[
https://issues.apache.org/jira/browse/CLOUDSTACK-5191?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Girish Shilamkar updated CLOUDSTACK-5191:
-----------------------------------------
Issue Type: Bug (was: Test)
> [Automation] test case TestRevokeEgressRule.test_revoke_egress_rule failed to
> ping outside and failed
> ------------------------------------------------------------------------------------------------------
>
> Key: CLOUDSTACK-5191
> URL: https://issues.apache.org/jira/browse/CLOUDSTACK-5191
> Project: CloudStack
> Issue Type: Bug
> Security Level: Public(Anyone can view this level - this is the
> default.)
> Components: Automation
> Affects Versions: 4.3.0
> Reporter: Rayees Namathponnan
> Fix For: 4.3.0
>
>
> Test case
> integration.component.test_egress_rules.TestRevokeEgressRule.test_revoke_egress_rule
> failed in KVM basic zone setup
> Test cases failed while ping outside from VM, observed below error in log
> Stacktrace
> File "/usr/local/lib/python2.7/unittest/case.py", line 318, in run
> testMethod()
> File
> "/Repo_30X/ipcl/cloudstack/test/integration/component/test_egress_rules.py",
> line 1067, in test_revoke_egress_rule
> "Ping to outside world from VM should be successful"
> File "/usr/local/lib/python2.7/unittest/case.py", line 494, in assertEqual
> assertion_func(first, second, msg=msg)
> File "/usr/local/lib/python2.7/unittest/case.py", line 487, in
> _baseAssertEqual
> raise self.failureException(msg)
> Ping to outside world from VM should be successful
> -------------------- >> begin captured logging << --------------------
> test_revoke_egress_rule
> (integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG:
> Created security group with ID: 020865e7-d87b-4da9-b157-c315dc42e33d
> test_revoke_egress_rule
> (integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG:
> Authorizing ingress rule for sec group ID:
> 020865e7-d87b-4da9-b157-c315dc42e33d for ssh access
> test_revoke_egress_rule
> (integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG:
> Authorizing egress rule for sec group ID:
> 020865e7-d87b-4da9-b157-c315dc42e33d for ssh access
> test_revoke_egress_rule
> (integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG:
> Deploying VM in account:
> test-TestStartStopVMWithEgressRule-test_multiple_account_egress_rule_negative-Q4UAPL
> test_revoke_egress_rule
> (integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: SSH
> into VM: 10.223.250.230
> sshClient: DEBUG: SSH Connection: Host:10.223.250.230 User:root
> Port:22
> sshClient: DEBUG: SSH Connection: Host:10.223.250.230 User:root
> Port:22
> sshClient: DEBUG: SSH Connection: Host:10.223.250.230 User:root
> Port:22
> sshClient: DEBUG: SSH Connection: Host:10.223.250.230 User:root
> Port:22
> paramiko.transport: DEBUG: starting thread (client mode): 0xd9d0ad0L
> paramiko.transport: INFO: Connected (version 2.0, client OpenSSH_4.3)
> paramiko.transport: DEBUG: kex algos:['diffie-hellman-group-exchange-sha1',
> 'diffie-hellman-group14-sha1', 'diffie-hellman-group1-sha1'] server
> key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc', '3des-cbc',
> 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour',
> 'aes192-cbc', 'aes256-cbc', '[email protected]', 'aes128-ctr',
> 'aes192-ctr', 'aes256-ctr'] server encrypt:['aes128-cbc', '3des-cbc',
> 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour',
> 'aes192-cbc', 'aes256-cbc', '[email protected]', 'aes128-ctr',
> 'aes192-ctr', 'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1',
> 'hmac-ripemd160', '[email protected]', 'hmac-sha1-96',
> 'hmac-md5-96'] server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160',
> '[email protected]', 'hmac-sha1-96', 'hmac-md5-96'] client
> compress:['none', '[email protected]'] server compress:['none',
> '[email protected]'] client lang:[''] server lang:[''] kex follows?False
> paramiko.transport: DEBUG: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr
> paramiko.transport: DEBUG: using kex diffie-hellman-group1-sha1; server key
> type ssh-rsa; cipher: local aes128-ctr, remote aes128-ctr; mac: local
> hmac-sha1, remote hmac-sha1; compression: local none, remote none
> paramiko.transport: DEBUG: Switch to new keys ...
> paramiko.transport: DEBUG: Adding ssh-rsa host key for 10.223.250.230:
> 0f8b3ff9dc4dce10340227dab3cac032
> paramiko.transport: DEBUG: Trying discovered key
> a0114fddd71936946702c57069b4175b in /root/.ssh/id_rsa
> paramiko.transport: DEBUG: userauth is OK
> paramiko.transport: INFO: Authentication (publickey) failed.
> paramiko.transport: DEBUG: userauth is OK
> paramiko.transport: INFO: Authentication (password) successful!
> test_revoke_egress_rule
> (integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: Ping
> to google.com from VM
> paramiko.transport: DEBUG: [chan 1] Max packet in: 34816 bytes
> paramiko.transport: DEBUG: [chan 1] Max packet out: 32768 bytes
> paramiko.transport: INFO: Secsh channel 1 opened.
