Rayees Namathponnan created CLOUDSTACK-5191:
-----------------------------------------------
Summary: [Automation] test case
TestRevokeEgressRule.test_revoke_egress_rule failed to ping outside and failed
Key: CLOUDSTACK-5191
URL: https://issues.apache.org/jira/browse/CLOUDSTACK-5191
Project: CloudStack
Issue Type: Test
Security Level: Public (Anyone can view this level - this is the default.)
Components: Automation
Affects Versions: 4.3.0
Reporter: Rayees Namathponnan
Fix For: 4.3.0
Test case
integration.component.test_egress_rules.TestRevokeEgressRule.test_revoke_egress_rule
failed in KVM basic zone setup
Test cases failed while ping outside from VM, observed below error in log
Stacktrace
File "/usr/local/lib/python2.7/unittest/case.py", line 318, in run
testMethod()
File
"/Repo_30X/ipcl/cloudstack/test/integration/component/test_egress_rules.py",
line 1067, in test_revoke_egress_rule
"Ping to outside world from VM should be successful"
File "/usr/local/lib/python2.7/unittest/case.py", line 494, in assertEqual
assertion_func(first, second, msg=msg)
File "/usr/local/lib/python2.7/unittest/case.py", line 487, in
_baseAssertEqual
raise self.failureException(msg)
Ping to outside world from VM should be successful
-------------------- >> begin captured logging << --------------------
test_revoke_egress_rule
(integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: Created
security group with ID: 020865e7-d87b-4da9-b157-c315dc42e33d
test_revoke_egress_rule
(integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG:
Authorizing ingress rule for sec group ID: 020865e7-d87b-4da9-b157-c315dc42e33d
for ssh access
test_revoke_egress_rule
(integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG:
Authorizing egress rule for sec group ID: 020865e7-d87b-4da9-b157-c315dc42e33d
for ssh access
test_revoke_egress_rule
(integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG:
Deploying VM in account:
test-TestStartStopVMWithEgressRule-test_multiple_account_egress_rule_negative-Q4UAPL
test_revoke_egress_rule
(integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: SSH into
VM: 10.223.250.230
sshClient: DEBUG: SSH Connection: Host:10.223.250.230 User:root
Port:22
sshClient: DEBUG: SSH Connection: Host:10.223.250.230 User:root
Port:22
sshClient: DEBUG: SSH Connection: Host:10.223.250.230 User:root
Port:22
sshClient: DEBUG: SSH Connection: Host:10.223.250.230 User:root
Port:22
paramiko.transport: DEBUG: starting thread (client mode): 0xd9d0ad0L
paramiko.transport: INFO: Connected (version 2.0, client OpenSSH_4.3)
paramiko.transport: DEBUG: kex algos:['diffie-hellman-group-exchange-sha1',
'diffie-hellman-group14-sha1', 'diffie-hellman-group1-sha1'] server
key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc', '3des-cbc',
'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour',
'aes192-cbc', 'aes256-cbc', '[email protected]', 'aes128-ctr',
'aes192-ctr', 'aes256-ctr'] server encrypt:['aes128-cbc', '3des-cbc',
'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour',
'aes192-cbc', 'aes256-cbc', '[email protected]', 'aes128-ctr',
'aes192-ctr', 'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1',
'hmac-ripemd160', '[email protected]', 'hmac-sha1-96', 'hmac-md5-96']
server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160',
'[email protected]', 'hmac-sha1-96', 'hmac-md5-96'] client
compress:['none', '[email protected]'] server compress:['none',
'[email protected]'] client lang:[''] server lang:[''] kex follows?False
paramiko.transport: DEBUG: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr
paramiko.transport: DEBUG: using kex diffie-hellman-group1-sha1; server key
type ssh-rsa; cipher: local aes128-ctr, remote aes128-ctr; mac: local
hmac-sha1, remote hmac-sha1; compression: local none, remote none
paramiko.transport: DEBUG: Switch to new keys ...
paramiko.transport: DEBUG: Adding ssh-rsa host key for 10.223.250.230:
0f8b3ff9dc4dce10340227dab3cac032
paramiko.transport: DEBUG: Trying discovered key
a0114fddd71936946702c57069b4175b in /root/.ssh/id_rsa
paramiko.transport: DEBUG: userauth is OK
paramiko.transport: INFO: Authentication (publickey) failed.
paramiko.transport: DEBUG: userauth is OK
paramiko.transport: INFO: Authentication (password) successful!
test_revoke_egress_rule
(integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: Ping to
google.com from VM
paramiko.transport: DEBUG: [chan 1] Max packet in: 34816 bytes
paramiko.transport: DEBUG: [chan 1] Max packet out: 32768 bytes
paramiko.transport: INFO: Secsh channel 1 opened.
