Deployment of ~vtas-hyperscale-ci/hyperscale-controller charm is failing during term verification.

Bug #1707162 reported by Pranita Desai
16
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Juju Charms Collection
New
Undecided
Unassigned

Bug Description

# juju deploy cs:~vtas-hyperscale-ci/hyperscale-controller --resource install=/root/****.tar.gz --to lxd:0 --series=xenial
ERROR storing charm for URL "cs:~vtas-hyperscale-ci/hyperscale-controller-3": cannot get discharge from "https://api.jujucharms.com/terms": third party refused discharge: verification failed: no macaroon cookies in request

# charm pull cs:~vtas-hyperscale-ci/hyperscale-controller --debug
15:25:45 DEBUG httpbakery client.go:258 client do GET https://api.jujucharms.com/charmstore/v5/~vtas-hyperscale-ci/hyperscale-controller/archive {
15:25:47 DEBUG httpbakery client.go:540 postFormJSON to https://api.jujucharms.com/identity/v1/discharger/discharge; vals: url.Values{"id":[]string{"eyJUaGlyZFBhcnR5UHVibGljS2V5IjoiaG1IYVBnQ0MxVWZ1aFlIVVNYNSthaWhTQVplc3FwVmRqUnYwbWdmSXdqbz0iLCJGaXJzdFBhcnR5UHVibGljS2V5IjoibWo3aSs1TkhjZGw2cCt6VHlnR1NyNFlrUHJVcE9nb0VWbDNmM05IN1NsTT0iLCJOb25jZSI6InJGZ1hYaFVNM091M1FOSUtjYnhYZ05FaFNzS2pWWm5WIiwiSWQiOiJLenJoZWY1VElKM3JLdWhjcHhZRFlBUGpZNHZoeFc2aTM3RHhIdnhIei9YbDdtOXF4dGVHZjRMZmJURGRMZGRFb295UnYwVVNmS3NJeTBrU2dVQ1YyMUl2dHBiM0k5VkxHNzdkWmVITGkyTzM0YU00VmdHRlVHcWFBeTRiYTNmTGUwZWZqd2pIc0V1Y3Q0RFVBN0g5MW9QSmFiQ2ZZU09LWXc9PSJ9"}, "location":[]string{"charmstore"}}
15:25:47 DEBUG httpbakery client.go:258 client do POST https://api.jujucharms.com/identity/v1/discharger/discharge {
15:25:47 DEBUG httpbakery client.go:260 } -> error [{/home/marco/Projects/charm-pkg/parts/charm/go/src/gopkg.in/macaroon-bakery.v1/httpbakery/client.go:292: } {macaroon discharge required: authentication required}]
15:25:47 DEBUG httpbakery client.go:258 client do GET https://api.jujucharms.com/identity/v1/login?waitid=8abdd9d05fc3535cf2bc7570a3eabe7b {
15:25:47 DEBUG httpbakery client.go:260 } -> error <nil>
15:25:48 DEBUG httpbakery client.go:540 postFormJSON to https://api.jujucharms.com/terms/discharge; vals: url.Values{"id":[]string{"eyJUaGlyZFBhcnR5UHVibGljS2V5IjoiTGVVME14cU05VzNNNkN1cTZxNm5sd3ArU1c4R2hXTUpNNUtNSmY2QkxSaz0iLCJGaXJzdFBhcnR5UHVibGljS2V5IjoibWo3aSs1TkhjZGw2cCt6VHlnR1NyNFlrUHJVcE9nb0VWbDNmM05IN1NsTT0iLCJOb25jZSI6IjdhK0NrQ0ZOZGNLbThtZlg3dFIxK21OdGszTE5vdUdVIiwiSWQiOiI3d3lMUU1DMzM1MWhjNkZqT1pnNGlSTkYzazViaUd3NWtnVHhialVJQjZIbXlUNEF5d2ZnU1dIK1JydEtySzl3L0pFa2U5aUxUV2M1TDl0bUJxOGdUTmEyUWhQS0dITlEwMEFzb0lvMmlVZjRTWlp0THh4eFJRUnR3NXh1ODFZbHlTOU5NOVU9In0="}, "location":[]strin

Charm deployment is working fine on some of the setups while it's failing on some of the setups.
Can someone please help?

