Bug 1651432
Summary: | v2v - support for -insecure option to support OSP SSL connection for VM migrations | |||
---|---|---|---|---|
Product: | Red Hat Enterprise Linux 7 | Reporter: | Brett Thurber <bthurber> | |
Component: | libguestfs | Assignee: | Richard W.M. Jones <rjones> | |
Status: | CLOSED ERRATA | QA Contact: | Virtualization Bugs <virt-bugs> | |
Severity: | high | Docs Contact: | ||
Priority: | unspecified | |||
Version: | 7.7 | CC: | iovadia, juzhou, mxie, mzhan, ptoscano, rjones, tzheng, xiaodwan, zili | |
Target Milestone: | rc | |||
Target Release: | --- | |||
Hardware: | All | |||
OS: | Linux | |||
Whiteboard: | V2V | |||
Fixed In Version: | libguestfs-1.40.1-1.el7 | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | ||
Clone Of: | ||||
: | 1651500 (view as bug list) | Environment: | ||
Last Closed: | 2019-08-06 12:44:47 UTC | Type: | Bug | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: | ||||
Bug Depends On: | 1621895 | |||
Bug Blocks: | 1651500 |
Description
Brett Thurber
2018-11-20 04:55:21 UTC
v2 posted: https://www.redhat.com/archives/libguestfs/2018-November/msg00187.html In v2 the virt-v2v flag becomes: virt-v2v -o openstack -oo verify-server-certificate=false v3 which works slightly differently: https://www.redhat.com/archives/libguestfs/2018-November/msg00188.html This would be back to ‘-oo insecure’ as in v1. Upstream in: https://github.com/libguestfs/libguestfs/commit/07d1d946be16ba035ec1857c183635e2961aa506 https://github.com/libguestfs/libguestfs/commit/a4f83ee6a439024fbbf22a73fa08285033a8172e Note the wrapper will need to use: -oo verify-server-certificate=false Patch included in RHEL 7.6-LP libguestfs-1.38.2-12.el7_6.1.24.lp.el7 This bug will be fixed by the rebase scheduled for RHEL 7.7, see bug 1621895. Verified ======== CFME 5.10.0.32 libguestfs-1.38.2-12.28.lp.el7ev.x86_64 Test the bug with builds: virt-v2v-1.40.2-1.el7.x86_64 libguestfs-1.40.2-1.el7.x86_64 libvirt-4.5.0-10.el7_6.6.x86_64 qemu-kvm-rhev-2.12.0-18.el7_6.3.x86_64 nbdkit-1.8.0-1.el7.x86_64 Steps: 1.Check option -oo verify-server-certificate=false/true in virt-v2v man page #man virt-v2v .... -oo verify-server-certificate -oo verify-server-certificate="true|false" For -o openstack (virt-v2v-output-openstack(1)) only, this can be used to disable SSL certification validation when connecting to OpenStack by specifying -oo verify-server-certificate=false. 2.Install python2-openstackclient on the openstack guest where virt-v2v is running and copy keystone_admin from openstack root directory, then source keystone_admin #yum install python2-openstackclient #source keystone_admin 3.Convert a guest from VMware to openstack with option -oo verify-server-certificate=false 3.1 # virt-v2v -ic vpx://root.73.141/data/10.73.75.219/?no_verify=1 -it vddk -io vddk-libdir=/home/vmware-vix-disklib-distrib -io vddk-thumbprint=1F:97:34:5F:B6:C2:BA:66:46:CB:1A:71:76:7D:6B:50:1E:03:00:EA -n default esx6.7-rhel6.10-x86_64 --password-file /tmp/passwd -o openstack -oo server-id=rhel7.6-mxie -oo verify-server-certificate=false [ 1.8] Opening the source -i libvirt -ic vpx://root.73.141/data/10.73.75.219/?no_verify=1 esx6.7-rhel6.10-x86_64 -it vddk -io vddk-libdir=/home/vmware-vix-disklib-distrib -io vddk-thumbprint=1F:97:34:5F:B6:C2:BA:66:46:CB:1A:71:76:7D:6B:50:1E:03:00:EA [ 3.7] Creating an overlay to protect the source from being modified [ 7.2] Opening the overlay virt-v2v: error: libguestfs error: could not create appliance through libvirt. Try running qemu directly without libvirt using this environment variable: export LIBGUESTFS_BACKEND=direct Original error from libvirt: internal error: qemu unexpectedly closed the monitor: 2019-02-28 09:33:22.124+0000: Domain id=1 is tainted: custom-argv 2019-02-28T09:33:22.325340Z qemu-kvm: -drive file=/var/tmp/v2vovlfc2f94.qcow2,format=qcow2,if=none,id=drive-scsi0-0-0-0,cache=unsafe,copy-on-read=on,discard=unmap: Could not open backing file: Failed to connect socket /var/tmp/vddk.w8yiNg/nbdkit0.sock: Permission denied [code=1 int1=-1] If reporting bugs, run virt-v2v with debugging enabled and include the complete output: virt-v2v -v -x [...] 