[ 
https://issues.apache.org/jira/browse/CLOUDSTACK-6612?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14016295#comment-14016295
 ] 

Girish Shilamkar commented on CLOUDSTACK-6612:
----------------------------------------------

I see the same failure in other test suites test_snapshot_limits.py and 
test_snapshot_gc.py. And the failures are seen only in KVM and not VMware. Can 
you please check if you can login to the database manually with the password 
provided in the config file?

The test code is same for all hypervisors here.

> [Automation] Test cases failing with db connection error 
> ---------------------------------------------------------
>
>                 Key: CLOUDSTACK-6612
>                 URL: https://issues.apache.org/jira/browse/CLOUDSTACK-6612
>             Project: CloudStack
>          Issue Type: Test
>      Security Level: Public(Anyone can view this level - this is the 
> default.) 
>          Components: Automation
>    Affects Versions: 4.4.0
>            Reporter: Rayees Namathponnan
>            Assignee: Gaurav Aradhye
>            Priority: Critical
>             Fix For: 4.4.0
>
>
> Test 
> caseintegration.component.test_egress_fw_rules.TestEgressFWRules.test_04_1_egress_fr4
>  (from nosetests) failed with below error 
> requests.packages.urllib3.connectionpool: INFO: Starting new HTTP connection 
> (1): 10.223.49.195
> requests.packages.urllib3.connectionpool: DEBUG: "GET 
> /client/api?signature=ylEuPgkfrfJfwrM8fLVEn7SaBNI%3D&apiKey=TKG3-LFUFTPhT_OQ9MPrEdI_UpDMgvR07w8NZCUhWlsIKeSPIrnKBNcn0UgWIPIQLhwcTYMD5jyVpJ7oMdc9GA&command=queryAsyncJobResult&response=json&jobid=42c474a9-a4eb-4b5f-8ea0-e46d332e62c5
>  HTTP/1.1" 200 621
> test_04_1_egress_fr4 
> (integration.component.test_egress_fw_rules.TestEgressFWRules): DEBUG: 
> Response : {jobprocstatus : 0, created : u'2014-05-07T18:10:06-0700', cmd : 
> u'org.apache.cloudstack.api.command.user.firewall.CreateEgressFirewallRuleCmd',
>  userid : u'b1d59b38-d616-11e3-a7c8-1a6f7bb0d0a8', jobstatus : 1, jobid : 
> u'42c474a9-a4eb-4b5f-8ea0-e46d332e62c5', jobresultcode : 0, jobresulttype : 
> u'object', jobresult : {networkid : u'72a5c1d3-4120-4139-bef9-4508268d8539', 
> protocol : u'icmp', fordisplay : True, cidrlist : u'10.1.1.0/24', tags : [], 
> icmptype : -1, state : u'Active', icmpcode : -1, id : 
> u'8b12a8ef-01e6-4dac-b995-1081dceffc2c'}, accountid : 
> u'b1d58e04-d616-11e3-a7c8-1a6f7bb0d0a8'}
> test_04_1_egress_fr4 
> (integration.component.test_egress_fw_rules.TestEgressFWRules): DEBUG: 
> ===Jobid:42c474a9-a4eb-4b5f-8ea0-e46d332e62c5 ; StartTime:Wed May  7 14:23:16 
> 2014 ; EndTime:Wed May  7 14:23:22 2014 ; TotalTime:-5===
> test_04_1_egress_fr4 
> (integration.component.test_egress_fw_rules.TestEgressFWRules): DEBUG: 
> Response : {jobprocstatus : 0, created : u'2014-05-07T18:10:06-0700', cmd : 
> u'org.apache.cloudstack.api.command.user.firewall.CreateEgressFirewallRuleCmd',
>  userid : u'b1d59b38-d616-11e3-a7c8-1a6f7bb0d0a8', jobstatus : 1, jobid : 
> u'42c474a9-a4eb-4b5f-8ea0-e46d332e62c5', jobresultcode : 0, jobresulttype : 
> u'object', jobresult : {networkid : u'72a5c1d3-4120-4139-bef9-4508268d8539', 
> protocol : u'icmp', fordisplay : True, cidrlist : u'10.1.1.0/24', tags : [], 
> icmptype : -1, state : u'Active', icmpcode : -1, id : 
> u'8b12a8ef-01e6-4dac-b995-1081dceffc2c'}, accountid : 
> u'b1d58e04-d616-11e3-a7c8-1a6f7bb0d0a8'}
> test_04_1_egress_fr4 
> (integration.component.test_egress_fw_rules.TestEgressFWRules): DEBUG: 
> Created rule=8b12a8ef-01e6-4dac-b995-1081dceffc2c
> test_04_1_egress_fr4 
> (integration.component.test_egress_fw_rules.TestEgressFWRules): CRITICAL: 
> EXCEPTION: test_04_1_egress_fr4: ['Traceback (most recent call last):\n', '  
> File "/usr/local/lib/python2.7/unittest/case.py", line 318, in run\n    
> testMethod()\n', '  File 
> "/Repo_30X/ipcl/cloudstack/test/integration/component/test_egress_fw_rules.py",
>  line 542, in test_04_1_egress_fr4\n    qresultset = 
> self.dbclient.execute("select purpose, traffic_type from firewall_rules where 
> uuid=\'%s\';" % self.egressruleid)\n', '  File 
> "/usr/local/lib/python2.7/site-packages/marvin/dbConnection.py", line 48, in 
> execute\n    db=str(self.database))) as conn:\n', '  File 
> "/usr/local/lib/python2.7/site-packages/mysql/connector/__init__.py", line 
> 98, in connect\n    return MySQLConnection(*args, **kwargs)\n', '  File 