> paramiko.transport: DEBUG: [chan 1] Sesch channel 1 request ok
> paramiko.transport: DEBUG: [chan 1] EOF received (1)
> paramiko.transport: DEBUG: [chan 1] EOF sent (1)
> sshClient: DEBUG: {Cmd: ping -c 1 www.google.com via Host: 10.223.250.230}
> {returns: ['PING www.google.com (74.125.239.49) 56(84) bytes of data.', '',
> '--- www.google.com ping statistics ---', '1 packets transmitted, 0 received,
> 100% packet loss, time 0ms', '']}
> test_revoke_egress_rule
> (integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: SSH
> result: ['PING www.google.com (74.125.239.49) 56(84) bytes of data.', '',
> '--- www.google.com ping statistics ---', '1 packets transmitted, 0 received,
> 100% packet loss, time 0ms', '']
> test_revoke_egress_rule
> (integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: SSHing
> into management server from VM
> paramiko.transport: DEBUG: [chan 2] Max packet in: 34816 bytes
> paramiko.transport: DEBUG: [chan 2] Max packet out: 32768 bytes
> paramiko.transport: INFO: Secsh channel 2 opened.
> paramiko.transport: DEBUG: [chan 2] Sesch channel 2 request ok
> paramiko.transport: DEBUG: [chan 2] EOF received (2)
> sshClient: DEBUG: {Cmd: ssh [email protected] via Host: 10.223.250.230}
> {returns: ['Pseudo-terminal will not be allocated because stdin is not a
> terminal.', 'ssh: connect to host 192.168.100.21 port 22: Connection timed
> out']}
> test_revoke_egress_rule
> (integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: SSH
> result: ['Pseudo-terminal will not be allocated because stdin is not a
> terminal.', 'ssh: connect to host 192.168.100.21 port 22: Connection timed
> out']
> test_revoke_egress_rule
> (integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: Revoke
> Egress Rule for Security Group 020865e7-d87b-4da9-b157-c315dc42e33d for
> account:
> test-TestStartStopVMWithEgressRule-test_multiple_account_egress_rule_negative-Q4UAPL
> paramiko.transport: DEBUG: [chan 2] EOF sent (2)
> test_revoke_egress_rule
> (integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: Revoke
> egress rule result: {success : True}
> test_revoke_egress_rule
> (integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: SSH
> into VM: 10.223.250.230
> sshClient: DEBUG: SSH Connection: Host:10.223.250.230 User:root
> Port:22
> paramiko.transport: DEBUG: starting thread (client mode): 0xd934d90L
> paramiko.transport: INFO: Connected (version 2.0, client OpenSSH_4.3)
> paramiko.transport: DEBUG: kex algos:['diffie-hellman-group-exchange-sha1',
> 'diffie-hellman-group14-sha1', 'diffie-hellman-group1-sha1'] server
> key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc', '3des-cbc',
> 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour',
> 'aes192-cbc', 'aes256-cbc', '[email protected]', 'aes128-ctr',
> 'aes192-ctr', 'aes256-ctr'] server encrypt:['aes128-cbc', '3des-cbc',
> 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour',
> 'aes192-cbc', 'aes256-cbc', '[email protected]', 'aes128-ctr',
> 'aes192-ctr', 'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1',
> 'hmac-ripemd160', '[email protected]', 'hmac-sha1-96',
> 'hmac-md5-96'] server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160',
> '[email protected]', 'hmac-sha1-96', 'hmac-md5-96'] client
> compress:['none', '[email protected]'] server compress:['none',
> '[email protected]'] client lang:[''] server lang:[''] kex follows?False
> paramiko.transport: DEBUG: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr
> paramiko.transport: DEBUG: using kex diffie-hellman-group1-sha1; server key
> type ssh-rsa; cipher: local aes128-ctr, remote aes128-ctr; mac: local
> hmac-sha1, remote hmac-sha1; compression: local none, remote none
> paramiko.transport: DEBUG: Switch to new keys ...
> paramiko.transport: DEBUG: Adding ssh-rsa host key for 10.223.250.230:
> 0f8b3ff9dc4dce10340227dab3cac032
> paramiko.transport: DEBUG: Trying discovered key
> a0114fddd71936946702c57069b4175b in /root/.ssh/id_rsa
> paramiko.transport: DEBUG: userauth is OK
> paramiko.transport: INFO: Authentication (publickey) failed.
> paramiko.transport: DEBUG: userauth is OK
> paramiko.transport: INFO: Authentication (password) successful!
> paramiko.transport: DEBUG: EOF in transport thread
> test_revoke_egress_rule
> (integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: Ping
> to google.com from VM
> paramiko.transport: DEBUG: [chan 1] Max packet in: 34816 bytes
> paramiko.transport: DEBUG: [chan 1] Max packet out: 32768 bytes
> paramiko.transport: INFO: Secsh channel 1 opened.
> paramiko.transport: DEBUG: [chan 1] Sesch channel 1 request ok
> paramiko.transport: DEBUG: [chan 1] EOF received (1)
> paramiko.transport: DEBUG: [chan 1] EOF sent (1)
> sshClient: DEBUG: {Cmd: ping -c 1 www.google.com via Host: 10.223.250.230}
> {returns: ['PING www.google.com (74.125.239.48) 56(84) bytes of data.', '',
> '--- www.google.com ping statistics ---', '1 packets transmitted, 0 received,
> 100% packet loss, time 0ms', '']}
> --------------------- >> end captured logging << ---------------------
> Help us localize this page
--
This message was sent by Atlassian JIRA
(v6.1#6144)