3.2 Set direct for LIBGUESTFS_BACKEND #export LIBGUESTFS_BACKEND=direct 3.3 # virt-v2v -ic vpx://root.73.141/data/10.73.75.219/?no_verify=1 -it vddk -io vddk-libdir=/home/vmware-vix-disklib-distrib -io vddk-thumbprint=1F:97:34:5F:B6:C2:BA:66:46:CB:1A:71:76:7D:6B:50:1E:03:00:EA -n default esx6.7-rhel6.10-x86_64 --password-file /tmp/passwd -o openstack -oo server-id=rhel7.6-mxie -oo verify-server-certificate=false [ 1.9] Opening the source -i libvirt -ic vpx://root.73.141/data/10.73.75.219/?no_verify=1 esx6.7-rhel6.10-x86_64 -it vddk -io vddk-libdir=/home/vmware-vix-disklib-distrib -io vddk-thumbprint=1F:97:34:5F:B6:C2:BA:66:46:CB:1A:71:76:7D:6B:50:1E:03:00:EA [ 3.8] Creating an overlay to protect the source from being modified [ 7.2] Opening the overlay [ 67.8] Inspecting the overlay [ 147.6] Checking for sufficient free disk space in the guest [ 147.6] Estimating space required on target for each disk [ 147.6] Converting Red Hat Enterprise Linux Server release 6.10 (Santiago) to run on KVM virt-v2v: warning: guest tools directory ‘linux/el6’ is missing from the virtio-win directory or ISO. Guest tools are only provided in the RHV Guest Tools ISO, so this can happen if you are using the version of virtio-win which contains just the virtio drivers. In this case only virtio drivers can be installed in the guest, and installation of Guest Tools will be skipped. virt-v2v: This guest has virtio drivers installed. [1995.2] Mapping filesystem data to avoid copying unused and blank areas [2008.6] Closing the overlay [2015.6] Assigning disks to buses [2015.7] Checking if the guest needs BIOS or UEFI to boot [2015.7] Initializing the target -o openstack Failed to set volume read-only access mode flag: Invalid volume: Volume 61573e31-de0f-4281-8a22-3fb4e48d2e37 status must be available to update readonly flag, but current status is: creating. (HTTP 400) (Request-ID: req-13356ac0-3cb1-4707-acae-e9adf0ddfc7a) [2048.5] Copying disk 1/1 to /dev/disk/by-id/virtio-61573e31-de0f-4281-8 (raw) (100.00/100%) [2434.6] Creating output metadata [2452.2] Finishing off 3.4 Launch the volume as instance in openstack GUI interface,, Check points for guest are passed 4.Convert a windows guest from VMware to openstack with option -oo verify-server-certificate=true 4.1 Also need to set direct for LIBGUESTFS_BACKEND #export LIBGUESTFS_BACKEND=direct 4.2 # virt-v2v -ic vpx://root.73.141/data/10.73.75.219/?no_verify=1 -it vddk -io vddk-libdir=/home/vmware-vix-disklib-distrib -io vddk-thumbprint=1F:97:34:5F:B6:C2:BA:66:46:CB:1A:71:76:7D:6B:50:1E:03:00:EA -n default esx6.7-win2016-x86_64 --password-file /tmp/passwd -o openstack -oo server-id=rhel7.6-mxie -oo verify-server-certificate=true -v -x |& tee > openstack_invalid_volume.log 4.3 Also there is error info "Failed to set volume...." # cat openstack_invalid_volume.log |grep -i "Failed to set" Failed to set volume read-only access mode flag: Invalid volume: Volume 009dc6bd-2f80-4ac3-b5e7-771863aca237 status must be available to update readonly flag, but current status is: creating. (HTTP 400) (Request-ID: req-6f56ce4c-249b-4112-9c52-dd91b7f5aae9) 4.4 Launch the volume as instance in openstack GUI interface, Check points for guest are passed 5.Convert a guest which has multiple disks from VMware to openstack with option -oo verify-server-certificate without value 5.1 # virt-v2v -ic vpx://root.73.141/data/10.73.75.219/?no_verify=1 -it vddk -io