paramiko.transport: DEBUG: [chan 1] Sesch channel 1 request ok
paramiko.transport: DEBUG: [chan 1] EOF received (1)
paramiko.transport: DEBUG: [chan 1] EOF sent (1)
sshClient: DEBUG: {Cmd: ping -c 1 www.google.com via Host: 10.223.250.230}
{returns: ['PING www.google.com (74.125.239.49) 56(84) bytes of data.', '',
'--- www.google.com ping statistics ---', '1 packets transmitted, 0 received,
100% packet loss, time 0ms', '']}
test_revoke_egress_rule
(integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: SSH
result: ['PING www.google.com (74.125.239.49) 56(84) bytes of data.', '', '---
www.google.com ping statistics ---', '1 packets transmitted, 0 received, 100%
packet loss, time 0ms', '']
test_revoke_egress_rule
(integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: SSHing
into management server from VM
paramiko.transport: DEBUG: [chan 2] Max packet in: 34816 bytes
paramiko.transport: DEBUG: [chan 2] Max packet out: 32768 bytes
paramiko.transport: INFO: Secsh channel 2 opened.
paramiko.transport: DEBUG: [chan 2] Sesch channel 2 request ok
paramiko.transport: DEBUG: [chan 2] EOF received (2)
sshClient: DEBUG: {Cmd: ssh [email protected] via Host: 10.223.250.230}
{returns: ['Pseudo-terminal will not be allocated because stdin is not a
terminal.', 'ssh: connect to host 192.168.100.21 port 22: Connection timed
out']}
test_revoke_egress_rule
(integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: SSH
result: ['Pseudo-terminal will not be allocated because stdin is not a
terminal.', 'ssh: connect to host 192.168.100.21 port 22: Connection timed out']
test_revoke_egress_rule
(integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: Revoke
Egress Rule for Security Group 020865e7-d87b-4da9-b157-c315dc42e33d for
account:
test-TestStartStopVMWithEgressRule-test_multiple_account_egress_rule_negative-Q4UAPL
paramiko.transport: DEBUG: [chan 2] EOF sent (2)
test_revoke_egress_rule
(integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: Revoke
egress rule result: {success : True}
test_revoke_egress_rule
(integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: SSH into
VM: 10.223.250.230
sshClient: DEBUG: SSH Connection: Host:10.223.250.230 User:root
Port:22
paramiko.transport: DEBUG: starting thread (client mode): 0xd934d90L
paramiko.transport: INFO: Connected (version 2.0, client OpenSSH_4.3)
paramiko.transport: DEBUG: kex algos:['diffie-hellman-group-exchange-sha1',
'diffie-hellman-group14-sha1', 'diffie-hellman-group1-sha1'] server
key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc', '3des-cbc',
'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour',
'aes192-cbc', 'aes256-cbc', '[email protected]', 'aes128-ctr',
'aes192-ctr', 'aes256-ctr'] server encrypt:['aes128-cbc', '3des-cbc',
'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour',
'aes192-cbc', 'aes256-cbc', '[email protected]', 'aes128-ctr',
'aes192-ctr', 'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1',
'hmac-ripemd160', '[email protected]', 'hmac-sha1-96', 'hmac-md5-96']
server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160',
'[email protected]', 'hmac-sha1-96', 'hmac-md5-96'] client
compress:['none', '[email protected]'] server compress:['none',
'[email protected]'] client lang:[''] server lang:[''] kex follows?False
paramiko.transport: DEBUG: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr
paramiko.transport: DEBUG: using kex diffie-hellman-group1-sha1; server key
type ssh-rsa; cipher: local aes128-ctr, remote aes128-ctr; mac: local
hmac-sha1, remote hmac-sha1; compression: local none, remote none
paramiko.transport: DEBUG: Switch to new keys ...
paramiko.transport: DEBUG: Adding ssh-rsa host key for 10.223.250.230:
0f8b3ff9dc4dce10340227dab3cac032
paramiko.transport: DEBUG: Trying discovered key
a0114fddd71936946702c57069b4175b in /root/.ssh/id_rsa
paramiko.transport: DEBUG: userauth is OK
paramiko.transport: INFO: Authentication (publickey) failed.
paramiko.transport: DEBUG: userauth is OK
paramiko.transport: INFO: Authentication (password) successful!
paramiko.transport: DEBUG: EOF in transport thread
test_revoke_egress_rule
(integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: Ping to
google.com from VM
paramiko.transport: DEBUG: [chan 1] Max packet in: 34816 bytes
paramiko.transport: DEBUG: [chan 1] Max packet out: 32768 bytes
paramiko.transport: INFO: Secsh channel 1 opened.
paramiko.transport: DEBUG: [chan 1] Sesch channel 1 request ok
paramiko.transport: DEBUG: [chan 1] EOF received (1)
paramiko.transport: DEBUG: [chan 1] EOF sent (1)
sshClient: DEBUG: {Cmd: ping -c 1 www.google.com via Host: 10.223.250.230}
{returns: ['PING www.google.com (74.125.239.48) 56(84) bytes of data.', '',
'--- www.google.com ping statistics ---', '1 packets transmitted, 0 received,
100% packet loss, time 0ms', '']}
--------------------- >> end captured logging << ---------------------
Help us localize this page
--
This message was sent by Atlassian JIRA
(v6.1#6144)