test_two_sec_groups failure

Bug #1730271 reported by YAMAMOTO Takashi
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
networking-midonet
Fix Released
Critical
YAMAMOTO Takashi
neutron
Fix Released
Undecided
YAMAMOTO Takashi

Bug Description

eg. http://logs.openstack.org/24/517524/3/gate/legacy-tempest-dsvm-networking-midonet-aio-ml2/538c357/logs/testr_results.html.gz

ft1.4: neutron.tests.tempest.scenario.test_security_groups.NetworkDefaultSecGroupTest.test_two_sec_groups[id-3d73ec1a-2ec6-45a9-b0f8-04a283d9d964]_StringException: pythonlogging:'': {{{
2017-11-06 02:36:21,418 20994 INFO [tempest.lib.common.rest_client] Request (NetworkDefaultSecGroupTest:test_two_sec_groups): 201 POST http://15.184.68.89:9696/v2.0/security-groups 0.316s
2017-11-06 02:36:21,418 20994 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'X-Auth-Token': '<omitted>', 'Accept': 'application/json'}
        Body: {"security_group": {"name": "ssh_secgrp"}}
    Response - Headers: {u'x-openstack-request-id': 'req-a84466f5-d1db-4b8e-99e3-d1e078d2299d', 'content-location': 'http://15.184.68.89:9696/v2.0/security-groups', u'content-length': '1342', u'date': 'Mon, 06 Nov 2017 02:36:21 GMT', u'content-type': 'application/json', 'status': '201', u'connection': 'close'}
        Body: {"security_group": {"description": "", "tags": [], "tenant_id": "2ed61f69d3d54a9980201640fbc24456", "created_at": "2017-11-06T02:36:21Z", "updated_at": "2017-11-06T02:36:21Z", "security_group_rules": [{"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2017-11-06T02:36:21Z", "revision_number": 0, "id": "39a7f84c-d3c4-4d57-accc-d7732d17abb1", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2017-11-06T02:36:21Z", "security_group_id": "95395f8b-5099-4c5a-8c13-1bbafbb60c65", "tenant_id": "2ed61f69d3d54a9980201640fbc24456", "port_range_min": null, "ethertype": "IPv6", "project_id": "2ed61f69d3d54a9980201640fbc24456"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2017-11-06T02:36:21Z", "revision_number": 0, "id": "9ea97847-8896-40ea-a72f-b3c0d35e9111", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2017-11-06T02:36:21Z", "security_group_id": "95395f8b-5099-4c5a-8c13-1bbafbb60c65", "tenant_id": "2ed61f69d3d54a9980201640fbc24456", "port_range_min": null, "ethertype": "IPv4", "project_id": "2ed61f69d3d54a9980201640fbc24456"}], "revision_number": 2, "project_id": "2ed61f69d3d54a9980201640fbc24456", "id": "95395f8b-5099-4c5a-8c13-1bbafbb60c65", "name": "ssh_secgrp"}}
2017-11-06 02:36:21,657 20994 INFO [tempest.lib.common.rest_client] Request (NetworkDefaultSecGroupTest:test_two_sec_groups): 201 POST http://15.184.68.89:9696/v2.0/security-group-rules 0.237s
2017-11-06 02:36:21,657 20994 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'X-Auth-Token': '<omitted>', 'Accept': 'application/json'}
        Body: {"security_group_rule": {"port_range_max": 22, "direction": "ingress", "port_range_min": 22, "remote_ip_prefix": "0.0.0.0/0", "security_group_id": "95395f8b-5099-4c5a-8c13-1bbafbb60c65", "protocol": "tcp"}}
    Response - Headers: {u'x-openstack-request-id': 'req-96b4e7f7-d605-4415-9a2f-5a724ec440e5', 'content-location': 'http://15.184.68.89:9696/v2.0/security-group-rules', u'content-length': '514', u'date': 'Mon, 06 Nov 2017 02:36:21 GMT', u'content-type': 'application/json', 'status': '201', u'connection': 'close'}
        Body: {"security_group_rule": {"remote_group_id": null, "direction": "ingress", "protocol": "tcp", "description": "", "ethertype": "IPv4", "remote_ip_prefix": "0.0.0.0/0", "port_range_max": 22, "updated_at": "2017-11-06T02:36:21Z", "security_group_id": "95395f8b-5099-4c5a-8c13-1bbafbb60c65", "port_range_min": 22, "revision_number": 0, "tenant_id": "2ed61f69d3d54a9980201640fbc24456", "created_at": "2017-11-06T02:36:21Z", "project_id": "2ed61f69d3d54a9980201640fbc24456", "id": "9ea35584-5a38-4941-a70a-9a145185e0a6"}}
2017-11-06 02:36:21,942 20994 INFO [tempest.lib.common.rest_client] Request (NetworkDefaultSecGroupTest:test_two_sec_groups): 201 POST http://15.184.68.89:9696/v2.0/security-groups 0.283s
2017-11-06 02:36:21,943 20994 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'X-Auth-Token': '<omitted>', 'Accept': 'application/json'}
        Body: {"security_group": {"name": "icmp_secgrp"}}
