** Changed in: neutron
       Status: Fix Committed => Fix Released

** Changed in: neutron
    Milestone: None => kilo-1

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1381379

Title:
  Using postgresql  and creating a security group rule with protocol
  value as integer getting  DBAPIError exception

Status in OpenStack Neutron (virtual network service):
  Fix Released
Status in neutron juno series:
  Fix Released

Bug description:
  Using postgressql  and creating a scurity group rule protocol value as
  integer getting error DBAPIError exception wrapped from operator does
  not exist.

  Running the jenkins :check-tempest-dsvm-ironic-pxe_ssh-postgres-nv
  fails

  Code :
  curl -i -X POST http://$Server_ip:9696/v2.0/security-group-rules.json -H 
"User-Agent: python-neutronclient" -H "X-Auth-Token: $TOKENID" -d 
'{"security_group_rule": {"ethertype": "IPv4", "direction": "ingress", 
"protocol": "17", "security_group_id": "$Security_goup_id"}}'

  
  Error in the log:
  2014-10-15 06:24:22.756 23647 DEBUG neutron.policy 
[req-4e3855ad-ef66-4a63-b69d-7351d4a1a4b3 None] Enforcing rules: 
['create_security_group_rule'] _build_match_rule 
/opt/stack/new/neutron/neutron/policy.py:221
  2014-10-15 06:24:22.774 23647 ERROR oslo.db.sqlalchemy.exc_filters 
[req-4e3855ad-ef66-4a63-b69d-7351d4a1a4b3 ] DBAPIError exception wrapped from 
(ProgrammingError) operator does not exist: character varying = integer
  LINE 3: ...on IN ('ingress') AND securitygrouprules.protocol IN (17) AN...
                                                               ^
  HINT:  No operator matches the given name and argument type(s). You might 
need to add explicit type casts.
   'SELECT securitygrouprules.tenant_id AS securitygrouprules_tenant_id, 
securitygrouprules.id AS securitygrouprules_id, 
securitygrouprules.security_group_id AS securitygrouprules_security_group_id, 
securitygrouprules.remote_group_id AS securitygrouprules_remote_group_id, 
securitygrouprules.direction AS securitygrouprules_direction, 
securitygrouprules.ethertype AS securitygrouprules_ethertype, 
securitygrouprules.protocol AS securitygrouprules_protocol, 
securitygrouprules.port_range_min AS securitygrouprules_port_range_min, 
securitygrouprules.port_range_max AS securitygrouprules_port_range_max, 
securitygrouprules.remote_ip_prefix AS securitygrouprules_remote_ip_prefix 
\nFROM securitygrouprules \nWHERE securitygrouprules.tenant_id = 
%(tenant_id_1)s AND securitygrouprules.tenant_id IN (%(tenant_id_2)s) AND 
securitygrouprules.direction IN (%(direction_1)s) AND 
securitygrouprules.protocol IN (%(protocol_1)s) AND 
securitygrouprules.ethertype IN (%(ethertype_1)s) AND securitygrouprules.secu
 rity_group_id IN (%(security_group_id_1)s)' {'direction_1': u'ingress', 
'tenant_id_2': u'a0ec4b20678a472ebbab28526cb53fef', 'ethertype_1': 'IPv4', 
'protocol_1': 17, 'tenant_id_1': u'a0ec4b20678a472ebbab28526cb53fef', 
'security_group_id_1': u'e9936f7a-00dd-4afe-9871-f1ab21fe7ea4'}
  2014-10-15 06:24:22.774 23647 TRACE oslo.db.sqlalchemy.exc_filters Traceback 
(most recent call last):
  2014-10-15 06:24:22.774 23647 TRACE oslo.db.sqlalchemy.exc_filters   File 
"/usr/local/lib/python2.7/dist-packages/oslo/db/sqlalchemy/compat/handle_error.py",
 line 59, in _handle_dbapi_exception
  2014-10-15 06:24:22.774 23647 TRACE oslo.db.sqlalchemy.exc_filters     e, 
statement, parameters, cursor, context)
  2014-10-15 06:24:22.774 23647 TRACE oslo.db.sqlalchemy.exc_filters   File 
"/usr/lib/python2.7/dist-packages/sqlalchemy/engine/base.py", line 1024, in 
_handle_dbapi_exception
