)]}'
{"manila_tempest_tests/tests/api/test_rules_negative.py":[{"author":{"_account_id":16643,"name":"Goutham Pacha Ravi","email":"gouthampravi@gmail.com","username":"gouthamr"},"change_message_id":"3fe301c496921583b421699b8c49f95f1b6dd527","unresolved":false,"context_lines":[{"line_number":412,"context_line":"    def test_can_apply_new_cephx_rules_when_one_is_in_error_state(self):"},{"line_number":413,"context_line":"        share \u003d self.create_share()"},{"line_number":414,"context_line":""},{"line_number":415,"context_line":"        self.assertRaises(lib_exc.BadRequest,"},{"line_number":416,"context_line":"                          self.shares_v2_client.create_access_rule,"},{"line_number":417,"context_line":"                          share[\u0027id\u0027], self.access_type, \u0027jane.doe\u0027)"},{"line_number":418,"context_line":""},{"line_number":419,"context_line":"        access \u003d self.shares_v2_client.create_access_rule("},{"line_number":420,"context_line":"            share[\u0027id\u0027], self.access_type, self.access_to)"}],"source_content_type":"text/x-python","patch_set":2,"id":"bf51134e_4cae2a2e","line":417,"range":{"start_line":415,"start_character":0,"end_line":417,"end_character":68},"updated":"2020-07-15 04:42:50.000000000","message":"this rule is rejected at the API, so nothing is ever in an \"error\" state ... \n\nI assume the point of the test case is to verify that even when you have one rule in error state, you can add more rules. Is this correct?\n\nSo maybe you can reuse the logic from the above test case here... \n\n1) As \"primary\" user (self.shares_v2_client) create share A, add access rule to \"Joe\"\n2) As \"alt\" user (self.alt_shares_v2_client) create share B, add access rule to \"Joe\"\n\nalt user\u0027s rule must be set to \"error\". You can then add another access rule to alt user\u0027s share, and verify that rule transitions to active. \n\nYou can then further verify the following:\n\n4) Check the share\u0027s \"access_rules_status\" - it must be in \"error\" (because you have a rule in \"error\" state). \n5) Remove the rule in \"error\", check the share\u0027s access_rules_status, it must have transitioned to \"active\". \n\n\nWDYT?","commit_id":"fea8a53313ba2df01a7418a72dd6bfab7eb48412"},{"author":{"_account_id":16643,"name":"Goutham Pacha Ravi","email":"gouthampravi@gmail.com","username":"gouthamr"},"change_message_id":"0c47a29cd69f926680e12784363da19fc3a1d9db","unresolved":false,"context_lines":[{"line_number":412,"context_line":"    def test_can_apply_new_cephx_rules_when_one_is_in_error_state(self):"},{"line_number":413,"context_line":"        share \u003d self.create_share()"},{"line_number":414,"context_line":""},{"line_number":415,"context_line":"        self.assertRaises(lib_exc.BadRequest,"},{"line_number":416,"context_line":"                          self.shares_v2_client.create_access_rule,"},{"line_number":417,"context_line":"                          share[\u0027id\u0027], self.access_type, \u0027jane.doe\u0027)"},{"line_number":418,"context_line":""},{"line_number":419,"context_line":"        access \u003d self.shares_v2_client.create_access_rule("},{"line_number":420,"context_line":"            share[\u0027id\u0027], self.access_type, self.access_to)"}],"source_content_type":"text/x-python","patch_set":2,"id":"bf51134e_2657865a","line":417,"range":{"start_line":415,"start_character":0,"end_line":417,"end_character":68},"in_reply_to":"bf51134e_13cf2929","updated":"2020-07-15 16:37:41.000000000","message":"\u003e For some reason the second rule by \"alt\" user moves to \"active\"\n\u003e status without having to delete the previous rule.