vddk-libdir=/home/vmware-vix-disklib-distrib -io vddk-thumbprint=1F:97:34:5F:B6:C2:BA:66:46:CB:1A:71:76:7D:6B:50:1E:03:00:EA -n default esx6.7-rhel7.5-multi-disks --password-file /tmp/passwd -o openstack -oo server-id=rhel7.6-mxie -oo verify-server-certificate [ 11.6] Opening the source -i libvirt -ic vpx://root.73.141/data/10.73.75.219/?no_verify=1 esx6.7-rhel7.5-multi-disks -it vddk -io vddk-libdir=/home/vmware-vix-disklib-distrib -io vddk-thumbprint=1F:97:34:5F:B6:C2:BA:66:46:CB:1A:71:76:7D:6B:50:1E:03:00:EA [ 29.4] Creating an overlay to protect the source from being modified [ 56.6] Opening the overlay [ 237.1] Inspecting the overlay [ 357.7] Checking for sufficient free disk space in the guest [ 357.7] Estimating space required on target for each disk [ 357.7] Converting Red Hat Enterprise Linux Server 7.5 (Maipo) to run on KVM virt-v2v: warning: guest tools directory ‘linux/el7’ is missing from the virtio-win directory or ISO. Guest tools are only provided in the RHV Guest Tools ISO, so this can happen if you are using the version of virtio-win which contains just the virtio drivers. In this case only virtio drivers can be installed in the guest, and installation of Guest Tools will be skipped. virt-v2v: This guest has virtio drivers installed. [3257.7] Mapping filesystem data to avoid copying unused and blank areas [3606.0] Closing the overlay [3651.5] Assigning disks to buses [3651.6] Checking if the guest needs BIOS or UEFI to boot [3651.7] Initializing the target -o openstack Failed to set volume read-only access mode flag: Invalid volume: Volume 80021cbb-0af8-4452-9d89-e7ce3ca3fa36 status must be available to update readonly flag, but current status is: creating. (HTTP 400) (Request-ID: req-63aecb91-8d2c-401d-8fca-52e4028a6e76) Failed to set volume read-only access mode flag: Invalid volume: Volume 90dbad02-ace1-451a-9932-3ec8cf0b2df7 status must be available to update readonly flag, but current status is: creating. (HTTP 400) (Request-ID: req-e9f64626-2f67-4847-a29e-9df12cbc2893) Failed to set volume read-only access mode flag: Invalid volume: Volume 610a9e95-b0eb-41a7-81e2-f32e57fc157d status must be available to update readonly flag, but current status is: creating. (HTTP 400) (Request-ID: req-0114cd46-97ba-45ee-9840-1acec94ab7c7) Failed to set volume read-only access mode flag: Invalid volume: Volume 923bac05-966a-4b7a-b832-d0904f5244c0 status must be available to update readonly flag, but current status is: creating. (HTTP 400) (Request-ID: req-c43d6eed-54aa-4cc6-939e-779ee6112699) [3817.5] Copying disk 1/4 to /dev/disk/by-id/virtio-80021cbb-0af8-4452-9 (raw) (100.00/100%) [4215.6] Copying disk 2/4 to /dev/disk/by-id/virtio-90dbad02-ace1-451a-9 (raw) (100.00/100%) [4572.1] Copying disk 3/4 to /dev/disk/by-id/virtio-610a9e95-b0eb-41a7-8 (raw) (100.00/100%) [5066.0] Copying disk 4/4 to /dev/disk/by-id/virtio-923bac05-966a-4b7a-b (raw) (100.00/100%) [5535.3] Creating output metadata [5592.5] Finishing off 5.2 Launch the volume as instance in openstack GUI interface, Check points for guest are passed 6.Convert a guest s from VMware to openstack with option -oo verify-server-certificate with wrong value # virt-v2v -ic vpx://root.73.141/data/10.73.75.219/?no_verify=1 -it vddk -io vddk-libdir=/home/vmware-vix-disklib-distrib -io vddk-thumbprint=1F:97:34:5F:B6:C2:BA:66:46:CB:1A:71:76:7D:6B:50:1E:03:00:EA -n default esx6.7-win2016-x86_64 --password-file /tmp/passwd -o openstack -oo server-id=rhel7.6-mxie -oo verify-server-certificate=wrong virt-v2v: error: internal error: invalid argument: bool_of_string If reporting bugs, run virt-v2v with debugging enabled and include the complete output: virt-v2v -v -x [...] Hi rjones, "-o openstack" conversion can be finished successfully with -oo verify-server-certificate=true/false/empty, but I have some questions: 1.Need to set environment variable "export LIBGUESTFS_BACKEND=direct" during -o openstack conversion, is it expected result as v2v doesn't need to set this during -o glance conversion ? 