  2014-10-15 06:24:22.774 23647 TRACE oslo.db.sqlalchemy.exc_filters     
exc_info
  2014-10-15 06:24:22.774 23647 TRACE oslo.db.sqlalchemy.exc_filters   File 
"/usr/lib/python2.7/dist-packages/sqlalchemy/util/compat.py", line 196, in 
raise_from_cause
  2014-10-15 06:24:22.774 23647 TRACE oslo.db.sqlalchemy.exc_filters     
reraise(type(exception), exception, tb=exc_tb)
  2014-10-15 06:24:22.774 23647 TRACE oslo.db.sqlalchemy.exc_filters   File 
"/usr/lib/python2.7/dist-packages/sqlalchemy/engine/base.py", line 867, in 
_execute_context
  2014-10-15 06:24:22.774 23647 TRACE oslo.db.sqlalchemy.exc_filters     
context)
  2014-10-15 06:24:22.774 23647 TRACE oslo.db.sqlalchemy.exc_filters   File 
"/usr/lib/python2.7/dist-packages/sqlalchemy/engine/default.py", line 324, in 
do_execute
  2014-10-15 06:24:22.774 23647 TRACE oslo.db.sqlalchemy.exc_filters     
cursor.execute(statement, parameters)
  2014-10-15 06:24:22.774 23647 TRACE oslo.db.sqlalchemy.exc_filters 
ProgrammingError: (ProgrammingError) operator does not exist: character varying 
= integer
  2014-10-15 06:24:22.774 23647 TRACE oslo.db.sqlalchemy.exc_filters LINE 3: 
...on IN ('ingress') AND securitygrouprules.protocol IN (17) AN...
  2014-10-15 06:24:22.774 23647 TRACE oslo.db.sqlalchemy.exc_filters            
                                                  ^
  2014-10-15 06:24:22.774 23647 TRACE oslo.db.sqlalchemy.exc_filters HINT:  No 
operator matches the given name and argument type(s). You might need to add 
explicit type casts.
  2014-10-15 06:24:22.774 23647 TRACE oslo.db.sqlalchemy.exc_filters  'SELECT 
securitygrouprules.tenant_id AS securitygrouprules_tenant_id, 
securitygrouprules.id AS securitygrouprules_id, 
securitygrouprules.security_group_id AS securitygrouprules_security_group_id, 
securitygrouprules.remote_group_id AS securitygrouprules_remote_group_id, 
securitygrouprules.direction AS securitygrouprules_direction, 
securitygrouprules.ethertype AS securitygrouprules_ethertype, 
securitygrouprules.protocol AS securitygrouprules_protocol, 
securitygrouprules.port_range_min AS securitygrouprules_port_range_min, 
securitygrouprules.port_range_max AS securitygrouprules_port_range_max, 
securitygrouprules.remote_ip_prefix AS securitygrouprules_remote_ip_prefix 
\nFROM securitygrouprules \nWHERE securitygrouprules.tenant_id = 
%(tenant_id_1)s AND securitygrouprules.tenant_id IN (%(tenant_id_2)s) AND 
securitygrouprules.direction IN (%(direction_1)s) AND 
securitygrouprules.protocol IN (%(protocol_1)s) AND securitygr
 ouprules.ethertype IN (%(ethertype_1)s) AND 
securitygrouprules.security_group_id IN (%(security_group_id_1)s)' 
{'direction_1': u'ingress', 'tenant_id_2': u'a0ec4b20678a472ebbab28526cb53fef', 
'ethertype_1': 'IPv4', 'protocol_1': 17, 'tenant_id_1': 
u'a0ec4b20678a472ebbab28526cb53fef', 'security_group_id_1': 
u'e9936f7a-00dd-4afe-9871-f1ab21fe7ea4'}
  2014-10-15 06:24:22.774 23647 TRACE oslo.db.sqlalchemy.exc_filters 
  2014-10-15 06:24:22.776 23647 ERROR neutron.api.v2.resource 
[req-4e3855ad-ef66-4a63-b69d-7351d4a1a4b3 None] create failed

  Logs link:

  http://logs.openstack.org/54/107654/4/check/check-tempest-dsvm-ironic-
  pxe_ssh-postgres-
  nv/18b3c09/logs/screen-q-svc.txt.gz#_2014-10-15_06_24_22_774

  http://logs.openstack.org/54/107654/4/check/check-tempest-dsvm-ironic-
  pxe_ssh-postgres-nv/18b3c09/logs/

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1381379/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to     : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp

Reply via email to