Rayees Namathponnan created CLOUDSTACK-5191: -----------------------------------------------
Summary: [Automation] test case TestRevokeEgressRule.test_revoke_egress_rule failed to ping outside and failed Key: CLOUDSTACK-5191 URL: https://issues.apache.org/jira/browse/CLOUDSTACK-5191 Project: CloudStack Issue Type: Test Security Level: Public (Anyone can view this level - this is the default.) Components: Automation Affects Versions: 4.3.0 Reporter: Rayees Namathponnan Fix For: 4.3.0 Test case integration.component.test_egress_rules.TestRevokeEgressRule.test_revoke_egress_rule failed in KVM basic zone setup Test cases failed while ping outside from VM, observed below error in log Stacktrace File "/usr/local/lib/python2.7/unittest/case.py", line 318, in run testMethod() File "/Repo_30X/ipcl/cloudstack/test/integration/component/test_egress_rules.py", line 1067, in test_revoke_egress_rule "Ping to outside world from VM should be successful" File "/usr/local/lib/python2.7/unittest/case.py", line 494, in assertEqual assertion_func(first, second, msg=msg) File "/usr/local/lib/python2.7/unittest/case.py", line 487, in _baseAssertEqual raise self.failureException(msg) Ping to outside world from VM should be successful -------------------- >> begin captured logging << -------------------- test_revoke_egress_rule (integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: Created security group with ID: 020865e7-d87b-4da9-b157-c315dc42e33d test_revoke_egress_rule (integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: Authorizing ingress rule for sec group ID: 020865e7-d87b-4da9-b157-c315dc42e33d for ssh access test_revoke_egress_rule (integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: Authorizing egress rule for sec group ID: 020865e7-d87b-4da9-b157-c315dc42e33d for ssh access test_revoke_egress_rule (integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: Deploying VM in account: test-TestStartStopVMWithEgressRule-test_multiple_account_egress_rule_negative-Q4UAPL test_revoke_egress_rule (integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: SSH into VM: 10.223.250.230 sshClient: DEBUG: SSH Connection: Host:10.223.250.230 User:root Port:22 sshClient: DEBUG: SSH Connection: Host:10.223.250.230 User:root Port:22 sshClient: DEBUG: SSH Connection: Host:10.223.250.230 User:root Port:22 sshClient: DEBUG: SSH Connection: Host:10.223.250.230 User:root Port:22 paramiko.transport: DEBUG: starting thread (client mode): 0xd9d0ad0L paramiko.transport: INFO: Connected (version 2.0, client OpenSSH_4.3) paramiko.transport: DEBUG: kex algos:['diffie-hellman-group-exchange-sha1', 'diffie-hellman-group14-sha1', 'diffie-hellman-group1-sha1'] server key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc', '3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 'aes192-cbc', 'aes256-cbc', 'rijndael-...@lysator.liu.se', 'aes128-ctr', 'aes192-ctr', 'aes256-ctr'] server encrypt:['aes128-cbc', '3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 'aes192-cbc', 'aes256-cbc', 'rijndael-...@lysator.liu.se', 'aes128-ctr', 'aes192-ctr', 'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 'hmac-ripemd...@openssh.com', 'hmac-sha1-96', 'hmac-md5-96'] server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 'hmac-ripemd...@openssh.com', 'hmac-sha1-96', 'hmac-md5-96'] client compress:['none', 'z...@openssh.com'] server compress:['none', 'z...@openssh.com'] client lang:[''] server lang:[''] kex follows?False paramiko.transport: DEBUG: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr paramiko.transport: DEBUG: using kex diffie-hellman-group1-sha1; server key type ssh-rsa; cipher: local aes128-ctr, remote aes128-ctr; mac: local hmac-sha1, remote hmac-sha1; compression: local none, remote none paramiko.transport: DEBUG: Switch to new keys ... paramiko.transport: DEBUG: Adding ssh-rsa host key for 10.223.250.230: 0f8b3ff9dc4dce10340227dab3cac032 paramiko.transport: DEBUG: Trying discovered key a0114fddd71936946702c57069b4175b in /root/.ssh/id_rsa paramiko.transport: DEBUG: userauth is OK paramiko.transport: INFO: Authentication (publickey) failed. paramiko.transport: DEBUG: userauth is OK paramiko.transport: INFO: Authentication (password) successful! test_revoke_egress_rule (integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: Ping to google.com from VM paramiko.transport: DEBUG: [chan 1] Max packet in: 34816 bytes paramiko.transport: DEBUG: [chan 1] Max packet out: 32768 bytes paramiko.transport: INFO: Secsh channel 1 opened. paramiko.transport: DEBUG: [chan 1] Sesch channel 1 request ok paramiko.transport: DEBUG: [chan 1] EOF received (1) paramiko.transport: DEBUG: [chan 1] EOF sent (1) sshClient: DEBUG: {Cmd: ping -c 1 www.google.com