\n\nYes, that rule is in \"active\" state, since nothing is wrong with it, but the combined access rules status is expected to still be in \"error\". The combined status attribute is on the share, as \"access_rules_status\"","commit_id":"fea8a53313ba2df01a7418a72dd6bfab7eb48412"},{"author":{"_account_id":19262,"name":"Liron Kuchlani","email":"lkuchlan@redhat.com","username":"lkuchlan"},"change_message_id":"9ad0dfb26d87d8f0075a12d3fb48cd86a1aa2fbb","unresolved":false,"context_lines":[{"line_number":412,"context_line":"    def test_can_apply_new_cephx_rules_when_one_is_in_error_state(self):"},{"line_number":413,"context_line":"        share \u003d self.create_share()"},{"line_number":414,"context_line":""},{"line_number":415,"context_line":"        self.assertRaises(lib_exc.BadRequest,"},{"line_number":416,"context_line":"                          self.shares_v2_client.create_access_rule,"},{"line_number":417,"context_line":"                          share[\u0027id\u0027], self.access_type, \u0027jane.doe\u0027)"},{"line_number":418,"context_line":""},{"line_number":419,"context_line":"        access \u003d self.shares_v2_client.create_access_rule("},{"line_number":420,"context_line":"            share[\u0027id\u0027], self.access_type, self.access_to)"}],"source_content_type":"text/x-python","patch_set":2,"id":"bf51134e_5eb997c9","line":417,"range":{"start_line":415,"start_character":0,"end_line":417,"end_character":68},"in_reply_to":"bf51134e_2657865a","updated":"2020-07-16 04:36:53.000000000","message":"Oh right!\nSorry I was confused","commit_id":"fea8a53313ba2df01a7418a72dd6bfab7eb48412"},{"author":{"_account_id":19262,"name":"Liron Kuchlani","email":"lkuchlan@redhat.com","username":"lkuchlan"},"change_message_id":"47eb2bd41168b784f64b43bb79372ce5ef6b894a","unresolved":false,"context_lines":[{"line_number":412,"context_line":"    def test_can_apply_new_cephx_rules_when_one_is_in_error_state(self):"},{"line_number":413,"context_line":"        share \u003d self.create_share()"},{"line_number":414,"context_line":""},{"line_number":415,"context_line":"        self.assertRaises(lib_exc.BadRequest,"},{"line_number":416,"context_line":"                          self.shares_v2_client.create_access_rule,"},{"line_number":417,"context_line":"                          share[\u0027id\u0027], self.access_type, \u0027jane.doe\u0027)"},{"line_number":418,"context_line":""},{"line_number":419,"context_line":"        access \u003d self.shares_v2_client.create_access_rule("},{"line_number":420,"context_line":"            share[\u0027id\u0027], self.access_type, self.access_to)"}],"source_content_type":"text/x-python","patch_set":2,"id":"bf51134e_13cf2929","line":417,"range":{"start_line":415,"start_character":0,"end_line":417,"end_character":68},"in_reply_to":"bf51134e_4cae2a2e","updated":"2020-07-15 10:51:03.000000000","message":"Thanks for the detail.\nThe Polarion test case was not written properly.\nI will fix it.\n\nFor some reason the second rule by \"alt\" user moves to \"active\"\nstatus without having to delete the previous rule.","commit_id":"fea8a53313ba2df01a7418a72dd6bfab7eb48412"},{"author":{"_account_id":16643,"name":"Goutham Pacha Ravi","email":"gouthampravi@gmail.com","username":"gouthamr"},"change_message_id":"afa0c9b52650aff402f9b3b705e75f0227489c06","unresolved":false,"context_lines":[{"line_number":429,"context_line":"        # Add second access rule to \"david\" by \"alt\" user."