[system-tests] Test method 'check_fixed_network_cidr' always uses default credentials for OpenStack

Bug #1435560 reported by Artem Panchenko
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Fuel for OpenStack
Fix Released
Critical
Egor Kotko
6.0.x
Invalid
Undecided
Egor Kotko

Bug Description

Tests which modify default OS environment credentials and perform 'check_fixed_network_cidr' check fails with the following error:

======================================================================
ERROR: Deploy cluster in ha mode with 1 controller and Neutron GRE
----------------------------------------------------------------------
Traceback (most recent call last):
  File "/home/jenkins/venv-nailgun-tests-2.9/local/lib/python2.7/site-packages/proboscis/case.py", line 296, in testng_method_mistake_capture_func
    compatability.capture_type_error(s_func)
  File "/home/jenkins/venv-nailgun-tests-2.9/local/lib/python2.7/site-packages/proboscis/compatability/exceptions_2_6.py", line 27, in capture_type_error
    func()
  File "/home/jenkins/venv-nailgun-tests-2.9/local/lib/python2.7/site-packages/proboscis/case.py", line 350, in func
    func(test_case.state.get_state())
  File "/home/jenkins/workspace/6.2.mos-updates-demo.test-deb-patching/fuel-qa/fuelweb_test/helpers/decorators.py", line 66, in wrapper
    return func(*args, **kwargs)
  File "/home/jenkins/workspace/6.2.mos-updates-demo.test-deb-patching/fuel-qa/fuelweb_test/tests/test_neutron.py", line 78, in deploy_neutron_gre
    cluster_id, self.env.d_env.get_ssh_to_remote(_ip))
  File "/home/jenkins/workspace/6.2.mos-updates-demo.test-deb-patching/fuel-qa/fuelweb_test/__init__.py", line 48, in wrapped
    result = func(*args, **kwargs)
  File "/home/jenkins/workspace/6.2.mos-updates-demo.test-deb-patching/fuel-qa/fuelweb_test/models/fuel_web_client.py", line 1448, in check_fixed_network_cidr
    self.get_public_vip(cluster_id))
  File "/home/jenkins/workspace/6.2.mos-updates-demo.test-deb-patching/fuel-qa/fuelweb_test/helpers/os_actions.py", line 31, in __init__
    tenant)
  File "/home/jenkins/workspace/6.2.mos-updates-demo.test-deb-patching/fuel-qa/fuelweb_test/helpers/common.py", line 42, in __init__
    auth_url=auth_url)
  File "/home/jenkins/venv-nailgun-tests-2.9/local/lib/python2.7/site-packages/keystoneclient/v2_0/client.py", line 152, in __init__
    self.authenticate()
  File "/home/jenkins/venv-nailgun-tests-2.9/local/lib/python2.7/site-packages/keystoneclient/utils.py", line 318, in inner
    return func(*args, **kwargs)
  File "/home/jenkins/venv-nailgun-tests-2.9/local/lib/python2.7/site-packages/keystoneclient/httpclient.py", line 503, in authenticate
    resp = self.get_raw_token_from_identity_service(**kwargs)
  File "/home/jenkins/venv-nailgun-tests-2.9/local/lib/python2.7/site-packages/keystoneclient/v2_0/client.py", line 186, in get_raw_token_from_identity_service
    return plugin.get_auth_ref(self.session)
  File "/home/jenkins/venv-nailgun-tests-2.9/local/lib/python2.7/site-packages/keystoneclient/auth/identity/v2.py", line 78, in get_auth_ref
    authenticated=False, log=False)
  File "/home/jenkins/venv-nailgun-tests-2.9/local/lib/python2.7/site-packages/keystoneclient/session.py", line 488, in post
    return self.request(url, 'POST', **kwargs)
  File "/home/jenkins/venv-nailgun-tests-2.9/local/lib/python2.7/site-packages/keystoneclient/utils.py", line 318, in inner
    return func(*args, **kwargs)
  File "/home/jenkins/venv-nailgun-tests-2.9/local/lib/python2.7/site-packages/keystoneclient/session.py", line 389, in request
    raise exceptions.from_response(resp, method, url)
Unauthorized: Could not find user: admin (Disable debug mode to suppress these details.) (HTTP 401)

This issue is caused by this commit:

https://github.com/stackforge/fuel-qa/commit/d95e7825d0aedf97cdab712bc77d8cace70ea6fd

We need to revert it and re-implement fix for #1432242 so 'check_fixed_network_cidr' method can get credentials from parameters.

Tags: system-tests
Changed in fuel:
assignee: Fuel QA Team (fuel-qa) → Artem Panchenko (apanchenko-8)
status: New → In Progress
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Related fix merged to fuel-qa (master)

Reviewed: https://review.openstack.org/167013
Committed: https://git.openstack.org/cgit/stackforge/fuel-qa/commit/?id=1e9eaef8621e5eb3dedda2252961aa20b5b0ad6b
Submitter: Jenkins
Branch: master

commit 1e9eaef8621e5eb3dedda2252961aa20b5b0ad6b
Author: Nastya Urlapova <email address hidden>
Date: Mon Mar 23 21:16:20 2015 +0000

    Revert "Add output of full subnet from slave node"

    This reverts commit 585f9af050c422f5b60391d2b88bfb5c1f7b2aec.

    Change-Id: If04ada200b5ceff13bfa96cf5a574cae0e43c41f
    Related-bug: #1435560

Changed in fuel:
assignee: Artem Panchenko (apanchenko-8) → Egor Kotko (ykotko)
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix proposed to fuel-qa (master)

Fix proposed to branch: master
Review: https://review.openstack.org/168614

summary: - [systest] Test method 'check_fixed_network_cidr' always uses default
- credentials for OpenStack
+ [system-tests] Test method 'check_fixed_network_cidr' always uses
+ default credentials for OpenStack
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix merged to fuel-qa (master)

Reviewed: https://review.openstack.org/168614
Committed: https://git.openstack.org/cgit/stackforge/fuel-qa/commit/?id=d88be17d91ec89a251b81349e252766c7c9a1962
Submitter: Jenkins
Branch: master

commit d88be17d91ec89a251b81349e252766c7c9a1962
Author: Egor Kotko <email address hidden>
Date: Sat Mar 28 20:17:35 2015 +0100

    Add possibility to use non default credentials

    Implementation of 'check_fixed_network_cidr'
    with ability get connection via api

    Change-Id: Ib50c948216fa697e20872342bda24c95bb9d8aaf
    Closes-bug: #1435560

Changed in fuel:
status: In Progress → Fix Committed
Revision history for this message
Tatyanka (tatyana-leontovich) wrote :

verified 357 iso

Changed in fuel:
status: Fix Committed → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.