agent/linux/helpers.py", line 110, in _ping_destination
2015-04-09 16:18:32.781 | 2015-04-09 16:18:32.454 |         '-W', self._timeout, dest_address])
2015-04-09 16:18:32.781 | 2015-04-09 16:18:32.456 |       File "neutron/agent/linux/ip_lib.py", line 580, in execute
2015-04-09 16:18:32.781 | 2015-04-09 16:18:32.457 |         extra_ok_codes=extra_ok_codes, **kwargs)
2015-04-09 16:18:32.781 | 2015-04-09 16:18:32.459 |       File "neutron/agent/linux/utils.py", line 137, in execute
2015-04-09 16:18:32.781 | 2015-04-09 16:18:32.461 |         raise RuntimeError(m)
2015-04-09 16:18:32.782 | 2015-04-09 16:18:32.462 |     RuntimeError: 
2015-04-09 16:18:32.782 | 2015-04-09 16:18:32.464 |     Command: ['ip', 'netns', 'exec', 'func-89a1f22f-b789-4b12-a70c-0f8dde1baf42', 'ping', '-c', 1, '-W', 1, '192.168.0.2']
2015-04-09 16:18:32.782 | 2015-04-09 16:18:32.465 |     Exit code: 1
2015-04-09 16:18:32.782 | 2015-04-09 16:18:32.467 |     Stdin: 
2015-04-09 16:18:32.782 | 2015-04-09 16:18:32.469 |     Stdout: PING 192.168.0.2 (192.168.0.2) 56(84) bytes of data.
2015-04-09 16:18:32.782 | 2015-04-09 16:18:32.470 |     
2015-04-09 16:18:32.783 | 2015-04-09 16:18:32.472 |     --- 192.168.0.2 ping statistics ---
2015-04-09 16:18:32.783 | 2015-04-09 16:18:32.473 |     1 packets transmitted, 0 received, 100% packet loss, time 0ms

** Affects: neutron
     Importance: High
         Status: Confirmed


** Tags: functional-tests gate-failure

** Changed in: neutron
       Status: New => Confirmed

** Changed in: neutron
   Importance: Undecided => High

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1442272

Title:
  functional.agent.test_ovs_flows.ARPSpoofTestCase.test_arp_spoof_disable_port_security
  fails

Status in OpenStack Neutron (virtual network service):
  Confirmed

Bug description:
  Logstash query:

  http://logstash.openstack.org/#eyJzZWFyY2giOiJtZXNzYWdlOiBcIlNraXBwaW5nIEFSUCBzcG9vZmluZyBydWxlcyBmb3IgcG9ydFwiIiwiZmllbGRzIjpbXSwib2Zmc2V0IjowLCJ0aW1lZnJhbWUiOiI0MzIwMCIsImdyYXBobW9kZSI6ImNvdW50IiwidGltZSI6eyJ1c2VyX2ludGVydmFsIjowfSwic3RhbXAiOjE0Mjg1OTc0OTExMTN9