2.Will show below info during -o openstack conversion no matter if adding option verify-server-certificate, pls help to check the log "openstack_invalid_volume" "Failed to set volume read-only access mode flag: Invalid volume: Volume 80021cbb-0af8-4452-9d89-e7ce3ca3fa36 status must be available to update readonly flag, but current status is: creating. (HTTP 400) (Request-ID: req-63aecb91-8d2c-401d-8fca-52e4028a6e76) 3.Check"-oo verify-server-certificate" option in v2v man page, there are two lines but the first line seems unnecessary. Because -oo verify-server-certificate=true is default option (the default is to verify the server certificate), but I didn't find relevant illustration, I think adding this in second line would be more easier to understand for customer. #man virt-v2v .... -oo verify-server-certificate -oo verify-server-certificate="true|false" Thanks > 1.Need to set environment variable "export LIBGUESTFS_BACKEND=direct" during -o openstack conversion, is it expected result as v2v doesn't need to set this during -o glance conversion ? No this is a bug, but please file it separately. > 2.Will show below info during -o openstack conversion no matter if adding option verify-server-certificate, pls help to check the log "openstack_invalid_volume" "Failed to set volume read-only access mode flag: Invalid volume: Volume 80021cbb-0af8-4452-9d89-e7ce3ca3fa36 status must be available to update readonly flag, but current status is: creating. (HTTP 400) (Request-ID: req-63aecb91-8d2c-401d-8fca-52e4028a6e76) This is also a new bug. > 3.Check"-oo verify-server-certificate" option in v2v man page, there are two lines but the first line seems unnecessary. Because -oo verify-server-certificate=true is default option (the default is to verify the server certificate), but I didn't find relevant illustration, I think adding this in second line would be more easier to understand for customer. This seems fine to me. Using -oo verify-server-certificate sets the flag to true. That may be the default, but someone might prefer to set it explicitly. (In reply to Richard W.M. Jones from comment #12) > > 1.Need to set environment variable "export LIBGUESTFS_BACKEND=direct" during -o openstack conversion, is it expected result as v2v doesn't need to set this during -o glance conversion ? > > No this is a bug, but please file it separately. Sorry, I didn't describe the problem clearly. If convert a guest to glance on v2v conversion server which is not conversion appliance on openstack, there is no need to set environment variable "export LIBGUESTFS_BACKEND=direct" during conversion But if convert a guest to glance by v2v conversion server which is conversion appliance on openstack, need to set environment variable "export LIBGUESTFS_BACKEND=direct" during conversion If convert a guest to openstack by v2v conversion server which is conversion appliance on openstack, need to set environment variable "export LIBGUESTFS_BACKEND=direct" during conversion whatever verify-server-certificate sets > > 2.Will show below info during -o openstack conversion no matter if adding option verify-server-certificate, pls help to check the log "openstack_invalid_volume" > "Failed to set volume read-only access mode flag: Invalid volume: Volume > 80021cbb-0af8-4452-9d89-e7ce3ca3fa36 status must be available to update > readonly flag, but current status is: creating. (HTTP 400) (Request-ID: > req-63aecb91-8d2c-401d-8fca-52e4028a6e76) > > This is also a new bug. Already filed bug1685081 for this issue (In reply to mxie from comment #13) > (In reply to Richard W.M. Jones from comment #12) > > > 1.Need to set environment variable "export LIBGUESTFS_BACKEND=direct" during -o openstack conversion, is it expected result as v2v doesn't need to set this during -o glance conversion ? > > > > No this is a bug, but please file it separately. > > Sorry, I didn't describe the problem clearly. > > If convert a guest to glance on v2v conversion server which is not > conversion appliance on openstack, there is no need to set environment > variable "export LIBGUESTFS_BACKEND=direct" during conversion > > But if convert a guest to glance by v2v conversion server which is > conversion appliance on openstack, need to set environment variable "export > LIBGUESTFS_BACKEND=direct" during conversion > > If convert a guest to openstack by v2v conversion server which is conversion > appliance on openstack, need to set environment variable "export > LIBGUESTFS_BACKEND=direct" during conversion whatever > verify-server-certificate sets Any time you have to set LIBGUESTFS_BACKEND=direct to make a conversion succeed, it's a bug. (We already have a few of these bugs so try not duplicate ones we might already have!) > > If convert a guest to glance on v2v conversion server which is not > > conversion appliance on openstack, there is no need to set environment > > variable "export LIBGUESTFS_BACKEND=direct" during conversion > > > > But if convert a guest to glance by v2v conversion server which is > > conversion appliance on openstack, need to set environment variable "export > > LIBGUESTFS_BACKEND=direct" during conversion > > > > If convert a guest to openstack by v2v conversion server which is conversion > > appliance on openstack, need to set environment variable "export > > LIBGUESTFS_BACKEND=direct" during conversion whatever > > verify-server-certificate sets > Any time you have to set LIBGUESTFS_BACKEND=direct to make a conversion > succeed, > it's a bug. (We already have a few of these bugs so try not duplicate ones > we > might already have!) I think the problem is duplicated with bug1632231 due to below reasons 1.If convert a guest to glance/openstack on v2v conversion appliance of openstack without vddk, there is no need to set environment variable "export LIBGUESTFS_BACKEND=direct" during conversion whatever 2.If disable selinux on v2v conversion appliance of openstack to convert a guest to glance/openstack, also don't need to set environment variable "export LIBGUESTFS_BACKEND=direct" during conversion whatever I don't think so. Just because the error message is superficially the same doesn't mean it's the same bug. We will need a new bug filed, and both the full debug log from virt-v2v and the SELinux audit messages. (In reply to Richard W.M. Jones from comment #16) > I don't think so. Just because the error message is superficially the same > doesn't > mean it's the same bug. We will need a new bug filed, and both the full > debug log > from virt-v2v and the SELinux audit messages. Thanks,filed bug1698437 to track this problem Verify the bug with builds: virt-v2v-1.40.2-2.el7.x86_64 libguestfs-1.40.2-2.el7.x86_64 libguestfs-winsupport-7.2-3.el7.x86_64 libvirt-4.5.0-12.el7.x86_64 qemu-kvm-rhev-2.12.0-26.el7.x86_64 nbdkit-1.8.0-1.el7.x86_64 virtio-win-1.9.7-0.el7.noarch Steps: 1.Check option -oo verify-server-certificate=false/true in virt-v2v man page #man virt-v2v .... -oo verify-server-certificate -oo verify-server-certificate="true|false" For -o openstack (virt-v2v-output-openstack(1)) only, this can be used to disable SSL certification validation when connecting to OpenStack by specifying -oo verify-server-certificate=false. #man virt-v2v-output-openstack .... OpenStack: Ignore server certificate Using -oo verify-server-certificate=false you can tell the openstack client to ignore the server certificate when connecting to the OpenStack API endpoints. This has the same effect as passing the --insecure option to the "openstack" command. .... 