},{"line_number":430,"context_line":"        rule2 \u003d self.alt_shares_v2_client.create_access_rule("},{"line_number":431,"context_line":"            share_alt[\u0027id\u0027], self.access_type, self.access_to)"},{"line_number":432,"context_line":"        self.alt_shares_v2_client.wait_for_access_rule_status("},{"line_number":433,"context_line":"            share_alt[\u0027id\u0027], rule2[\u0027id\u0027], \u0027active\u0027)"},{"line_number":434,"context_line":""},{"line_number":435,"context_line":""},{"line_number":436,"context_line":"@ddt.ddt"}],"source_content_type":"text/x-python","patch_set":3,"id":"bf51134e_a615569e","line":433,"range":{"start_line":432,"start_character":8,"end_line":433,"end_character":51},"updated":"2020-07-15 16:36:35.000000000","message":"Can you add another assertion before and after adding this second rule?\n\n   share_alt_updated \u003d self.alt_shares_v2_client.get_share(share_alt[\u0027id\u0027])\n   self.assertEqual(\u0027error\u0027, share_alt_updated(\u0027access_rules_status\u0027)\n\n\nThen, you can cleanup and check:\n\n   self.alt_shares_v2_client.delete_access_rule(share_alt[\u0027id\u0027], rule1[\u0027id\u0027])\n   self.shares_v2_client.wait_for_share_status(\n            hare_alt[\u0027id\u0027], \"active\", status_attr\u003d\u0027access_rules_status\u0027)","commit_id":"97e55f06f88110f7d5314d1f6d8f8dc4eed76792"},{"author":{"_account_id":19262,"name":"Liron Kuchlani","email":"lkuchlan@redhat.com","username":"lkuchlan"},"change_message_id":"9ad0dfb26d87d8f0075a12d3fb48cd86a1aa2fbb","unresolved":false,"context_lines":[{"line_number":429,"context_line":"        # Add second access rule to \"david\" by \"alt\" user."},{"line_number":430,"context_line":"        rule2 \u003d self.alt_shares_v2_client.create_access_rule("},{"line_number":431,"context_line":"            share_alt[\u0027id\u0027], self.access_type, self.access_to)"},{"line_number":432,"context_line":"        self.alt_shares_v2_client.wait_for_access_rule_status("},{"line_number":433,"context_line":"            share_alt[\u0027id\u0027], rule2[\u0027id\u0027], \u0027active\u0027)"},{"line_number":434,"context_line":""},{"line_number":435,"context_line":""},{"line_number":436,"context_line":"@ddt.ddt"}],"source_content_type":"text/x-python","patch_set":3,"id":"bf51134e_fea4eba4","line":433,"range":{"start_line":432,"start_character":8,"end_line":433,"end_character":51},"in_reply_to":"bf51134e_a615569e","updated":"2020-07-16 04:36:53.000000000","message":"Done","commit_id":"97e55f06f88110f7d5314d1f6d8f8dc4eed76792"},{"author":{"_account_id":16643,"name":"Goutham Pacha Ravi","email":"gouthampravi@gmail.com","username":"gouthamr"},"change_message_id":"372feb8aca78f6fd6fd9e3a80fd35dd1917daf37","unresolved":false,"context_lines":[{"line_number":429,"context_line":"        # Share\u0027s \"access_rules_status\" must be in \"error\" status"},{"line_number":430,"context_line":"        share_alt_updated \u003d self.alt_shares_v2_client.get_share("},{"line_number":431,"context_line":"            share_alt[\u0027id\u0027])"},{"line_number":432,"context_line":"        self.assertEqual(\u0027error\u0027, share_alt_updated(\u0027access_rules_status\u0027))"},{"line_number":433,"context_line":""},{"line_number":434,"context_line":"        # Add second access rule to \"david\" by \"alt\" user."