Revision history for this message
Samantha Jian-Pielak (samantha-jian) wrote :
Download full text (5.2 KiB)

A lot of users at Veritas have tried the same and its failing for them with a couple of different errors(Please note that for some Users it succeeded at first, but failed later). From what we figured we are only observing issues with “hyperscale-controller” charm (cs:~vtas-hyperscale-ci/hyperscale-controller). It seems that issue is occurring only for charm which has “terms” defined in metadata.

From our side, we have tried with to deploy/pull the charms with:
1. Users who have already agreed the terms. For this we see errors below

# juju deploy cs:~vtas-hyperscale-ci/hyperscale-controller --resource install=****** --to lxd:0 --series=xenial
Opening an authorization web page in your browser.
If it does not open, please open this URL:
https://api.jujucharms.com/identity/v1/login?waitid=0a3be524dcb6617d9f068b33a8231a25
[31465:31465:0727/143447.408207:ERROR:sandbox_linux.cc(343)] InitializeSandbox() called with multiple threads in process gpu-process.
[31425:31425:0727/143458.660844:ERROR:desktop_window_tree_host_x11.cc(1148)] Not implemented reached in virtual void views::DesktopWindowTreeHostX11::InitModalType(ui::ModalType)
ERROR storing charm for URL "cs:~vtas-hyperscale-ci/hyperscale-controller-2": cannot get discharge from "https://api.jujucharms.com/terms": third party refused discharge: verification failed: no macaroon
cookies in request

2. Users who are trying to agree the terms. For this we see error as below

# juju agree vtas-hso/eula/1 -B --debug
15:23:07 INFO juju.cmd supercommand.go:63 running juju [2.0.2 gc go1.6.2]
15:23:07 DEBUG juju.cmd supercommand.go:64 args: []string{"juju", "agree", "vtas-hso/eula/1", "-B", "--debug"}
15:23:07 DEBUG httpbakery client.go:244 client do GET https://api.jujucharms.com/terms/v1/agreement?Terms=vtas-hso%2Feula%2F1 {
15:23:07 DEBUG httpbakery client.go:592 postFormJSON to https://api.jujucharms.com/identity/v1/discharger/discharge; vals: url.Values{"id":[]string{"eyJUaGlyZFBhcnR5UHVibGljS2V5IjoiaG1IYVBnQ0MxVWZ1aFlIVVNYNSthaWhTQVplc3FwVmRqUnYwbWdmSXdqbz0iLCJGaXJzdFBhcnR5UHVibGljS2V5IjoiTGVVME14cU05VzNNNkN1cTZxNm5sd3ArU1c4R2hXTUpNNUtNSmY2QkxSaz0iLCJOb25jZSI6InpMcU9mZS9iL2VkS2E2SFNYaEVUOTdDNWtrOWc4aGdqIiwiSWQiOiIrVkhxKzRjUk41VFRGT04xWXBqbi83M0MyRnZISDhnZXBWV2c2YXk4WGtZSE5EK1lYOUg4akJQM2VQdFhkL0t3RlpXU3gwTkJRQXE0RU13R1lnV0xvdDZYbjBtMkxNdVdoMGgvbkk5TEExNUdGTmlHN3krSDdMZ21wWWdBZzBqcFpmcjMvTk9iZ28zczJNTWpDNmN6MXhlRGlDOEcrdFArR3ZsbzBQc0gifQ=="}, "location":[]string{"omnibus"}}
15:23:07 DEBUG httpbakery client.go:244 client do POST https://api.jujucharms.com/identity/v1/discharger/discharge {
15:23:08 DEBUG httpbakery client.go:246 } -> error <nil>
15:23:08 DEBUG httpbakery client.go:246 } -> error <nil>
15:23:08 ERROR cmd supercommand.go:458 failed to retrieve terms: failed to get unsigned terms: 401 Unauthorized: {"Code":"macaroon discharge required","Message":"verification failed: no macaroon cookies in request","Info":{"Macaroon":{"caveats":[{"cid":"eyJUaGlyZFBhcnR5UHVibGljS2V5IjoiaG1IYVBnQ0MxVWZ1aFlIVVNYNSthaWhTQVplc3FwVmRqUnYwbWdmSXdqbz0iLCJGaXJzdFBhcnR5UHVibGljS2V5IjoiTGVVME14cU05VzNNNkN1cTZxNm5sd3ArU1c4R2hXTUpNNUtNSmY2QkxSaz0iLCJOb25jZSI6IjZ0YkVlZ2VMNTJtOWNBNnNtbGo3bUo0OTlzODhSbHZrIiwiSWQ...

Read more...

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.