Rayees Namathponnan created CLOUDSTACK-5191:
-----------------------------------------------

             Summary: [Automation] test case 
TestRevokeEgressRule.test_revoke_egress_rule failed to ping outside and failed 
                 Key: CLOUDSTACK-5191
                 URL: https://issues.apache.org/jira/browse/CLOUDSTACK-5191
             Project: CloudStack
          Issue Type: Test
      Security Level: Public (Anyone can view this level - this is the default.)
          Components: Automation
    Affects Versions: 4.3.0
            Reporter: Rayees Namathponnan
             Fix For: 4.3.0


Test case 
integration.component.test_egress_rules.TestRevokeEgressRule.test_revoke_egress_rule
 failed in KVM basic zone setup 

Test cases failed while ping outside from VM, observed below error in log

Stacktrace

  File "/usr/local/lib/python2.7/unittest/case.py", line 318, in run
    testMethod()
  File 
"/Repo_30X/ipcl/cloudstack/test/integration/component/test_egress_rules.py", 
line 1067, in test_revoke_egress_rule
    "Ping to outside world from VM should be successful"
  File "/usr/local/lib/python2.7/unittest/case.py", line 494, in assertEqual
    assertion_func(first, second, msg=msg)
  File "/usr/local/lib/python2.7/unittest/case.py", line 487, in 
_baseAssertEqual
    raise self.failureException(msg)
Ping to outside world from VM should be successful
-------------------- >> begin captured logging << --------------------
test_revoke_egress_rule 
(integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: Created 
security group with ID: 020865e7-d87b-4da9-b157-c315dc42e33d
test_revoke_egress_rule 
(integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: 
Authorizing ingress rule for sec group ID: 020865e7-d87b-4da9-b157-c315dc42e33d 
for ssh access
test_revoke_egress_rule 
(integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: 
Authorizing egress rule for sec group ID: 020865e7-d87b-4da9-b157-c315dc42e33d 
for ssh access
test_revoke_egress_rule 
(integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: 
Deploying VM in account: 
test-TestStartStopVMWithEgressRule-test_multiple_account_egress_rule_negative-Q4UAPL
test_revoke_egress_rule 
(integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: SSH into 
VM: 10.223.250.230
sshClient: DEBUG: SSH Connection: Host:10.223.250.230 User:root                 
                  Port:22
sshClient: DEBUG: SSH Connection: Host:10.223.250.230 User:root                 
                  Port:22
sshClient: DEBUG: SSH Connection: Host:10.223.250.230 User:root                 
                  Port:22
sshClient: DEBUG: SSH Connection: Host:10.223.250.230 User:root                 
                  Port:22
paramiko.transport: DEBUG: starting thread (client mode): 0xd9d0ad0L
paramiko.transport: INFO: Connected (version 2.0, client OpenSSH_4.3)
paramiko.transport: DEBUG: kex algos:['diffie-hellman-group-exchange-sha1', 
'diffie-hellman-group14-sha1', 'diffie-hellman-group1-sha1'] server 
key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc', '3des-cbc', 
'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 
'aes192-cbc', 'aes256-cbc', 'rijndael-...@lysator.liu.se', 'aes128-ctr', 
'aes192-ctr', 'aes256-ctr'] server encrypt:['aes128-cbc', '3des-cbc', 
'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 
'aes192-cbc', 'aes256-cbc', 'rijndael-...@lysator.liu.se', 'aes128-ctr', 
'aes192-ctr', 'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1', 
'hmac-ripemd160', 'hmac-ripemd...@openssh.com', 'hmac-sha1-96', 'hmac-md5-96'] 
server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 
'hmac-ripemd...@openssh.com', 'hmac-sha1-96', 'hmac-md5-96'] client 
compress:['none', 'z...@openssh.com'] server compress:['none', 
'z...@openssh.com'] client lang:[''] server lang:[''] kex follows?False
paramiko.transport: DEBUG: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr
paramiko.transport: DEBUG: using kex diffie-hellman-group1-sha1; server key 
type ssh-rsa; cipher: local aes128-ctr, remote aes128-ctr; mac: local 
hmac-sha1, remote hmac-sha1; compression: local none, remote none
paramiko.transport: DEBUG: Switch to new keys ...
paramiko.transport: DEBUG: Adding ssh-rsa host key for 10.223.250.230: 
0f8b3ff9dc4dce10340227dab3cac032
paramiko.transport: DEBUG: Trying discovered key 
a0114fddd71936946702c57069b4175b in /root/.ssh/id_rsa
paramiko.transport: DEBUG: userauth is OK
paramiko.transport: INFO: Authentication (publickey) failed.
paramiko.transport: DEBUG: userauth is OK
paramiko.transport: INFO: Authentication (password) successful!
test_revoke_egress_rule 
(integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: Ping to 
google.com from VM
paramiko.transport: DEBUG: [chan 1] Max packet in: 34816 bytes
paramiko.transport: DEBUG: [chan 1] Max packet out: 32768 bytes
paramiko.transport: INFO: Secsh channel 1 opened.
paramiko.transport: DEBUG: [chan 1] Sesch channel 1 request ok
paramiko.transport: DEBUG: [chan 1] EOF received (1)