},{"line_number":435,"context_line":"        rule2 \u003d self.alt_shares_v2_client.create_access_rule("}],"source_content_type":"text/x-python","patch_set":5,"id":"bf51134e_5b999e6a","line":432,"range":{"start_line":432,"start_character":51,"end_line":432,"end_character":74},"updated":"2020-07-16 15:55:02.000000000","message":"[\u0027access_rules_status\u0027]","commit_id":"61293a653de598fecc82b564f02b497e27289ca2"},{"author":{"_account_id":19262,"name":"Liron Kuchlani","email":"lkuchlan@redhat.com","username":"lkuchlan"},"change_message_id":"df5e9d2fdc124084365b67ca48542334029a8f66","unresolved":false,"context_lines":[{"line_number":429,"context_line":"        # Share\u0027s \"access_rules_status\" must be in \"error\" status"},{"line_number":430,"context_line":"        share_alt_updated \u003d self.alt_shares_v2_client.get_share("},{"line_number":431,"context_line":"            share_alt[\u0027id\u0027])"},{"line_number":432,"context_line":"        self.assertEqual(\u0027error\u0027, share_alt_updated(\u0027access_rules_status\u0027))"},{"line_number":433,"context_line":""},{"line_number":434,"context_line":"        # Add second access rule to \"david\" by \"alt\" user."},{"line_number":435,"context_line":"        rule2 \u003d self.alt_shares_v2_client.create_access_rule("}],"source_content_type":"text/x-python","patch_set":5,"id":"bf51134e_7e3e108b","line":432,"range":{"start_line":432,"start_character":51,"end_line":432,"end_character":74},"in_reply_to":"bf51134e_5b999e6a","updated":"2020-07-16 16:38:05.000000000","message":"Done","commit_id":"61293a653de598fecc82b564f02b497e27289ca2"},{"author":{"_account_id":16643,"name":"Goutham Pacha Ravi","email":"gouthampravi@gmail.com","username":"gouthamr"},"change_message_id":"02903a11c3a40da92f22947d8be3790d37c4f82c","unresolved":false,"context_lines":[{"line_number":403,"context_line":"        # on the first share"},{"line_number":404,"context_line":"        access2 \u003d self.alt_shares_v2_client.create_access_rule("},{"line_number":405,"context_line":"            share2[\u0027id\u0027], self.access_type, self.access_to, \u0027rw\u0027)"},{"line_number":406,"context_line":"        self.assertRaises("},{"line_number":407,"context_line":"            share_exceptions.AccessRuleBuildErrorException,"},{"line_number":408,"context_line":"            self.alt_shares_v2_client.wait_for_access_rule_status,"},{"line_number":409,"context_line":"            share2[\u0027id\u0027], access2[\u0027id\u0027], \u0027active\u0027)"},{"line_number":410,"context_line":""},{"line_number":411,"context_line":"    @tc.attr(base.TAG_NEGATIVE, base.TAG_API)"},{"line_number":412,"context_line":"    def test_can_apply_new_cephx_rules_when_one_is_in_error_state(self):"}],"source_content_type":"text/x-python","patch_set":6,"id":"bf51134e_f42b5f91","line":409,"range":{"start_line":406,"start_character":8,"end_line":409,"end_character":50},"updated":"2020-07-16 19:31:47.000000000","message":"perhaps refactor this to use raise_rule_in_error_state\u003dFalse like you\u0027re doing below...","commit_id":"7ad766e29192a0d9bc935fb06ee267bb9c2caec8"},{"author":{"_account_id":19262,"name":"Liron Kuchlani","email":"lkuchlan@redhat.com","username":"lkuchlan"},"change_message_id":"db501f732849b0b47733e0c19861f5e5e90ce89a","unresolved":false,"context_lines":[{"line_number":403,"context_line":"        # on the first share"},{"line_number":404,"context_line":"        access2 \u003d self.alt_shares_v2_client.create_access_rule("},{"line_number":405,"context_line":"            share2[\u0027id\u0027], self.access_type, self.access_to, \u0027rw\u0027)"},{"line_number":406,"context_line":"        self.assertRaises("},{"line_number":407,"context_line":"            share_exceptions.AccessRuleBuildErrorException,"},{"line_number":408,"context_line":"            