    Response - Headers: {u'x-openstack-request-id': 'req-495a344b-8161-4426-95f6-b6340536d80c', 'content-location': 'http://15.184.68.89:9696/v2.0/security-groups', u'content-length': '1343', u'date': 'Mon, 06 Nov 2017 02:36:21 GMT', u'content-type': 'application/json', 'status': '201', u'connection': 'close'}
        Body: {"security_group": {"description": "", "tags": [], "tenant_id": "2ed61f69d3d54a9980201640fbc24456", "created_at": "2017-11-06T02:36:21Z", "updated_at": "2017-11-06T02:36:21Z", "security_group_rules": [{"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2017-11-06T02:36:21Z", "revision_number": 0, "id": "31a3428a-4554-4dc7-8fad-4702832116bb", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2017-11-06T02:36:21Z", "security_group_id": "48e55bd9-84c4-47ef-b3c0-aca365117c4a", "tenant_id": "2ed61f69d3d54a9980201640fbc24456", "port_range_min": null, "ethertype": "IPv4", "project_id": "2ed61f69d3d54a9980201640fbc24456"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2017-11-06T02:36:21Z", "revision_number": 0, "id": "90994e07-fc6d-43da-815d-40e58e1588a6", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2017-11-06T02:36:21Z", "security_group_id": "48e55bd9-84c4-47ef-b3c0-aca365117c4a", "tenant_id": "2ed61f69d3d54a9980201640fbc24456", "port_range_min": null, "ethertype": "IPv6", "project_id": "2ed61f69d3d54a9980201640fbc24456"}], "revision_number": 2, "project_id": "2ed61f69d3d54a9980201640fbc24456", "id": "48e55bd9-84c4-47ef-b3c0-aca365117c4a", "name": "icmp_secgrp"}}
2017-11-06 02:36:22,186 20994 INFO [tempest.lib.common.rest_client] Request (NetworkDefaultSecGroupTest:test_two_sec_groups): 201 POST http://15.184.68.89:9696/v2.0/security-group-rules 0.242s
2017-11-06 02:36:22,187 20994 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'X-Auth-Token': '<omitted>', 'Accept': 'application/json'}
        Body: {"security_group_rule": {"port_range_max": 0, "direction": "ingress", "port_range_min": 8, "remote_ip_prefix": "0.0.0.0/0", "security_group_id": "48e55bd9-84c4-47ef-b3c0-aca365117c4a", "protocol": "icmp"}}
    Response - Headers: {u'x-openstack-request-id': 'req-7facb940-2bd7-44e7-8790-ebe6a1492bd3', 'content-location': 'http://15.184.68.89:9696/v2.0/security-group-rules', u'content-length': '513', u'date': 'Mon, 06 Nov 2017 02:36:22 GMT', u'content-type': 'application/json', 'status': '201', u'connection': 'close'}
        Body: {"security_group_rule": {"remote_group_id": null, "direction": "ingress", "protocol": "icmp", "description": "", "ethertype": "IPv4", "remote_ip_prefix": "0.0.0.0/0", "port_range_max": 0, "updated_at": "2017-11-06T02:36:22Z", "security_group_id": "48e55bd9-84c4-47ef-b3c0-aca365117c4a", "port_range_min": 8, "revision_number": 0, "tenant_id": "2ed61f69d3d54a9980201640fbc24456", "created_at": "2017-11-06T02:36:22Z", "project_id": "2ed61f69d3d54a9980201640fbc24456", "id": "290a0470-38c7-4f9a-9d03-23b1ff739bb1"}}
2017-11-06 02:36:22,549 20994 INFO [tempest.lib.common.rest_client] Request (NetworkDefaultSecGroupTest:test_two_sec_groups): 409 POST http://15.184.68.89/compute/v2.1/servers 0.360s
2017-11-06 02:36:22,550 20994 DEBUG [tempest.lib.common.rest_client] Request - Headers: {'Content-Type': 'application/json', 'X-Auth-Token': '<omitted>', 'Accept': 'application/json'}
        Body: {"server": {"key_name": "tempest-keypair-test-1915761625", "security_groups": [{"name": "ssh_secgrp"}, {"name": "icmp_secgrp"}], "imageRef": "c7222a59-ac6d-4f7b-930a-b786fd36cf88", "flavorRef": "42", "name": "tempest-server-test-1945275187", "networks": [{"uuid": "b1ed740a-6452-4042-a899-82f54b8bdef9"}]}}
    Response - Headers: {u'x-openstack-request-id': 'req-a67381de-783d-4fcf-89f5-1088d7149f01', u'server': 'Apache/2.4.18 (Ubuntu)', u'content-length': '143', u'date': 'Mon, 06 Nov 2017 02:36:22 GMT', 'status': '409', u'connection': 'close', 'content-location': 'http://15.184.68.89/compute/v2.1/servers', u'vary': 'OpenStack-API-Version,X-OpenStack-Nova-API-Version', u'x-compute-request-id': 'req-a67381de-783d-4fcf-89f5-1088d7149f01', u'openstack-api-version': 'compute 2.1', u'content-type': 'application/json; charset=UTF-8', u'x-openstack-nova-api-version': '2.1'}
        Body: {"conflictingRequest": {"message": "Multiple security_group matches found for name 'ssh_secgrp', use an ID to be more specific.", "code": 409}}
}}}

