Bug 1709930
| Summary: | [OSP15] Exceptions In Neutron Policy Enforcement | ||
|---|---|---|---|
| Product: | Red Hat OpenStack | Reporter: | Vadim Khitrin <vkhitrin> |
| Component: | openstack-neutron | Assignee: | Nate Johnston <njohnston> |
| Status: | CLOSED ERRATA | QA Contact: | Candido Campos <ccamposr> |
| Severity: | high | Docs Contact: | |
| Priority: | high | ||
| Version: | 15.0 (Stein) | CC: | amuller, bcafarel, cfontain, chrisw, fbaudin, njohnston, scohen, skaplons, supadhya, twilson |
| Target Milestone: | beta | Keywords: | Triaged |
| Target Release: | 15.0 (Stein) | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | openstack-neutron-14.0.2-0.20190604181640.a9d291b.el8 | Doc Type: | No Doc Update |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2019-09-21 11:21:58 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
Vadim Khitrin
2019-05-14 15:01:54 UTC
'RuntimeError: dictionary changed size during iteration' is raised because of different behaviour between Python2 and Python3, current workaround that I've tried is: 1) Log in to each controller node 2) Locate the overlay file system of 'neutron_api' container podman mount neutron_api /var/lib/containers/storage/overlay/9f1b0ad9960c377d7a6f65401835a4d78d7b314674b54620607ea1f7c1dea4f6/merged 3) Navigate to the path returned above 3) Open file 'usr/lib/python3.6/site-packages/neutron/pecan_wsgi/hooks/policy_enforcement.py' for editing sudoedit usr/lib/python3.6/site-packages/neutron/pecan_wsgi/hooks/policy_enforcement.py 4) Replace line containing 'data.keys()' to 'list(data)' (as per this post, it's line number 226) 5) Restart 'neutron_api' container podman restart neutron_api After applying this, ports query works: openstack port list +--------------------------------------+------------------------------+-------------------+------------------------------------------------------------------------------+--------+ | ID | Name | MAC Address | Fixed IP Addresses | Status | +--------------------------------------+------------------------------+-------------------+------------------------------------------------------------------------------+--------+ | 0f52f5eb-2430-44c2-866d-f127e6bba24b | | fa:16:3e:79:f7:1c | ip_address='40.0.0.101', subnet_id='3a64f067-bbe0-4715-b091-2965f9510726' | DOWN | | 1382b3fe-0136-4f6e-84cf-2b2e745b2328 | | fa:16:3e:32:28:df | ip_address='40.0.0.100', subnet_id='3a64f067-bbe0-4715-b091-2965f9510726' | DOWN | | 293d2303-be41-4fd1-8744-07950660c6e1 | | fa:16:3e:a2:ae:a0 | ip_address='40.0.0.102', subnet_id='3a64f067-bbe0-4715-b091-2965f9510726' | DOWN | | 4540355c-5c22-4849-b09b-42f9be429377 | | fa:16:3e:ed:a0:36 | ip_address='10.10.110.102', subnet_id='405a2399-49d0-4bf1-8984-b4575d31ff94' | ACTIVE | | a5119264-8080-44fc-a7fe-6ffacdfc291f | tempest-port-smoke-422258903 | fa:16:3e:85:44:eb | ip_address='10.10.110.109', subnet_id='405a2399-49d0-4bf1-8984-b4575d31ff94' | DOWN | | b9013482-aa63-4f87-a18d-cde70730eda0 | | fa:16:3e:37:8c:de | ip_address='50.0.0.100', subnet_id='f554b7cf-6b14-4425-9682-bfccd10d9bde' | DOWN | | c5419c1a-b586-4953-9e6a-12294fe06b85 | | fa:16:3e:04:8d:f3 | ip_address='10.10.110.100', subnet_id='405a2399-49d0-4bf1-8984-b4575d31ff94' | ACTIVE | | c7a80ba0-a525-4a15-adc3-6e9f53396ce8 | | fa:16:3e:01:97:72 | ip_address='50.0.0.102', subnet_id='f554b7cf-6b14-4425-9682-bfccd10d9bde' | DOWN | | def7eee7-f4c2-401e-8b04-b292ce4cc735 | | fa:16:3e:73:86:00 | ip_address='50.0.0.101', subnet_id='f554b7cf-6b14-4425-9682-bfccd10d9bde' | DOWN | | f3f5642e-bea1-480a-9f61-4197ebe8d96e | | fa:16:3e:5b:7f:20 | ip_address='10.10.110.101', subnet_id='405a2399-49d0-4bf1-8984-b4575d31ff94' | ACTIVE | +--------------------------------------+------------------------------+-------------------+------------------------------------------------------------------------------+--------+ Upstreamed the recommended fix; it should get approved quickly. Pushed change https://review.opendev.org/659397 to master, first change (stable/rocky) was a mistake. Master change merged Adding upstream review for additional fix Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHEA-2019:2811 |