self.alt_shares_v2_client.wait_for_access_rule_status,"},{"line_number":409,"context_line":"            share2[\u0027id\u0027], access2[\u0027id\u0027], \u0027active\u0027)"},{"line_number":410,"context_line":""},{"line_number":411,"context_line":"    @tc.attr(base.TAG_NEGATIVE, base.TAG_API)"},{"line_number":412,"context_line":"    def test_can_apply_new_cephx_rules_when_one_is_in_error_state(self):"}],"source_content_type":"text/x-python","patch_set":6,"id":"bf51134e_55b5dbcf","line":409,"range":{"start_line":406,"start_character":8,"end_line":409,"end_character":50},"in_reply_to":"bf51134e_f42b5f91","updated":"2020-07-17 13:15:30.000000000","message":"Right\nDone","commit_id":"7ad766e29192a0d9bc935fb06ee267bb9c2caec8"},{"author":{"_account_id":16643,"name":"Goutham Pacha Ravi","email":"gouthampravi@gmail.com","username":"gouthamr"},"change_message_id":"25fd52fe4847f171168461932b3acce042bd93cb","unresolved":false,"context_lines":[{"line_number":418,"context_line":""},{"line_number":419,"context_line":"        # Create share on \"alt\" tenant"},{"line_number":420,"context_line":"        share_alt \u003d self.create_share(client\u003dself.alt_shares_v2_client)"},{"line_number":421,"context_line":"        # Add access rule to \"Joe\" by \"primary\" user."},{"line_number":422,"context_line":"        # Rule must be set to \"error\" status."},{"line_number":423,"context_line":"        rule1 \u003d self.alt_shares_v2_client.create_access_rule("},{"line_number":424,"context_line":"            share_alt[\u0027id\u0027], self.access_type, \u0027Joe\u0027)"}],"source_content_type":"text/x-python","patch_set":6,"id":"bf51134e_143533f7","line":421,"range":{"start_line":421,"start_character":39,"end_line":421,"end_character":46},"updated":"2020-07-16 19:30:23.000000000","message":"alt","commit_id":"7ad766e29192a0d9bc935fb06ee267bb9c2caec8"},{"author":{"_account_id":19262,"name":"Liron Kuchlani","email":"lkuchlan@redhat.com","username":"lkuchlan"},"change_message_id":"db501f732849b0b47733e0c19861f5e5e90ce89a","unresolved":false,"context_lines":[{"line_number":418,"context_line":""},{"line_number":419,"context_line":"        # Create share on \"alt\" tenant"},{"line_number":420,"context_line":"        share_alt \u003d self.create_share(client\u003dself.alt_shares_v2_client)"},{"line_number":421,"context_line":"        # Add access rule to \"Joe\" by \"primary\" user."},{"line_number":422,"context_line":"        # Rule must be set to \"error\" status."},{"line_number":423,"context_line":"        rule1 \u003d self.alt_shares_v2_client.create_access_rule("},{"line_number":424,"context_line":"            share_alt[\u0027id\u0027], self.access_type, \u0027Joe\u0027)"}],"source_content_type":"text/x-python","patch_set":6,"id":"bf51134e_95af737c","line":421,"range":{"start_line":421,"start_character":39,"end_line":421,"end_character":46},"in_reply_to":"bf51134e_143533f7","updated":"2020-07-17 13:15:30.000000000","message":"Done","commit_id":"7ad766e29192a0d9bc935fb06ee267bb9c2caec8"},{"author":{"_account_id":16643,"name":"Goutham Pacha Ravi","email":"gouthampravi@gmail.com","username":"gouthamr"},"change_message_id":"25fd52fe4847f171168461932b3acce042bd93cb","unresolved":false,"context_lines":[{"line_number":440,"context_line":"        # Check share\u0027s access_rules_status has transitioned to \"active\" status"},{"line_number":441,"context_line":"        self.alt_shares_v2_client.delete_access_rule("},{"line_number":442,"context_line":"            share_alt[\u0027id\u0027], rule1[\u0027id\u0027])"},{"line_number":443,"context_line":"        