test_list_security_groups_list_all_tenants_filter fails with nova-net "Security group 34 not found"
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
OpenStack Compute (nova) |
New
|
Undecided
|
Unassigned |
Bug Description
http://
Looks like this only fails in grenade jobs with nova-network:
2014-04-23 08:39:17.718 | Traceback (most recent call last):
2014-04-23 08:39:17.718 | File "tempest/
2014-04-23 08:39:17.718 | resp, fetched_list = self.adm_
2014-04-23 08:39:17.718 | File "tempest/
2014-04-23 08:39:17.718 | resp, body = self.get(url)
2014-04-23 08:39:17.718 | File "tempest/
2014-04-23 08:39:17.718 | return self.request('GET', url, extra_headers, headers)
2014-04-23 08:39:17.718 | File "tempest/
2014-04-23 08:39:17.719 | resp, resp_body)
2014-04-23 08:39:17.719 | File "tempest/
2014-04-23 08:39:17.719 | raise exceptions.
2014-04-23 08:39:17.719 | NotFound: Object not found
2014-04-23 08:39:17.719 | Details: <itemNotFound code="404" xmlns="http://
message:"Security group 34 not found" AND tags:screen-
This doesn't always result in a failure when it shows up in the logs.
tags: | added: network testing |
Looking at the test:
http:// git.openstack. org/cgit/ openstack/ tempest/ tree/tempest/ api/compute/ admin/test_ security_ groups. py#n47
It creates two security groups with a non-admin tenant and then 2 security groups with the admin tenant. Then it tries to list security groups for all tenants using the admin client, and that fails because one of the security groups isn't found.
From the logs, there are the creates for the non-admin secgroups:
2014-04-23 08:39:17.717 | 2014-04-23 08:28:47,300 Request (SecurityGroups TestAdminXML: test_list_ security_ groups_ list_all_ tenants_ filter) : 200 POST http:// 127.0.0. 1:5000/ v2.0/tokens TestAdminXML: test_list_ security_ groups_ list_all_ tenants_ filter) : 200 POST http:// 127.0.0. 1:8774/ v2/4c13ccd94dfd 4199a2a6f848f79 b7337/os- security- groups 0.171s TestAdminXML: test_list_ security_ groups_ list_all_ tenants_ filter) : 200 POST http:// 127.0.0. 1:8774/ v2/4c13ccd94dfd 4199a2a6f848f79 b7337/os- security- groups 0.057s
2014-04-23 08:39:17.717 | 2014-04-23 08:28:47,472 Request (SecurityGroups
2014-04-23 08:39:17.717 | 2014-04-23 08:28:47,532 Request (SecurityGroups
These are the posts for the two admin secgroups:
2014-04-23 08:39:17.717 | 2014-04-23 08:28:47,765 Request (SecurityGroups TestAdminXML: test_list_ security_ groups_ list_all_ tenants_ filter) : 200 POST http:// 127.0.0. 1:5000/ v2.0/tokens TestAdminXML: test_list_ security_ groups_ list_all_ tenants_ filter) : 200 POST http:// 127.0.0. 1:8774/ v2/b30338440c64 4778b54f7c3767c 8c604/os- security- groups 0.160s TestAdminXML: test_list_ security_ groups_ list_all_ tenants_ filter) : 200 POST http:// 127.0.0. 1:8774/ v2/b30338440c64 4778b54f7c3767c 8c604/os- security- groups 0.146s
2014-04-23 08:39:17.717 | 2014-04-23 08:28:47,925 Request (SecurityGroups
2014-04-23 08:39:17.717 | 2014-04-23 08:28:48,073 Request (SecurityGroups
Then the get fails:
2014-04-23 08:39:17.717 | 2014-04-23 08:28:48,138 Request (SecurityGroups TestAdminXML: test_list_ security_ groups_ list_all_ tenants_ filter) : 404 GET http:// 127.0.0. 1:8774/ v2/b30338440c64 4778b54f7c3767c 8c604/os- security- groups? all_tenants= true 0.064s
The server is returning a 200 on the creates so not sure why one of them wouldn't exist, but definitely a race.