2.Prepare a conversion appliance which have installed python2-openstackclient and virt-v2v on openstack environment # openstack server list +--------------------------------------+-------------------------------+--------+-----------------------+-----------------------+-----------+ | ID | Name | Status | Networks | Image | Flavor | +--------------------------------------+-------------------------------+--------+-----------------------+-----------------------+-----------+ | ff074bf3-51ed-4897-9a81-2ba97a69d81e | rhel7.6-v2v-conversion-server | ACTIVE | public01=10.73.224.5 | esx6.7-rhel7.6-x86_64 | m1.medium | +--------------------------------------+-------------------------------+--------+-----------------------+-----------------------+-----------+ 3.Copy keystone_admin from openstack root directory to v2v conversion appliance, then source keystone_admin to authenticate with openstack #source keystone_admin 4.Convert a guest from Xen to openstack with option -oo verify-server-certificate=false 4.1 # virt-v2v -ic xen+ssh://root.3.21 xen-hvm-rhel7.6-x86_64 -o openstack -oo server-id=rhel7.6-v2v-conversion-server -oo verify-server-certificate=false # virt-v2v -ic xen+ssh://root.3.21 xen-hvm-rhel7.6-x86_64 -o openstack -oo server-id=rhel7.6-v2v-conversion-server -oo verify-server-certificate=false [ 3.2] Opening the source -i libvirt -ic xen+ssh://root.3.21 xen-hvm-rhel7.6-x86_64 [ 3.9] Creating an overlay to protect the source from being modified [ 5.0] Opening the overlay [ 60.8] Inspecting the overlay [ 144.9] Checking for sufficient free disk space in the guest [ 144.9] Estimating space required on target for each disk [ 144.9] Converting Red Hat Enterprise Linux Server 7.6 (Maipo) to run on KVM virt-v2v: warning: guest tools directory ‘linux/el7’ is missing from the virtio-win directory or ISO. Guest tools are only provided in the RHV Guest Tools ISO, so this can happen if you are using the version of virtio-win which contains just the virtio drivers. In this case only virtio drivers can be installed in the guest, and installation of Guest Tools will be skipped. virt-v2v: This guest has virtio drivers installed. [2552.7] Mapping filesystem data to avoid copying unused and blank areas [2573.3] Closing the overlay [2576.1] Assigning disks to buses [2576.1] Checking if the guest needs BIOS or UEFI to boot [2576.3] Initializing the target -o openstack Failed to set volume read-only access mode flag: Invalid volume: Volume 3f8f6672-9a1f-4f2b-b4a3-a909e3e46c44 status must be available to update readonly flag, but current status is: creating. (HTTP 400) (Request-ID: req-0868257a-246e-46c6-9f78-3a5212d7f314) [2599.9] Copying disk 1/1 to /dev/disk/by-id/virtio-3f8f6672-9a1f-4f2b-b (raw) (100.00/100%) [3191.7] Creating output metadata [3206.5] Finishing off 4.2 Launch the volume as instance on openstack webpage, Check points of guest are passed 5.Convert a windows guest from ova to openstack with option -oo verify-server-certificate=true 5.1# virt-v2v -i ova esx6.0-win2012r2-x86_64.ova -o openstack -oo server-id=rhel7.6-v2v-conversion-server -oo verify-server-certificate=true [ 2.0] Opening the source -i ova esx6.0-win2012r2-x86_64.ova virt-v2v: warning: making OVA directory public readable to work around libvirt bug https://bugzilla.redhat.com/1045069 [ 86.9] Creating an overlay to protect the source from being modified [ 87.8] Opening the overlay [ 145.6] Inspecting the overlay [ 186.4] Checking for sufficient free disk space in the guest [ 186.5] Estimating space required on target for each disk [ 186.5] Converting Windows Server 2012 