self.shares_v2_client.wait_for_share_status("},{"line_number":444,"context_line":"            share_alt[\u0027id\u0027], \u0027active\u0027, status_attr\u003d\u0027access_rules_status\u0027)"},{"line_number":445,"context_line":""},{"line_number":446,"context_line":""},{"line_number":447,"context_line":"@ddt.ddt"}],"source_content_type":"text/x-python","patch_set":6,"id":"bf51134e_d451fb31","line":444,"range":{"start_line":443,"start_character":8,"end_line":444,"end_character":73},"updated":"2020-07-16 19:30:23.000000000","message":"This has to be done with self.alt_shares_v2_client","commit_id":"7ad766e29192a0d9bc935fb06ee267bb9c2caec8"},{"author":{"_account_id":19262,"name":"Liron Kuchlani","email":"lkuchlan@redhat.com","username":"lkuchlan"},"change_message_id":"db501f732849b0b47733e0c19861f5e5e90ce89a","unresolved":false,"context_lines":[{"line_number":440,"context_line":"        # Check share\u0027s access_rules_status has transitioned to \"active\" status"},{"line_number":441,"context_line":"        self.alt_shares_v2_client.delete_access_rule("},{"line_number":442,"context_line":"            share_alt[\u0027id\u0027], rule1[\u0027id\u0027])"},{"line_number":443,"context_line":"        self.shares_v2_client.wait_for_share_status("},{"line_number":444,"context_line":"            share_alt[\u0027id\u0027], \u0027active\u0027, status_attr\u003d\u0027access_rules_status\u0027)"},{"line_number":445,"context_line":""},{"line_number":446,"context_line":""},{"line_number":447,"context_line":"@ddt.ddt"}],"source_content_type":"text/x-python","patch_set":6,"id":"bf51134e_35df870d","line":444,"range":{"start_line":443,"start_character":8,"end_line":444,"end_character":73},"in_reply_to":"bf51134e_d451fb31","updated":"2020-07-17 13:15:30.000000000","message":"Oh I missed it","commit_id":"7ad766e29192a0d9bc935fb06ee267bb9c2caec8"},{"author":{"_account_id":16643,"name":"Goutham Pacha Ravi","email":"gouthampravi@gmail.com","username":"gouthamr"},"change_message_id":"48ff13cc0badb7db381c8ab6a60187ec93891bbc","unresolved":false,"context_lines":[{"line_number":390,"context_line":"        # Grant access to the share"},{"line_number":391,"context_line":"        access1 \u003d self.shares_v2_client.create_access_rule("},{"line_number":392,"context_line":"            self.share[\u0027id\u0027], self.access_type, self.access_to, \u0027rw\u0027)"},{"line_number":393,"context_line":"        self.shares_v2_client.wait_for_access_rule_status("},{"line_number":394,"context_line":"            self.share[\u0027id\u0027], access1[\u0027id\u0027], \u0027active\u0027)"},{"line_number":395,"context_line":""},{"line_number":396,"context_line":"        # Create second share by the new user"},{"line_number":397,"context_line":"        share2 \u003d self.create_share(client\u003dself.alt_shares_v2_client,"}],"source_content_type":"text/x-python","patch_set":8,"id":"bf51134e_44eb6b11","line":394,"range":{"start_line":393,"start_character":7,"end_line":394,"end_character":54},"updated":"2020-07-17 17:03:00.000000000","message":"This here failed with this exception in the share manager log:\n\n\nJul 17 15:18:40.735486 ubuntu-bionic-rax-ord-0018382510 manila-share[62790]: ERROR oslo_messaging.rpc.server Traceback (most recent call last):\nJul 17 15:18:40.735486 ubuntu-bionic-rax-ord-0018382510 manila-share[62790]: ERROR oslo_messaging.rpc.server   File \"/usr/local/lib/python3.6/dist-packages/oslo_messaging/rpc/server.py\", line 165, in _process_incoming\nJul 17 15:18:40.735486 ubuntu-bionic-rax-ord-0018382510 manila-share[62790]: ERROR