Traceback (most recent call last):
  File "/opt/stack/new/neutron/neutron/tests/tempest/scenario/test_security_groups.py", line 127, in test_two_sec_groups
    num_servers=1, security_groups=security_groups_list)
  File "/opt/stack/new/neutron/neutron/tests/tempest/scenario/test_security_groups.py", line 50, in create_vm_testing_sec_grp
    security_groups=security_groups))
  File "/opt/stack/new/neutron/neutron/tests/tempest/scenario/base.py", line 81, in create_server
    security_groups=security_groups)
  File "tempest/lib/services/compute/servers_client.py", line 89, in create_server
    resp, body = self.post('servers', post_body)
  File "tempest/lib/common/rest_client.py", line 279, in post
    return self.request('POST', url, extra_headers, headers, body, chunked)
  File "tempest/lib/services/compute/base_compute_client.py", line 48, in request
    method, url, extra_headers, headers, body, chunked)
  File "tempest/lib/common/rest_client.py", line 668, in request
    self._error_checker(resp, resp_body)
  File "tempest/lib/common/rest_client.py", line 789, in _error_checker
    raise exceptions.Conflict(resp_body, resp=resp)
tempest.lib.exceptions.Conflict: An object with that identifier already exists
Details: {u'message': u"Multiple security_group matches found for name 'ssh_secgrp', use an ID to be more specific.", u'code': 409}

Changed in networking-midonet:
assignee: nobody → YAMAMOTO Takashi (yamamoto)
importance: Undecided → Critical
milestone: none → 6.0.0
status: New → In Progress
tags: added: gate-failure midokura-jira-tracked
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix proposed to neutron (master)

Fix proposed to branch: master
Review: https://review.openstack.org/517855

Changed in neutron:
assignee: nobody → YAMAMOTO Takashi (yamamoto)
status: New → In Progress
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix merged to neutron (master)

Reviewed: https://review.openstack.org/517855
Committed: https://git.openstack.org/cgit/openstack/neutron/commit/?id=83e73e0e6f8e3c7a0bd438f8bebeb0ea08e53216
Submitter: Zuul
Branch: master

commit 83e73e0e6f8e3c7a0bd438f8bebeb0ea08e53216
Author: YAMAMOTO Takashi <email address hidden>
Date: Mon Nov 6 13:22:52 2017 +0900

    test_security_groups: Randomize SG names

    To avoid conflicts with concurrent tests.

    Closes-Bug: #1730271
    Change-Id: Id33dc37118f57a0dbbfbe5ee71d1c7a48eefeb3e

Changed in neutron:
status: In Progress → Fix Released
Changed in networking-midonet:
status: In Progress → Fix Released
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix included in openstack/neutron 12.0.0.0b2

This issue was fixed in the openstack/neutron 12.0.0.0b2 development milestone.

tags: added: neutron-proactive-backport-potential
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix proposed to neutron (stable/pike)

Fix proposed to branch: stable/pike
Review: https://review.openstack.org/566251

Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix merged to neutron (stable/pike)

Reviewed: https://review.openstack.org/566251
Committed: https://git.openstack.org/cgit/openstack/neutron/commit/?id=0dfc7ef8ac54d967372ef44b70c58e9c4c70e578
Submitter: Zuul
Branch: stable/pike

commit 0dfc7ef8ac54d967372ef44b70c58e9c4c70e578
Author: YAMAMOTO Takashi <email address hidden>
Date: Mon Nov 6 13:22:52 2017 +0900

    test_security_groups: Randomize SG names

    To avoid conflicts with concurrent tests.

    Conflicts:
     neutron/tests/tempest/scenario/test_security_groups.py

    Closes-Bug: #1730271
    Change-Id: Id33dc37118f57a0dbbfbe5ee71d1c7a48eefeb3e
    (cherry picked from commit 83e73e0e6f8e3c7a0bd438f8bebeb0ea08e53216)

tags: added: in-stable-pike
tags: removed: neutron-proactive-backport-potential
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix included in openstack/neutron 11.0.6

This issue was fixed in the openstack/neutron 11.0.6 release.

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.