R2 Standard to run on KVM virt-v2v: warning: /usr/share/virt-tools/pnp_wait.exe is missing. Firstboot scripts may conflict with PnP. virt-v2v: warning: there is no QXL driver for this version of Windows (6.3 x86_64). virt-v2v looks for this driver in /usr/share/virtio-win/virtio-win.iso The guest will be configured to use a basic VGA display driver. virt-v2v: This guest has virtio drivers installed. [ 361.6] Mapping filesystem data to avoid copying unused and blank areas [ 381.8] Closing the overlay [ 384.5] Assigning disks to buses [ 384.5] Checking if the guest needs BIOS or UEFI to boot [ 384.5] Initializing the target -o openstack Failed to set volume read-only access mode flag: Invalid volume: Volume 26d4d30e-2e08-46a4-b46f-a3bb8d0cb60a status must be available to update readonly flag, but current status is: creating. (HTTP 400) (Request-ID: req-2db9b77c-8cd5-497d-8c5f-219e2ab00284) [ 418.7] Copying disk 1/1 to /dev/disk/by-id/virtio-26d4d30e-2e08-46a4-b (raw) (100.00/100%) [ 810.1] Creating output metadata [ 828.6] Finishing off 5.2 Launch the volume as instance on openstack webpage, Check points of guest are passed 6.Convert a guest from VMware via vmx to openstack with option -oo verify-server-certificate without value # virt-v2v -i vmx -it ssh ssh://root.75.219/vmfs/volumes/5aefd41e-1d448cf8-0b1f-001018d0c8e0/esx6.5-ubuntu18.04-x86_64-bug1481930/esx6.5-ubuntu18.04-x86_64-bug1481930.vmx -o openstack -oo server-id=rhel7.6-v2v-conversion-server -oo verify-server-certificate [ 1.7] Opening the source -i vmx ssh://root.75.219/vmfs/volumes/5aefd41e-1d448cf8-0b1f-001018d0c8e0/esx6.5-ubuntu18.04-x86_64-bug1481930/esx6.5-ubuntu18.04-x86_64-bug1481930.vmx [ 2.3] Creating an overlay to protect the source from being modified [ 2.8] Opening the overlay [ 55.1] Inspecting the overlay [ 82.2] Checking for sufficient free disk space in the guest [ 82.2] Estimating space required on target for each disk [ 82.2] Converting Ubuntu 18.04.1 LTS to run on KVM virt-v2v: warning: could not determine a way to update the configuration of Grub2 virt-v2v: warning: don't know how to install guest tools on ubuntu-18 virt-v2v: This guest has virtio drivers installed. [ 956.3] Mapping filesystem data to avoid copying unused and blank areas [ 970.8] Closing the overlay [ 972.4] Assigning disks to buses [ 972.4] Checking if the guest needs BIOS or UEFI to boot [ 972.4] Initializing the target -o openstack Failed to set volume read-only access mode flag: Invalid volume: Volume 37b3bb36-7abf-48fb-842e-94fc6557be3b status must be available to update readonly flag, but current status is: creating. (HTTP 400) (Request-ID: req-d6a2e1df-ae63-42d8-93c1-6e764790adf2) [1000.6] Copying disk 1/1 to /dev/disk/by-id/virtio-37b3bb36-7abf-48fb-8 (raw) (100.00/100%) [1701.6] Creating output metadata [1717.5] Finishing off 6.2 Launch the volume as instance on openstack webpage, Check points of guest are passed 7.Convert a guest s from VMware to openstack with option -oo verify-server-certificate with wrong value # virt-v2v -ic vpx://root.73.141/data/10.73.75.219/?no_verify=1 -it vddk -io vddk-libdir=/home/vmware-vix-disklib-distrib -io vddk-thumbprint=1F:97:34:5F:B6:C2:BA:66:46:CB:1A:71:76:7D:6B:50:1E:03:00:EA -n default esx6.7-win2016-x86_64 --password-file /tmp/passwd -o openstack -oo server-id=rhel7.6-v2v-conversion-server -oo verify-server-certificate=wrong virt-v2v: error: internal error: invalid argument: bool_of_string If reporting bugs, run virt-v2v with debugging enabled and include the complete output: virt-v2v -v -x [...] Result: virt-v2v can convert guest to openstack on conversion appliance with option verify-server-certificate correctly, so move the bug from ON_QA to VERIFIED Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHEA-2019:2096 |