oslo_messaging.rpc.server     res \u003d self.dispatcher.dispatch(message)\nJul 17 15:18:40.735486 ubuntu-bionic-rax-ord-0018382510 manila-share[62790]: ERROR oslo_messaging.rpc.server   File \"/usr/local/lib/python3.6/dist-packages/oslo_messaging/rpc/dispatcher.py\", line 273, in dispatch\nJul 17 15:18:40.735486 ubuntu-bionic-rax-ord-0018382510 manila-share[62790]: ERROR oslo_messaging.rpc.server     return self._do_dispatch(endpoint, method, ctxt, args)\nJul 17 15:18:40.735486 ubuntu-bionic-rax-ord-0018382510 manila-share[62790]: ERROR oslo_messaging.rpc.server   File \"/usr/local/lib/python3.6/dist-packages/oslo_messaging/rpc/dispatcher.py\", line 193, in _do_dispatch\nJul 17 15:18:40.735486 ubuntu-bionic-rax-ord-0018382510 manila-share[62790]: ERROR oslo_messaging.rpc.server     result \u003d func(ctxt, **new_args)\nJul 17 15:18:40.735486 ubuntu-bionic-rax-ord-0018382510 manila-share[62790]: ERROR oslo_messaging.rpc.server   File \"/opt/stack/manila/manila/share/manager.py\", line 187, in wrapped\nJul 17 15:18:40.735486 ubuntu-bionic-rax-ord-0018382510 manila-share[62790]: ERROR oslo_messaging.rpc.server     return f(self, *args, **kwargs)\nJul 17 15:18:40.735486 ubuntu-bionic-rax-ord-0018382510 manila-share[62790]: ERROR oslo_messaging.rpc.server   File \"/opt/stack/manila/manila/utils.py\", line 568, in wrapper\nJul 17 15:18:40.735486 ubuntu-bionic-rax-ord-0018382510 manila-share[62790]: ERROR oslo_messaging.rpc.server     return func(self, *args, **kwargs)\nJul 17 15:18:40.735486 ubuntu-bionic-rax-ord-0018382510 manila-share[62790]: ERROR oslo_messaging.rpc.server   File \"/opt/stack/manila/manila/share/manager.py\", line 3616, in update_access\nJul 17 15:18:40.735486 ubuntu-bionic-rax-ord-0018382510 manila-share[62790]: ERROR oslo_messaging.rpc.server     share_server\u003dshare_server)\nJul 17 15:18:40.735486 ubuntu-bionic-rax-ord-0018382510 manila-share[62790]: ERROR oslo_messaging.rpc.server   File \"/opt/stack/manila/manila/share/access.py\", line 283, in update_access_rules\nJul 17 15:18:40.735486 ubuntu-bionic-rax-ord-0018382510 manila-share[62790]: ERROR oslo_messaging.rpc.server     share_server\u003dshare_server)\nJul 17 15:18:40.735486 ubuntu-bionic-rax-ord-0018382510 manila-share[62790]: ERROR oslo_messaging.rpc.server   File \"/opt/stack/manila/manila/share/access.py\", line 322, in _update_access_rules\nJul 17 15:18:40.736969 ubuntu-bionic-rax-ord-0018382510 manila-share[62790]: ERROR oslo_messaging.rpc.server     share_server)\nJul 17 15:18:40.736969 ubuntu-bionic-rax-ord-0018382510 manila-share[62790]: ERROR oslo_messaging.rpc.server   File \"/opt/stack/manila/manila/share/access.py\", line 390, in _update_rules_through_share_driver\nJul 17 15:18:40.736969 ubuntu-bionic-rax-ord-0018382510 manila-share[62790]: ERROR oslo_messaging.rpc.server     share_server\u003dshare_server\nJul 17 15:18:40.736969 ubuntu-bionic-rax-ord-0018382510 manila-share[62790]: ERROR oslo_messaging.rpc.server   File \"/opt/stack/manila/manila/share/drivers/cephfs/driver.py\", line 293, in update_access\nJul 17 15:18:40.736969 ubuntu-bionic-rax-ord-0018382510 manila-share[62790]: ERROR oslo_messaging.rpc.server     share_server\u003dshare_server)\nJul 17 15:18:40.736969 ubuntu-bionic-rax-ord-0018382510 manila-share[62790]: ERROR oslo_messaging.rpc.server   File \"/opt/stack/manila/manila/share/drivers/cephfs/driver.py\", line 482, in update_access\nJul 17 15:18:40.736969 ubuntu-bionic-rax-ord-0018382510 manila-share[62790]: ERROR oslo_messaging.rpc.server     access_key \u003d self._allow_access(context, share, rule)\nJul 17 