← Back to team overview

yahoo-eng-team team mailing list archive

[Bug 2095044] [NEW] test_ip_lib calls to sudo and fails (sometimes?)

 

Public bug reported:

https://storage.bhs.cloud.ovh.net/v1/AUTH_dcaab5e32b234d56b626f72581e3644c/zuul_opendev_logs_31c/939272/1/check/openstack-
tox-cover/31c980b/testr_results.html

ft1.2: neutron.tests.unit.agent.linux.test_ip_lib.TestArpPing.test_send_ipv4_addr_adv_notiftesttools.testresult.real._StringException: pythonlogging:'': {{{
ERROR [neutron.agent.linux.external_process] haproxy for MetadataPath with uuid host_metadata_proxy not found. The process should not have died
 WARNING [oslo.privsep.daemon] privsep log: sudo: a terminal is required to read the password; either use the -S option to read from standard input or configure an askpass helper
 WARNING [oslo.privsep.daemon] privsep log: sudo: a password is required
CRITICAL [oslo.privsep.daemon] privsep helper command exited non-zero (1)
   ERROR [neutron.agent.linux.external_process] Could not delete file /tmp/tmplxihnf9x/tmpy45pwqr6/external/pids/host_metadata_proxy.pid.haproxy, haproxy could fail to start. Exception: privsep helper command exited non-zero (1)
}}}

Traceback (most recent call last):
  File "/home/zuul/src/opendev.org/openstack/neutron/neutron/tests/base.py", line 178, in func
    return f(self, *args, **kwargs)
           ^^^^^^^^^^^^^^^^^^^^^^^^
  File "/usr/lib/python3.12/unittest/mock.py", line 1390, in patched
    return func(*newargs, **newkeywargs)
           ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/home/zuul/src/opendev.org/openstack/neutron/neutron/tests/unit/agent/linux/test_ip_lib.py", line 1093, in test_send_ipv4_addr_adv_notif
    mIPWrapper.assert_has_calls([
  File "/usr/lib/python3.12/unittest/mock.py", line 981, in assert_has_calls
    raise AssertionError(
AssertionError: Calls not found.
Expected: [call(namespace=sentinel.ns_name),
 call().netns.execute(<ANY>, extra_ok_codes=[1], privsep_exec=True),
 call().netns.execute(<ANY>, extra_ok_codes=[1], privsep_exec=True),
 call().netns.execute(<ANY>, extra_ok_codes=[1, 2], privsep_exec=True),
 call().netns.execute(<ANY>, extra_ok_codes=[1, 2], privsep_exec=True),
 call().netns.execute(<ANY>, extra_ok_codes=[1, 2], privsep_exec=True),
 call().netns.execute(<ANY>, extra_ok_codes=[1, 2], privsep_exec=True)]
  Actual: [call(namespace=sentinel.ns_name),
 call().netns.execute(['arping', '-U', '-I', sentinel.iface_name, '-c', 1, '-w', 2, '20.0.0.1'], extra_ok_codes=[1], privsep_exec=True),
 call().netns.execute(['arping', '-A', '-I', sentinel.iface_name, '-c', 1, '-w', 2, '20.0.0.1'], extra_ok_codes=[1], privsep_exec=True),
 call(namespace=None),
 call().netns.execute(['haproxy', '-f', '/fake/host_metadata_proxy.haproxy.conf', '-p', '/tmp/tmplxihnf9x/tmpy45pwqr6/external/pids/host_metadata_proxy.pid.haproxy'], addl_env={'PROCESS_TAG': 'haproxy-host_metadata_proxy'}, run_as_root=True),
 call().netns.execute(['arping', '-U', '-I', sentinel.iface_name, '-c', 1, '-w', 2, '20.0.0.1'], extra_ok_codes=[1, 2], privsep_exec=True),
 call().netns.execute(['arping', '-A', '-I', sentinel.iface_name, '-c', 1, '-w', 2, '20.0.0.1'], extra_ok_codes=[1, 2], privsep_exec=True),
 call().netns.execute(['arping', '-U', '-I', sentinel.iface_name, '-c', 1, '-w', 2, '20.0.0.1'], extra_ok_codes=[1, 2], privsep_exec=True),
 call().netns.execute(['arping', '-A', '-I', sentinel.iface_name, '-c', 1, '-w', 2, '20.0.0.1'], extra_ok_codes=[1, 2], privsep_exec=True)]

Also noticed unit test runs calling to sudo on my Mac when I ran the
suite yesterday. Probably related.