via Host: 10.223.250.230} {returns: ['PING www.google.com (74.125.239.49) 56(84) bytes of data.', '', '--- www.google.com ping statistics ---', '1 packets transmitted, 0 received, 100% packet loss, time 0ms', '']} test_revoke_egress_rule (integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: SSH result: ['PING www.google.com (74.125.239.49) 56(84) bytes of data.', '', '--- www.google.com ping statistics ---', '1 packets transmitted, 0 received, 100% packet loss, time 0ms', ''] test_revoke_egress_rule (integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: SSHing into management server from VM paramiko.transport: DEBUG: [chan 2] Max packet in: 34816 bytes paramiko.transport: DEBUG: [chan 2] Max packet out: 32768 bytes paramiko.transport: INFO: Secsh channel 2 opened. paramiko.transport: DEBUG: [chan 2] Sesch channel 2 request ok paramiko.transport: DEBUG: [chan 2] EOF received (2) sshClient: DEBUG: {Cmd: ssh root@192.168.100.21 via Host: 10.223.250.230} {returns: ['Pseudo-terminal will not be allocated because stdin is not a terminal.', 'ssh: connect to host 192.168.100.21 port 22: Connection timed out']} test_revoke_egress_rule (integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: SSH result: ['Pseudo-terminal will not be allocated because stdin is not a terminal.', 'ssh: connect to host 192.168.100.21 port 22: Connection timed out'] test_revoke_egress_rule (integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: Revoke Egress Rule for Security Group 020865e7-d87b-4da9-b157-c315dc42e33d for account: test-TestStartStopVMWithEgressRule-test_multiple_account_egress_rule_negative-Q4UAPL paramiko.transport: DEBUG: [chan 2] EOF sent (2) test_revoke_egress_rule (integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: Revoke egress rule result: {success : True} test_revoke_egress_rule (integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: SSH into VM: 10.223.250.230 sshClient: DEBUG: SSH Connection: Host:10.223.250.230 User:root Port:22 paramiko.transport: DEBUG: starting thread (client mode): 0xd934d90L paramiko.transport: INFO: Connected (version 2.0, client OpenSSH_4.3) paramiko.transport: DEBUG: kex algos:['diffie-hellman-group-exchange-sha1', 'diffie-hellman-group14-sha1', 'diffie-hellman-group1-sha1'] server key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc', '3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 'aes192-cbc', 'aes256-cbc', 'rijndael-...@lysator.liu.se', 'aes128-ctr', 'aes192-ctr', 'aes256-ctr'] server encrypt:['aes128-cbc', '3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 'aes192-cbc', 'aes256-cbc', 'rijndael-...@lysator.liu.se', 'aes128-ctr', 'aes192-ctr', 'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 'hmac-ripemd...@openssh.com', 'hmac-sha1-96', 'hmac-md5-96'] server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 'hmac-ripemd...@openssh.com', 'hmac-sha1-96', 'hmac-md5-96'] client compress:['none', 'z...@openssh.com'] server compress:['none', 'z...@openssh.com'] client lang:[''] server lang:[''] kex follows?False paramiko.transport: DEBUG: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr paramiko.transport: DEBUG: using kex diffie-hellman-group1-sha1; server key type ssh-rsa; cipher: local aes128-ctr, remote aes128-ctr; mac: local hmac-sha1, remote hmac-sha1; compression: local none, remote none paramiko.transport: DEBUG: Switch to new keys ... paramiko.transport: DEBUG: Adding ssh-rsa host key for 10.223.250.230: 0f8b3ff9dc4dce10340227dab3cac032 paramiko.transport: DEBUG: Trying discovered key a0114fddd71936946702c57069b4175b in /root/.ssh/id_rsa paramiko.transport: DEBUG: userauth is OK paramiko.transport: INFO: Authentication (publickey) failed. paramiko.transport: DEBUG: userauth is OK paramiko.transport: INFO: Authentication (password) successful! paramiko.transport: DEBUG: EOF in transport thread test_revoke_egress_rule (integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: Ping to google.com from VM paramiko.transport: DEBUG: [chan 1] Max packet in: 34816 bytes paramiko.transport: DEBUG: [chan 1] Max packet out: 32768 bytes paramiko.transport: INFO: Secsh channel 1 opened. paramiko.transport: DEBUG: [chan 1] Sesch channel 1 request ok paramiko.transport: DEBUG: [chan 1] EOF received (1) paramiko.transport: DEBUG: [chan 1] EOF sent (1) sshClient: DEBUG: {Cmd: ping -c 1 www.google.com via Host: 10.223.250.230} {returns: ['PING www.google.com (74.125.239.48) 56(84) bytes of data.', '', '--- www.google.com ping statistics ---', '1 packets transmitted, 0 received, 100% packet loss, time 0ms', '']} --------------------- >> end captured logging << --------------------- Help us localize this page -- This message was sent by Atlassian JIRA (v6.1#6144)