← Back to team overview

yahoo-eng-team team mailing list archive

[Bug 1826697] Re: [VPNaaS]: Strongswan function gate failed

 

Reviewed:  https://review.opendev.org/656108
Committed: https://git.openstack.org/cgit/openstack/neutron-vpnaas/commit/?id=292bc9aff844661b62a3ece891bc31eab7dedd48
Submitter: Zuul
Branch:    master

commit 292bc9aff844661b62a3ece891bc31eab7dedd48
Author: Dongcan Ye <hellochosen@xxxxxxxxx>
Date:   Sun Apr 28 04:08:22 2019 +0000

    Add iptables command filter for functional test
    
    Commit 30f35e08f92e5262e7a9108684da048d11402b07 add
    "iptables --version" command, we need to add
    iptables filter in our functional gate.
    
    Change-Id: I9c0e830d7ef5dbc69ed41d7b7161e43e89dfbd92
    Closes-Bug: #1826697


** Changed in: neutron
       Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1826697

Title:
  [VPNaaS]: Strongswan function gate failed

Status in neutron:
  Fix Released

Bug description:
  Since commit 30f35e08f92e5262e7a9108684da048d11402b07[1] adds "iptables --version" command to check verison.
  neutron-vpnaas strongswan function gate failed as follow:

  2019-04-28 02:27:56.052368 | primary | 2019-04-28 02:27:56.051 | {5} neutron_vpnaas.tests.functional.strongswan.test_strongswan_driver.TestStrongSwanScenario.test_strongswan_connection_with_non_ascii_vpnservice_name [18.660131s] ... FAILED
  2019-04-28 02:27:56.054781 | primary | 2019-04-28 02:27:56.054 |
  2019-04-28 02:27:56.057326 | primary | 2019-04-28 02:27:56.056 | Captured traceback:
  2019-04-28 02:27:56.061622 | primary | 2019-04-28 02:27:56.060 | ~~~~~~~~~~~~~~~~~~~
  2019-04-28 02:27:56.063661 | primary | 2019-04-28 02:27:56.063 |     Traceback (most recent call last):
  2019-04-28 02:27:56.066004 | primary | 2019-04-28 02:27:56.065 |       File "/opt/stack/new/neutron/neutron/tests/base.py", line 176, in func
  2019-04-28 02:27:56.068372 | primary | 2019-04-28 02:27:56.067 |         return f(self, *args, **kwargs)
  2019-04-28 02:27:56.076076 | primary | 2019-04-28 02:27:56.070 |       File "neutron_vpnaas/tests/functional/strongswan/test_strongswan_driver.py", line 258, in test_strongswan_connection_with_non_ascii_vpnservice_name
  2019-04-28 02:27:56.076220 | primary | 2019-04-28 02:27:56.072 |         [self.private_nets[1]])
  2019-04-28 02:27:56.076350 | primary | 2019-04-28 02:27:56.075 |       File "neutron_vpnaas/tests/functional/common/test_scenario.py", line 487, in create_site
  2019-04-28 02:27:56.078818 | primary | 2019-04-28 02:27:56.078 |         site.router = self.create_router(self.agent, site.info)
  2019-04-28 02:27:56.081207 | primary | 2019-04-28 02:27:56.080 |       File "neutron_vpnaas/tests/functional/common/test_scenario.py", line 445, in create_router
  2019-04-28 02:27:56.084563 | primary | 2019-04-28 02:27:56.083 |         agent._process_added_router(info)
  2019-04-28 02:27:56.090754 | primary | 2019-04-28 02:27:56.087 |       File "/opt/stack/new/neutron/neutron/agent/l3/agent.py", line 611, in _process_added_router
  2019-04-28 02:27:56.093180 | primary | 2019-04-28 02:27:56.092 |         ri.process()
  2019-04-28 02:27:56.095084 | primary | 2019-04-28 02:27:56.094 |       File "/opt/stack/new/neutron/neutron/common/utils.py", line 161, in call
  2019-04-28 02:27:56.096768 | primary | 2019-04-28 02:27:56.096 |         self.logger(e)
  2019-04-28 02:27:56.099836 | primary | 2019-04-28 02:27:56.099 |       File "/opt/stack/new/neutron-vpnaas/.tox/dsvm-functional-sswan/local/lib/python2.7/site-packages/oslo_utils/excutils.py", line 220, in __exit__
  2019-04-28 02:27:56.105455 | primary | 2019-04-28 02:27:56.104 |         self.force_reraise()