> "/usr/local/lib/python2.7/site-packages/mysql/connector/connection.py", line 
> 118, in __init__\n    self.connect(**kwargs)\n', '  File 
> "/usr/local/lib/python2.7/site-packages/mysql/connector/connection.py", line 
> 382, in connect\n    self._open_connection()\n', '  File 
> "/usr/local/lib/python2.7/site-packages/mysql/connector/connection.py", line 
> 349, in _open_connection\n    self._ssl)\n', '  File 
> "/usr/local/lib/python2.7/site-packages/mysql/connector/connection.py", line 
> 176, in _do_auth\n    raise errors.get_exception(packet)\n', 
> "ProgrammingError: 1045 (28000): Access denied for user 
> 'root'@'10.223.240.194' (using password: YES)\n"]
> --------------------- >> end captured logging << ---------------------
> Stacktrace
>   File "/usr/local/lib/python2.7/unittest/case.py", line 318, in run
>     testMethod()
>   File 
> "/Repo_30X/ipcl/cloudstack/test/integration/component/test_egress_fw_rules.py",
>  line 542, in test_04_1_egress_fr4
>     qresultset = self.dbclient.execute("select purpose, traffic_type from 
> firewall_rules where uuid='%s';" % self.egressruleid)
>   File "/usr/local/lib/python2.7/site-packages/marvin/dbConnection.py", line 
> 48, in execute
>     db=str(self.database))) as conn:
>   File "/usr/local/lib/python2.7/site-packages/mysql/connector/__init__.py", 
> line 98, in connect
>     return MySQLConnection(*args, **kwargs)
>   File 
> "/usr/local/lib/python2.7/site-packages/mysql/connector/connection.py", line 
> 118, in __init__
>     self.connect(**kwargs)
>   File 
> "/usr/local/lib/python2.7/site-packages/mysql/connector/connection.py", line 
> 382, in connect
>     self._open_connection()
>   File 
> "/usr/local/lib/python2.7/site-packages/mysql/connector/connection.py", line 
> 349, in _open_connection
>     self._ssl)
>   File 
> "/usr/local/lib/python2.7/site-packages/mysql/connector/connection.py", line 
> 176, in _do_auth
>     raise errors.get_exception(packet)
> '1045 (28000): Access denied for user \'root\'@\'10.223.240.194\' (using 
> password: YES)\n-------------------- >> begin captured stdout << 
> ---------------------\n=== TestName: test_04_1_egress_fr4 | Status : 
> EXCEPTION ===\n\n\n--------------------- >> end captured stdout << 
> ----------------------\n-------------------- >> begin captured logging << 
> --------------------\ntest_04_1_egress_fr4 
> (integration.component.test_egress_fw_rules.TestEgressFWRules): DEBUG: 
> \n\n::::::::::::STARTED : TC: test_04_1_egress_fr4 
> :::::::::::\ntest_04_1_egress_fr4 
> (integration.component.test_egress_fw_rules.TestEgressFWRules): DEBUG: 
> Payload: {\'serviceproviderlist[5].provider\': \'VirtualRouter\', 
> \'egressdefaultpolicy\': \'false\', \'apiKey\': 
> u\'TKG3-LFUFTPhT_OQ9MPrEdI_UpDMgvR07w8NZCUhWlsIKeSPIrnKBNcn0UgWIPIQLhwcTYMD5jyVpJ7oMdc9GA\',
>  \'servicecapabilitylist[0].service\': \'SourceNat\', 
> \'serviceproviderlist[4].service\': \'Firewall\', \'signature\': 
> \'9zoChsUUdtriuO/Qr8IxMMqHbM8=\', \'serviceproviderlist[8].service\': 
> \'StaticNat\', \'supportedservices\': 
> \'Dhcp,Dns,SourceNat,PortForwarding,Vpn,Firewall,Lb,UserData,StaticNat\', 
> \'traffictype\': \'GUEST\', \'serviceproviderlist[5].service\': \'Dhcp\', 
> \'servicecapabilitylist[1].service\': \'SourceNat\', \'displaytext\': 
> \'Network offering-VR services-847CXO\', \'specifyVlan\': \'False\', 
> \'serviceproviderlist[4].provider\': \'VirtualRouter\', 
> \'serviceproviderlist[1].provider\': \'VirtualRouter\', 
> \'serviceproviderlist[6].provider\': \'VirtualRouter\', 
> test case trying execute below command; but its failed 
> 532     @attr(tags=["advanced", "selfservice"])
>  533     def test_04_1_egress_fr4(self):
>  534         """Test Create Egress rule and check the Firewall_Rules DB table
>  535         """
>  536         # Validate the following:
>  537         # 1. deploy VM using network offering with egress policy false.
>  538         # 2. create egress rule with specific CIDR + port range.
>  539         # 3. check the table Firewall_Rules, Firewall and Traffic_type 
> should be "Egress".
>  540         self.create_vm(egress_policy=False)
>  541         self.createEgressRule()
>  542         qresultset = self.dbclient.execute("select purpose, traffic_type 
> from firewall_rules where uuid='%s';" % self.egressruleid)
>   



--
This message was sent by Atlassian JIRA
(v6.2#6252)

Reply via email to