[ https://issues.apache.org/jira/browse/CLOUDSTACK-6612?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14001620#comment-14001620 ]
ASF subversion and git services commented on CLOUDSTACK-6612: ------------------------------------------------------------- Commit 89b041a62d99d07b7c5d5b7b49bda3630f9559dd in cloudstack's branch refs/heads/master from [~gauravaradhye] [ https://git-wip-us.apache.org/repos/asf?p=cloudstack.git;h=89b041a ] CLOUDSTACK-6612: Resolved issue with sshClient.py > [Automation] Test cases failing with db connection error > --------------------------------------------------------- > > Key: CLOUDSTACK-6612 > URL: https://issues.apache.org/jira/browse/CLOUDSTACK-6612 > Project: CloudStack > Issue Type: Test > Security Level: Public(Anyone can view this level - this is the > default.) > Components: Automation > Affects Versions: 4.4.0 > Reporter: Rayees Namathponnan > Assignee: Gaurav Aradhye > Priority: Critical > Fix For: 4.4.0 > > > Test > caseintegration.component.test_egress_fw_rules.TestEgressFWRules.test_04_1_egress_fr4 > (from nosetests) failed with below error > requests.packages.urllib3.connectionpool: INFO: Starting new HTTP connection > (1): 10.223.49.195 > requests.packages.urllib3.connectionpool: DEBUG: "GET > /client/api?signature=ylEuPgkfrfJfwrM8fLVEn7SaBNI%3D&apiKey=TKG3-LFUFTPhT_OQ9MPrEdI_UpDMgvR07w8NZCUhWlsIKeSPIrnKBNcn0UgWIPIQLhwcTYMD5jyVpJ7oMdc9GA&command=queryAsyncJobResult&response=json&jobid=42c474a9-a4eb-4b5f-8ea0-e46d332e62c5 > HTTP/1.1" 200 621 > test_04_1_egress_fr4 > (integration.component.test_egress_fw_rules.TestEgressFWRules): DEBUG: > Response : {jobprocstatus : 0, created : u'2014-05-07T18:10:06-0700', cmd : > u'org.apache.cloudstack.api.command.user.firewall.CreateEgressFirewallRuleCmd', > userid : u'b1d59b38-d616-11e3-a7c8-1a6f7bb0d0a8', jobstatus : 1, jobid : > u'42c474a9-a4eb-4b5f-8ea0-e46d332e62c5', jobresultcode : 0, jobresulttype : > u'object', jobresult : {networkid : u'72a5c1d3-4120-4139-bef9-4508268d8539', > protocol : u'icmp', fordisplay : True, cidrlist : u'10.1.1.0/24', tags : [], > icmptype : -1, state : u'Active', icmpcode : -1, id : > u'8b12a8ef-01e6-4dac-b995-1081dceffc2c'}, accountid : > u'b1d58e04-d616-11e3-a7c8-1a6f7bb0d0a8'} > test_04_1_egress_fr4 > (integration.component.test_egress_fw_rules.TestEgressFWRules): DEBUG: > ===Jobid:42c474a9-a4eb-4b5f-8ea0-e46d332e62c5 ; StartTime:Wed May 7 14:23:16 > 2014 ; EndTime:Wed May 7 14:23:22 2014 ; TotalTime:-5=== > test_04_1_egress_fr4 > (integration.component.test_egress_fw_rules.TestEgressFWRules): DEBUG: > Response : {jobprocstatus : 0, created : u'2014-05-07T18:10:06-0700', cmd : > u'org.apache.cloudstack.api.command.user.firewall.CreateEgressFirewallRuleCmd', > userid : u'b1d59b38-d616-11e3-a7c8-1a6f7bb0d0a8', jobstatus : 1, jobid : > u'42c474a9-a4eb-4b5f-8ea0-e46d332e62c5', jobresultcode : 0, jobresulttype : > u'object', jobresult : {networkid : u'72a5c1d3-4120-4139-bef9-4508268d8539', > protocol : u'icmp', fordisplay : True, cidrlist : u'10.1.1.0/24', tags : [], > icmptype : -1, state : u'Active', icmpcode : -1, id : > u'8b12a8ef-01e6-4dac-b995-1081dceffc2c'}, accountid : > u'b1d58e04-d616-11e3-a7c8-1a6f7bb0d0a8'} > test_04_1_egress_fr4 > (integration.component.test_egress_fw_rules.TestEgressFWRules): DEBUG: > Created rule=8b12a8ef-01e6-4dac-b995-1081dceffc2c > test_04_1_egress_fr4 > (integration.component.test_egress_fw_rules.TestEgressFWRules): CRITICAL: > EXCEPTION: test_04_1_egress_fr4: ['Traceback (most recent call last):\n', ' > File "/usr/local/lib/python2.7/unittest/case.py", line 318, in run\n > testMethod()\n', ' File > "/Repo_30X/ipcl/cloudstack/test/integration/component/test_egress_fw_rules.py", > line 542, in test_04_1_egress_fr4\n qresultset = > self.dbclient.execute("select purpose, traffic_type from firewall_rules where > uuid=\'%s\';" % self.egressruleid)\n', ' File > "/usr/local/lib/python2.7/site-packages/marvin/dbConnection.py", line 48, in > execute\n db=str(self.database))) as conn:\n', ' File > "/usr/local/lib/python2.7/site-packages/mysql/connector/__init__.py", line > 98, in connect\n return MySQLConnection(*args, **kwargs)\n', ' File > "/usr/local/lib/python2.7/site-packages/mysql/connector/connection.py", line > 118, in __init__\n self.connect(**kwargs)\n', ' File > "/usr/local/lib/python2.7/site-packages/mysql/connector/connection.py", line > 382, in connect\n self._open_connection()\n', ' File > "/usr/local/lib/python2.7/site-packages/mysql/connector/connection.py", line > 349, in _open_connection\n self._ssl)\n', ' File > "/usr/local/lib/python2.7/site-packages/mysql/connector/connection.py", line > 176, in _do_auth\n raise errors.get_exception(packet)\n', > "ProgrammingError: 1045 (28000): Access denied for user > 'root'@'10.223.240.194' (using password: YES)\n"] > --------------------- >> end captured logging << --------------------- > Stacktrace > File "/usr/local/lib/python2.7/unittest/case.py", line 318, in run > testMethod() > File > "/Repo_30X/ipcl/cloudstack/test/integration/component/test_egress_fw_rules.py", > line 542, in test_04_1_egress_fr4 > qresultset = self.dbclient.execute("select purpose, traffic_type from > firewall_rules where uuid='%s';" % self.egressruleid) > File "/usr/local/lib/python2.7/site-packages/marvin/dbConnection.py", line > 48, in execute > db=str(self.database))) as conn: > File "/usr/local/lib/python2.7/site-packages/mysql/connector/__init__.py", > line 98, in connect > return MySQLConnection(*args, **kwargs) > File > "/usr/local/lib/python2.7/site-packages/mysql/connector/connection.py", line > 118, in __init__ > self.connect(**kwargs) > File > "/usr/local/lib/python2.7/site-packages/mysql/connector/connection.py", line > 382, in connect > self._open_connection() > File > "/usr/local/lib/python2.7/site-packages/mysql/connector/connection.py", line > 349, in _open_connection > self._ssl) > File > "/usr/local/lib/python2.7/site-packages/mysql/connector/connection.py", line > 176, in _do_auth > raise errors.get_exception(packet) > '1045 (28000): Access denied for user \'root\'@\'10.223.240.194\' (using > password: YES)\n-------------------- >> begin captured stdout << > ---------------------\n=== TestName: test_04_1_egress_fr4 | Status : > EXCEPTION ===\n\n\n--------------------- >> end captured stdout << > ----------------------\n-------------------- >> begin captured logging << > --------------------\ntest_04_1_egress_fr4 > (integration.component.test_egress_fw_rules.TestEgressFWRules): DEBUG: > \n\n::::::::::::STARTED : TC: test_04_1_egress_fr4 > :::::::::::\ntest_04_1_egress_fr4 > (integration.component.test_egress_fw_rules.TestEgressFWRules): DEBUG: > Payload: {\'serviceproviderlist[5].provider\': \'VirtualRouter\', > \'egressdefaultpolicy\': \'false\', \'apiKey\': > u\'TKG3-LFUFTPhT_OQ9MPrEdI_UpDMgvR07w8NZCUhWlsIKeSPIrnKBNcn0UgWIPIQLhwcTYMD5jyVpJ7oMdc9GA\', > \'servicecapabilitylist[0].service\': \'SourceNat\', > \'serviceproviderlist[4].service\': \'Firewall\', \'signature\': > \'9zoChsUUdtriuO/Qr8IxMMqHbM8=\', \'serviceproviderlist[8].service\': > \'StaticNat\', \'supportedservices\': > \'Dhcp,Dns,SourceNat,PortForwarding,Vpn,Firewall,Lb,UserData,StaticNat\', > \'traffictype\': \'GUEST\', \'serviceproviderlist[5].service\': \'Dhcp\', > \'servicecapabilitylist[1].service\': \'SourceNat\', \'displaytext\': > \'Network offering-VR services-847CXO\', \'specifyVlan\': \'False\', > \'serviceproviderlist[4].provider\': \'VirtualRouter\', > \'serviceproviderlist[1].provider\': \'VirtualRouter\', > \'serviceproviderlist[6].provider\': \'VirtualRouter\', > test case trying execute below command; but its failed > 532 @attr(tags=["advanced", "selfservice"]) > 533 def test_04_1_egress_fr4(self): > 534 """Test Create Egress rule and check the Firewall_Rules DB table > 535 """ > 536 # Validate the following: > 537 # 1. deploy VM using network offering with egress policy false. > 538 # 2. create egress rule with specific CIDR + port range. > 539 # 3. check the table Firewall_Rules, Firewall and Traffic_type > should be "Egress". > 540 self.create_vm(egress_policy=False) > 541 self.createEgressRule() > 542 qresultset = self.dbclient.execute("select purpose, traffic_type > from firewall_rules where uuid='%s';" % self.egressruleid) > -- This message was sent by Atlassian JIRA (v6.2#6252)