  2019-04-28 02:27:56.107435 | primary | 2019-04-28 02:27:56.106 |       File "/opt/stack/new/neutron-vpnaas/.tox/dsvm-functional-sswan/local/lib/python2.7/site-packages/oslo_utils/excutils.py", line 196, in force_reraise
  2019-04-28 02:27:56.110099 | primary | 2019-04-28 02:27:56.109 |         six.reraise(self.type_, self.value, self.tb)
  2019-04-28 02:27:56.112851 | primary | 2019-04-28 02:27:56.112 |       File "/opt/stack/new/neutron/neutron/common/utils.py", line 158, in call
  2019-04-28 02:27:56.129873 | primary | 2019-04-28 02:27:56.114 |         return func(*args, **kwargs)
  2019-04-28 02:27:56.130105 | primary | 2019-04-28 02:27:56.116 |       File "/opt/stack/new/neutron/neutron/agent/l3/router_info.py", line 1219, in process
  2019-04-28 02:27:56.130248 | primary | 2019-04-28 02:27:56.118 |         self.process_external()
  2019-04-28 02:27:56.130452 | primary | 2019-04-28 02:27:56.121 |       File "/opt/stack/new/neutron/neutron/agent/l3/router_info.py", line 984, in process_external
  2019-04-28 02:27:56.130585 | primary | 2019-04-28 02:27:56.123 |         self._process_external_gateway(ex_gw_port)
  2019-04-28 02:27:56.130781 | primary | 2019-04-28 02:27:56.125 |       File "/opt/stack/new/neutron/neutron/agent/l3/router_info.py", line 882, in _process_external_gateway
  2019-04-28 02:27:56.130963 | primary | 2019-04-28 02:27:56.127 |         self._handle_router_snat_rules(gw_port, interface_name)
  2019-04-28 02:27:56.131204 | primary | 2019-04-28 02:27:56.129 |       File "/opt/stack/new/neutron/neutron/agent/l3/router_info.py", line 958, in _handle_router_snat_rules
  2019-04-28 02:27:56.136106 | primary | 2019-04-28 02:27:56.131 |         interface_name)
  2019-04-28 02:27:56.136236 | primary | 2019-04-28 02:27:56.135 |       File "/opt/stack/new/neutron/neutron/agent/l3/router_info.py", line 937, in _add_snat_rules
  2019-04-28 02:27:56.137758 | primary | 2019-04-28 02:27:56.137 |         ex_gw_ip, interface_name)
  2019-04-28 02:27:56.142311 | primary | 2019-04-28 02:27:56.141 |       File "/opt/stack/new/neutron/neutron/agent/l3/router_info.py", line 908, in external_gateway_nat_snat_rules
  2019-04-28 02:27:56.144621 | primary | 2019-04-28 02:27:56.143 |         if self.iptables_manager.random_fully:
  2019-04-28 02:27:56.147378 | primary | 2019-04-28 02:27:56.146 |       File "/opt/stack/new/neutron/neutron/agent/linux/iptables_manager.py", line 494, in random_fully
  2019-04-28 02:27:56.155106 | primary | 2019-04-28 02:27:56.149 |         version = self._get_version()
  2019-04-28 02:27:56.155304 | primary | 2019-04-28 02:27:56.151 |       File "/opt/stack/new/neutron/neutron/agent/linux/iptables_manager.py", line 485, in _get_version
  2019-04-28 02:27:56.155421 | primary | 2019-04-28 02:27:56.152 |         version = str(self.execute(args, run_as_root=True).split()[1][1:])
  2019-04-28 02:27:56.160267 | primary | 2019-04-28 02:27:56.159 |       File "/opt/stack/new/neutron/neutron/agent/linux/utils.py", line 147, in execute
  2019-04-28 02:27:56.162698 | primary | 2019-04-28 02:27:56.162 |         returncode=returncode)
  2019-04-28 02:27:56.165290 | primary | 2019-04-28 02:27:56.164 |     neutron_lib.exceptions.ProcessExecutionError: Exit code: 99; Stdin: ; Stdout: ; Stderr: /opt/stack/new/neutron-vpnaas/.tox/dsvm-functional-sswan/bin/neutron-rootwrap: Unauthorized command: iptables --version (no filter matched)

  [1] https://review.opendev.org/#/c/636473/
  [2] http://logs.openstack.org/98/653898/1/check/neutron-vpnaas-dsvm-functional-sswan/c2e8515/job-output.txt.gz

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1826697/+subscriptions


References