15:18:40.736969 ubuntu-bionic-rax-ord-0018382510 manila-share[62790]: ERROR oslo_messaging.rpc.server   File \"/opt/stack/manila/manila/share/drivers/cephfs/driver.py\", line 431, in _allow_access\nJul 17 15:18:40.736969 ubuntu-bionic-rax-ord-0018382510 manila-share[62790]: ERROR oslo_messaging.rpc.server     tenant_id\u003dshare[\u0027project_id\u0027])\nJul 17 15:18:40.736969 ubuntu-bionic-rax-ord-0018382510 manila-share[62790]: ERROR oslo_messaging.rpc.server   File \"/usr/lib/python3/dist-packages/ceph_volume_client.py\", line 1014, in authorize\nJul 17 15:18:40.736969 ubuntu-bionic-rax-ord-0018382510 manila-share[62790]: ERROR oslo_messaging.rpc.server     raise CephFSVolumeClientError(msg)\nJul 17 15:18:40.736969 ubuntu-bionic-rax-ord-0018382510 manila-share[62790]: ERROR oslo_messaging.rpc.server ceph_volume_client.CephFSVolumeClientError: auth ID: david is already in use\nJul 17 15:18:40.736969 ubuntu-bionic-rax-ord-0018382510 manila-share[62790]: ERROR oslo_messaging.rpc.server \nJul 17 15:18:40.794205 ubuntu-bionic-rax-ord-0018382510 manila-share[62790]: DEBUG manila.share.manager [None req-17cde51b-ebcf-4f69-90fb-36d605649e67 None None] Received request to update access for share instance 53c93045-6658-4031-af86-155708b108b4. {{(pid\u003d63463) update_access /opt/stack/manila/manila/share/manager.py:3611}}\n\n\n\nhttps://storage.bhs.cloud.ovh.net/v1/AUTH_dcaab5e32b234d56b626f72581e3644c/zuul_opendev_logs_1ab/740985/8/check/manila-tempest-plugin-cephfs-native/1ab326e/controller/logs/screen-m-shr.txt\n\n\nI think this is because tempest runs tests in a class in an alphabetical order, and the test case below ran first, and by default the cleanup for shares occurs during class cleanup [1]. You have two options, either use unique client names in each test case, or force a method level cleanup for the share created on line 423... \n\n\n[1] https://github.com/openstack/manila-tempest-plugin/blob/4a0b732aabb6130ab9216f318f454bd91398c3d1/manila_tempest_tests/tests/api/base.py#L357","commit_id":"12df4e4b87d1177737c3f706d3306d62fd2cacf4"},{"author":{"_account_id":19262,"name":"Liron Kuchlani","email":"lkuchlan@redhat.com","username":"lkuchlan"},"change_message_id":"26df0c3454c008d88f1d1f13eb5e86dad1a7ed19","unresolved":false,"context_lines":[{"line_number":390,"context_line":"        # Grant access to the share"},{"line_number":391,"context_line":"        access1 \u003d self.shares_v2_client.create_access_rule("},{"line_number":392,"context_line":"            self.share[\u0027id\u0027], self.access_type, self.access_to, \u0027rw\u0027)"},{"line_number":393,"context_line":"        self.shares_v2_client.wait_for_access_rule_status("},{"line_number":394,"context_line":"            self.share[\u0027id\u0027], access1[\u0027id\u0027], \u0027active\u0027)"},{"line_number":395,"context_line":""},{"line_number":396,"context_line":"        # Create second share by the new user"},{"line_number":397,"context_line":"        share2 \u003d self.create_share(client\u003dself.alt_shares_v2_client,"}],"source_content_type":"text/x-python","patch_set":8,"id":"bf51134e_47d523e5","line":394,"range":{"start_line":393,"start_character":7,"end_line":394,"end_character":54},"in_reply_to":"bf51134e_44eb6b11","updated":"2020-07-19 11:40:56.000000000","message":"Sorry, I didn\u0027t look at the logs.\nSince access rule can have an effect on other tests.\nI think the most correct approach is to create a helper method for the access rule that delete the access at the end of the test.","commit_id":"12df4e4b87d1177737c3f706d3306d62fd2cacf4"}]}
