duplicated security groups in test_port_security_disable_security_group

Bug #1543880 reported by Armando Migliaccio
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
neutron
Fix Released
High
Kevin Benton

Bug Description

An instance of the failure:

http://logs.openstack.org/10/275510/2/gate/gate-tempest-dsvm-neutron-linuxbridge/34fdca2/logs/testr_results.html.gz

Traceback (most recent call last):
  File "tempest/scenario/test_security_groups_basic_ops.py", line 166, in setUp
    self._deploy_tenant(self.primary_tenant)
  File "tempest/scenario/test_security_groups_basic_ops.py", line 306, in _deploy_tenant
    self._set_access_point(tenant)
  File "tempest/scenario/test_security_groups_basic_ops.py", line 272, in _set_access_point
    security_groups=secgroups)
  File "tempest/scenario/test_security_groups_basic_ops.py", line 250, in _create_server
    sorted([s['name'] for s in server['security_groups']]))
  File "/opt/stack/new/tempest/.tox/full/local/lib/python2.7/site-packages/testtools/testcase.py", line 362, in assertEqual
    self.assertThat(observed, matcher, message)
  File "/opt/stack/new/tempest/.tox/full/local/lib/python2.7/site-packages/testtools/testcase.py", line 447, in assertThat
    raise mismatch_error
testtools.matchers._impl.MismatchError: !=:
reference = [u'tempest-secgroup_access--952188639', u'tempest-secgroup_general--210717852']
actual = [u'tempest-secgroup_access--952188639',
 u'tempest-secgroup_access--952188639',
 u'tempest-secgroup_general--210717852',
 u'tempest-secgroup_general--210717852']

You can notice the duplicated security groups.

More to follow.

Changed in neutron:
importance: Undecided → Critical
status: New → Confirmed
importance: Critical → High
tags: added: gate-failure
Changed in neutron:
milestone: none → mitaka-3
Revision history for this message
Armando Migliaccio (armando-migliaccio) wrote :
Revision history for this message
Armando Migliaccio (armando-migliaccio) wrote :

Logstash query:

message:"reference = [u'tempest-secgroup_access--"

Revision history for this message
Armando Migliaccio (armando-migliaccio) wrote :
Changed in neutron:
assignee: nobody → Kevin Benton (kevinbenton)
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix proposed to neutron (master)

Fix proposed to branch: master
Review: https://review.openstack.org/278609

Changed in neutron:
status: Confirmed → In Progress
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix merged to neutron (master)

Reviewed: https://review.openstack.org/278609
Committed: https://git.openstack.org/cgit/openstack/neutron/commit/?id=eb8141051abe64de7ad9398fb2adaf9a0a79d62d
Submitter: Jenkins
Branch: master

commit eb8141051abe64de7ad9398fb2adaf9a0a79d62d
Author: Kevin Benton <email address hidden>
Date: Wed Feb 10 11:52:37 2016 -0800

    ML2: delete_port on deadlock during binding

    The previous logic was only catching mechanism driver exceptions so
    it would leave behind a partially built port if a deadlock was
    encountered during port binding.

    The bug this closes was caused by a DBDeadlock being encountered when
    a lock was attempted on the port binding record
    (get_locked_port_and_binding). This would not be caught so the API
    would retry the whole operation with the original created port
    left behind. This resulted in two ports assigned to the same instance.

    Closes-Bug: #1543880
    Change-Id: I694a9d58002d72636225f99a5fb2b1ccc1cfb6e5

Changed in neutron:
status: In Progress → Fix Released
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix proposed to neutron (stable/liberty)

Fix proposed to branch: stable/liberty
Review: https://review.openstack.org/280092

Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix merged to neutron (stable/liberty)

Reviewed: https://review.openstack.org/280092
Committed: https://git.openstack.org/cgit/openstack/neutron/commit/?id=e93c5dce0b71ebebfeca31913928f07b77bbd0ae
Submitter: Jenkins
Branch: stable/liberty

commit e93c5dce0b71ebebfeca31913928f07b77bbd0ae
Author: Kevin Benton <email address hidden>
Date: Wed Feb 10 11:52:37 2016 -0800

    ML2: delete_port on deadlock during binding

    The previous logic was only catching mechanism driver exceptions so
    it would leave behind a partially built port if a deadlock was
    encountered during port binding.

    The bug this closes was caused by a DBDeadlock being encountered when
    a lock was attempted on the port binding record
    (get_locked_port_and_binding). This would not be caught so the API
    would retry the whole operation with the original created port
    left behind. This resulted in two ports assigned to the same instance.

    Closes-Bug: #1543880
    Change-Id: I694a9d58002d72636225f99a5fb2b1ccc1cfb6e5
    (cherry picked from commit eb8141051abe64de7ad9398fb2adaf9a0a79d62d)

tags: added: in-stable-liberty
Revision history for this message
Thierry Carrez (ttx) wrote : Fix included in openstack/neutron 8.0.0.0b3

This issue was fixed in the openstack/neutron 8.0.0.0b3 development milestone.

Revision history for this message
Doug Hellmann (doug-hellmann) wrote : Fix included in openstack/neutron 7.0.4

This issue was fixed in the openstack/neutron 7.0.4 release.

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.