** Affects: neutron
     Importance: Undecided
         Status: New


** Tags: gate-failure unittest

** Tags added: gate-failure unittest

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/2095044

Title:
  test_ip_lib calls to sudo and fails (sometimes?)

Status in neutron:
  New

Bug description:
  https://storage.bhs.cloud.ovh.net/v1/AUTH_dcaab5e32b234d56b626f72581e3644c/zuul_opendev_logs_31c/939272/1/check/openstack-
  tox-cover/31c980b/testr_results.html

  ft1.2: neutron.tests.unit.agent.linux.test_ip_lib.TestArpPing.test_send_ipv4_addr_adv_notiftesttools.testresult.real._StringException: pythonlogging:'': {{{
  ERROR [neutron.agent.linux.external_process] haproxy for MetadataPath with uuid host_metadata_proxy not found. The process should not have died
   WARNING [oslo.privsep.daemon] privsep log: sudo: a terminal is required to read the password; either use the -S option to read from standard input or configure an askpass helper
   WARNING [oslo.privsep.daemon] privsep log: sudo: a password is required
  CRITICAL [oslo.privsep.daemon] privsep helper command exited non-zero (1)
     ERROR [neutron.agent.linux.external_process] Could not delete file /tmp/tmplxihnf9x/tmpy45pwqr6/external/pids/host_metadata_proxy.pid.haproxy, haproxy could fail to start. Exception: privsep helper command exited non-zero (1)
  }}}

  Traceback (most recent call last):
    File "/home/zuul/src/opendev.org/openstack/neutron/neutron/tests/base.py", line 178, in func
      return f(self, *args, **kwargs)
             ^^^^^^^^^^^^^^^^^^^^^^^^
    File "/usr/lib/python3.12/unittest/mock.py", line 1390, in patched
      return func(*newargs, **newkeywargs)
             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
    File "/home/zuul/src/opendev.org/openstack/neutron/neutron/tests/unit/agent/linux/test_ip_lib.py", line 1093, in test_send_ipv4_addr_adv_notif
      mIPWrapper.assert_has_calls([
    File "/usr/lib/python3.12/unittest/mock.py", line 981, in assert_has_calls
      raise AssertionError(
  AssertionError: Calls not found.
  Expected: [call(namespace=sentinel.ns_name),
   call().netns.execute(<ANY>, extra_ok_codes=[1], privsep_exec=True),
   call().netns.execute(<ANY>, extra_ok_codes=[1], privsep_exec=True),
   call().netns.execute(<ANY>, extra_ok_codes=[1, 2], privsep_exec=True),
   call().netns.execute(<ANY>, extra_ok_codes=[1, 2], privsep_exec=True),
   call().netns.execute(<ANY>, extra_ok_codes=[1, 2], privsep_exec=True),
   call().netns.execute(<ANY>, extra_ok_codes=[1, 2], privsep_exec=True)]
    Actual: [call(namespace=sentinel.ns_name),
   call().netns.execute(['arping', '-U', '-I', sentinel.iface_name, '-c', 1, '-w', 2, '20.0.0.1'], extra_ok_codes=[1], privsep_exec=True),
   call().netns.execute(['arping', '-A', '-I', sentinel.iface_name, '-c', 1, '-w', 2, '20.0.0.1'], extra_ok_codes=[1], privsep_exec=True),
   call(namespace=None),
   call().netns.execute(['haproxy', '-f', '/fake/host_metadata_proxy.haproxy.conf', '-p', '/tmp/tmplxihnf9x/tmpy45pwqr6/external/pids/host_metadata_proxy.pid.haproxy'], addl_env={'PROCESS_TAG': 'haproxy-host_metadata_proxy'}, run_as_root=True),
   call().netns.execute(['arping', '-U', '-I', sentinel.iface_name, '-c', 1, '-w', 2, '20.0.0.1'], extra_ok_codes=[1, 2], privsep_exec=True),
   call().netns.execute(['arping', '-A', '-I', sentinel.iface_name, '-c', 1, '-w', 2, '20.0.0.1'], extra_ok_codes=[1, 2], privsep_exec=True),
   call().netns.execute(['arping', '-U', '-I', sentinel.iface_name, '-c', 1, '-w', 2, '20.0.0.1'], extra_ok_codes=[1, 2], privsep_exec=True),
   call().netns.execute(['arping', '-A', '-I', sentinel.iface_name, '-c', 1, '-w', 2, '20.0.0.1'], extra_ok_codes=[1, 2], privsep_exec=True)]

  Also noticed unit test runs calling to sudo on my Mac when I ran the
  suite yesterday. Probably related.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/2095044/+subscriptions



Follow ups