  
   Captured pythonlogging:
  2015-04-09 16:18:32.470 | 2015-04-09 16:18:32.414 | ~~~~~~~~~~~~~~~~~~~~~~~
  2015-04-09 16:18:32.470 | 2015-04-09 16:18:32.416 |     2015-04-09 16:18:04,042     INFO [neutron.plugins.openvswitch.agent.ovs_neutron_agent] Skipping ARP spoofing rules for port 'test-port202660' because it has port security disabled
  2015-04-09 16:18:32.470 | 2015-04-09 16:18:32.417 |     2015-04-09 16:18:05,359    ERROR [neutron.agent.linux.utils] 
  2015-04-09 16:18:32.471 | 2015-04-09 16:18:32.419 |     Command: ['ip', 'netns', 'exec', 'func-89a1f22f-b789-4b12-a70c-0f8dde1baf42', 'ping', '-c', 1, '-W', 1, '192.168.0.2']
  2015-04-09 16:18:32.471 | 2015-04-09 16:18:32.420 |     Exit code: 1
  2015-04-09 16:18:32.471 | 2015-04-09 16:18:32.422 |     Stdin: 
  2015-04-09 16:18:32.471 | 2015-04-09 16:18:32.423 |     Stdout: PING 192.168.0.2 (192.168.0.2) 56(84) bytes of data.
  2015-04-09 16:18:32.471 | 2015-04-09 16:18:32.425 |     
  2015-04-09 16:18:32.472 | 2015-04-09 16:18:32.426 |     --- 192.168.0.2 ping statistics ---
  2015-04-09 16:18:32.472 | 2015-04-09 16:18:32.428 |     1 packets transmitted, 0 received, 100% packet loss, time 0ms
  2015-04-09 16:18:32.472 | 2015-04-09 16:18:32.429 |     
  2015-04-09 16:18:32.666 | 2015-04-09 16:18:32.431 |     
  2015-04-09 16:18:32.667 | 2015-04-09 16:18:32.432 |     Stderr: 
  2015-04-09 16:18:32.667 | 2015-04-09 16:18:32.439 |     
  2015-04-09 16:18:32.668 | 2015-04-09 16:18:32.440 | 
  2015-04-09 16:18:32.669 | 2015-04-09 16:18:32.442 | Captured traceback:
  2015-04-09 16:18:32.779 | 2015-04-09 16:18:32.443 | ~~~~~~~~~~~~~~~~~~~
  2015-04-09 16:18:32.779 | 2015-04-09 16:18:32.445 |     Traceback (most recent call last):
  2015-04-09 16:18:32.779 | 2015-04-09 16:18:32.447 |       File "neutron/tests/functional/agent/test_ovs_flows.py", line 79, in test_arp_spoof_disable_port_security
  2015-04-09 16:18:32.780 | 2015-04-09 16:18:32.448 |         pinger.assert_ping(self.dst_addr)
  2015-04-09 16:18:32.780 | 2015-04-09 16:18:32.450 |       File "neutron/tests/functional/agent/linux/helpers.py", line 113, in assert_ping
  2015-04-09 16:18:32.780 | 2015-04-09 16:18:32.451 |         self._ping_destination(dst_ip)
  2015-04-09 16:18:32.780 | 2015-04-09 16:18:32.453 |       File "neutron/tests/functional/agent/linux/helpers.py", line 110, in _ping_destination
  2015-04-09 16:18:32.781 | 2015-04-09 16:18:32.454 |         '-W', self._timeout, dest_address])
  2015-04-09 16:18:32.781 | 2015-04-09 16:18:32.456 |       File "neutron/agent/linux/ip_lib.py", line 580, in execute
  2015-04-09 16:18:32.781 | 2015-04-09 16:18:32.457 |         extra_ok_codes=extra_ok_codes, **kwargs)
  2015-04-09 16:18:32.781 | 2015-04-09 16:18:32.459 |       File "neutron/agent/linux/utils.py", line 137, in execute
  2015-04-09 16:18:32.781 | 2015-04-09 16:18:32.461 |         raise RuntimeError(m)
  2015-04-09 16:18:32.782 | 2015-04-09 16:18:32.462 |     RuntimeError: 
  2015-04-09 16:18:32.782 | 2015-04-09 16:18:32.464 |     Command: ['ip', 'netns', 'exec', 'func-89a1f22f-b789-4b12-a70c-0f8dde1baf42', 'ping', '-c', 1, '-W', 1, '192.168.0.2']
  2015-04-09 16:18:32.782 | 2015-04-09 16:18:32.465 |     Exit code: 1
  2015-04-09 16:18:32.782 | 2015-04-09 16:18:32.467 |     Stdin: 
  2015-04-09 16:18:32.782 | 2015-04-09 16:18:32.469 |     Stdout: PING 192.168.0.2 (192.168.0.2) 56(84) bytes of data.
  2015-04-09 16:18:32.782 | 2015-04-09 16:18:32.470 |     
  2015-04-09 16:18:32.783 | 2015-04-09 16:18:32.472 |     --- 192.168.0.2 ping statistics ---
  2015-04-09 16:18:32.783 | 2015-04-09 16:18:32.473 |     1 packets transmitted, 0 received, 100% packet loss, time 0ms

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1442272/+subscriptions


Follow ups

References