paramiko.transport: DEBUG: [chan 1] EOF sent (1)
sshClient: DEBUG: {Cmd: ping -c 1 www.google.com via Host: 10.223.250.230} 
{returns: ['PING www.google.com (74.125.239.49) 56(84) bytes of data.', '', 
'--- www.google.com ping statistics ---', '1 packets transmitted, 0 received, 
100% packet loss, time 0ms', '']}
test_revoke_egress_rule 
(integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: SSH 
result: ['PING www.google.com (74.125.239.49) 56(84) bytes of data.', '', '--- 
www.google.com ping statistics ---', '1 packets transmitted, 0 received, 100% 
packet loss, time 0ms', '']
test_revoke_egress_rule 
(integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: SSHing 
into management server from VM
paramiko.transport: DEBUG: [chan 2] Max packet in: 34816 bytes
paramiko.transport: DEBUG: [chan 2] Max packet out: 32768 bytes
paramiko.transport: INFO: Secsh channel 2 opened.
paramiko.transport: DEBUG: [chan 2] Sesch channel 2 request ok
paramiko.transport: DEBUG: [chan 2] EOF received (2)
sshClient: DEBUG: {Cmd: ssh root@192.168.100.21 via Host: 10.223.250.230} 
{returns: ['Pseudo-terminal will not be allocated because stdin is not a 
terminal.', 'ssh: connect to host 192.168.100.21 port 22: Connection timed 
out']}
test_revoke_egress_rule 
(integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: SSH 
result: ['Pseudo-terminal will not be allocated because stdin is not a 
terminal.', 'ssh: connect to host 192.168.100.21 port 22: Connection timed out']
test_revoke_egress_rule 
(integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: Revoke 
Egress Rule for Security Group 020865e7-d87b-4da9-b157-c315dc42e33d for 
account: 
test-TestStartStopVMWithEgressRule-test_multiple_account_egress_rule_negative-Q4UAPL
paramiko.transport: DEBUG: [chan 2] EOF sent (2)
test_revoke_egress_rule 
(integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: Revoke 
egress rule result: {success : True}
test_revoke_egress_rule 
(integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: SSH into 
VM: 10.223.250.230
sshClient: DEBUG: SSH Connection: Host:10.223.250.230 User:root                 
                  Port:22
paramiko.transport: DEBUG: starting thread (client mode): 0xd934d90L
paramiko.transport: INFO: Connected (version 2.0, client OpenSSH_4.3)
paramiko.transport: DEBUG: kex algos:['diffie-hellman-group-exchange-sha1', 
'diffie-hellman-group14-sha1', 'diffie-hellman-group1-sha1'] server 
key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc', '3des-cbc', 
'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 
'aes192-cbc', 'aes256-cbc', 'rijndael-...@lysator.liu.se', 'aes128-ctr', 
'aes192-ctr', 'aes256-ctr'] server encrypt:['aes128-cbc', '3des-cbc', 
'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 
'aes192-cbc', 'aes256-cbc', 'rijndael-...@lysator.liu.se', 'aes128-ctr', 
'aes192-ctr', 'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1', 
'hmac-ripemd160', 'hmac-ripemd...@openssh.com', 'hmac-sha1-96', 'hmac-md5-96'] 
server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 
'hmac-ripemd...@openssh.com', 'hmac-sha1-96', 'hmac-md5-96'] client 
compress:['none', 'z...@openssh.com'] server compress:['none', 
'z...@openssh.com'] client lang:[''] server lang:[''] kex follows?False
paramiko.transport: DEBUG: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr
paramiko.transport: DEBUG: using kex diffie-hellman-group1-sha1; server key 
type ssh-rsa; cipher: local aes128-ctr, remote aes128-ctr; mac: local 
hmac-sha1, remote hmac-sha1; compression: local none, remote none
paramiko.transport: DEBUG: Switch to new keys ...
paramiko.transport: DEBUG: Adding ssh-rsa host key for 10.223.250.230: 
0f8b3ff9dc4dce10340227dab3cac032
paramiko.transport: DEBUG: Trying discovered key 
a0114fddd71936946702c57069b4175b in /root/.ssh/id_rsa
paramiko.transport: DEBUG: userauth is OK
paramiko.transport: INFO: Authentication (publickey) failed.
paramiko.transport: DEBUG: userauth is OK
paramiko.transport: INFO: Authentication (password) successful!
paramiko.transport: DEBUG: EOF in transport thread
test_revoke_egress_rule 
(integration.component.test_egress_rules.TestRevokeEgressRule): DEBUG: Ping to 
google.com from VM
paramiko.transport: DEBUG: [chan 1] Max packet in: 34816 bytes
paramiko.transport: DEBUG: [chan 1] Max packet out: 32768 bytes
paramiko.transport: INFO: Secsh channel 1 opened.
paramiko.transport: DEBUG: [chan 1] Sesch channel 1 request ok
paramiko.transport: DEBUG: [chan 1] EOF received (1)
paramiko.transport: DEBUG: [chan 1] EOF sent (1)
sshClient: DEBUG: {Cmd: ping -c 1 www.google.com via Host: 10.223.250.230} 
{returns: ['PING www.google.com (74.125.239.48) 56(84) bytes of data.', '', 
'--- www.google.com ping statistics ---', '1 packets transmitted, 0 received, 
100% packet loss, time 0ms', '']}
--------------------- >> end captured logging << ---------------------
 Help us localize this page



--
This message was sent by Atlassian JIRA
(v6.1#6144)

Reply via email to