Skip to content

Commit 4575136

Browse files
Zuulopenstack-gerrit
authored andcommitted
Merge "Metadata: handle process exceptions" into stable/zed
2 parents 3a4203c + 4698dd8 commit 4575136

File tree

5 files changed

+90
-14
lines changed

5 files changed

+90
-14
lines changed

neutron/agent/metadata/driver.py

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -294,7 +294,13 @@ def spawn_monitored_metadata_proxy(cls, monitor, ns_name, port, conf,
294294
pm = cls._get_metadata_proxy_process_manager(uuid, conf,
295295
ns_name=ns_name,
296296
callback=callback)
297-
pm.enable()
297+
try:
298+
pm.enable()
299+
except exceptions.ProcessExecutionError as exec_err:
300+
LOG.error("Encountered process execution error %(err)s while "
301+
"starting process in namespace %(ns)s",
302+
{"err": exec_err, "ns": ns_name})
303+
return
298304
monitor.register(uuid, METADATA_SERVICE_NAME, pm)
299305
cls.monitors[router_id] = pm
300306

neutron/agent/ovn/metadata/driver.py

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -205,7 +205,13 @@ def spawn_monitored_metadata_proxy(cls, monitor, ns_name, port, conf,
205205
pm = cls._get_metadata_proxy_process_manager(uuid, conf,
206206
ns_name=ns_name,
207207
callback=callback)
208-
pm.enable()
208+
try:
209+
pm.enable()
210+
except exceptions.ProcessExecutionError as exec_err:
211+
LOG.error("Encountered process execution error %(err)s while "
212+
"starting process in namespace %(ns)s",
213+
{"err": exec_err, "ns": ns_name})
214+
return
209215
monitor.register(uuid, METADATA_SERVICE_NAME, pm)
210216
cls.monitors[router_id] = pm
211217

neutron/tests/unit/agent/dhcp/test_agent.py

Lines changed: 31 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -807,23 +807,37 @@ def _process_manager_constructor_call(self, ns=FAKE_NETWORK_DHCP_NS):
807807
def _enable_dhcp_helper(self, network, enable_isolated_metadata=False,
808808
is_isolated_network=False, is_ovn_network=False):
809809
self.dhcp._process_monitor = mock.Mock()
810+
# The disable() call
811+
gmppm_expected_calls = [mock.call(FAKE_NETWORK_UUID, cfg.CONF,
812+
ns_name=FAKE_NETWORK_DHCP_NS)]
810813
if enable_isolated_metadata:
811814
cfg.CONF.set_override('enable_isolated_metadata', True)
815+
if is_isolated_network:
816+
# The enable() call
817+
gmppm_expected_calls.append(
818+
mock.call(FAKE_NETWORK_UUID, cfg.CONF,
819+
ns_name=FAKE_NETWORK_DHCP_NS,
820+
callback=mock.ANY))
812821
self.plugin.get_network_info.return_value = network
813-
self.dhcp.enable_dhcp_helper(network.id)
822+
process_instance = mock.Mock(active=False)
823+
with mock.patch.object(metadata_driver.MetadataDriver,
824+
'_get_metadata_proxy_process_manager',
825+
return_value=process_instance) as gmppm:
826+
self.dhcp.enable_dhcp_helper(network.id)
827+
gmppm.assert_has_calls(gmppm_expected_calls)
814828
self.plugin.assert_has_calls([
815829
mock.call.get_network_info(network.id)])
816830
self.call_driver.assert_called_once_with('enable', network)
817831
self.cache.assert_has_calls([mock.call.put(network)])
818832
if (is_isolated_network and enable_isolated_metadata and not
819833
is_ovn_network):
820-
self.external_process.assert_has_calls([
821-
self._process_manager_constructor_call(),
822-
mock.call().enable()], any_order=True)
834+
process_instance.assert_has_calls([
835+
mock.call.disable(sig=str(int(signal.SIGTERM))),
836+
mock.call.get_pid_file_name(),
837+
mock.call.enable()])
823838
else:
824-
self.external_process.assert_has_calls([
825-
self._process_manager_constructor_call(),
826-
mock.call().disable(sig=str(int(signal.SIGTERM)))])
839+
process_instance.assert_has_calls([
840+
mock.call.disable(sig=str(int(signal.SIGTERM)))])
827841

828842
def test_enable_dhcp_helper_enable_metadata_isolated_network(self):
829843
self._enable_dhcp_helper(isolated_network,
@@ -997,11 +1011,16 @@ def test_disable_dhcp_helper_driver_failure(self):
9971011

9981012
def test_enable_isolated_metadata_proxy(self):
9991013
self.dhcp._process_monitor = mock.Mock()
1000-
self.dhcp.enable_isolated_metadata_proxy(fake_network)
1001-
self.external_process.assert_has_calls([
1002-
self._process_manager_constructor_call(),
1003-
mock.call().enable()
1004-
], any_order=True)
1014+
process_instance = mock.Mock(active=False)
1015+
with mock.patch.object(metadata_driver.MetadataDriver,
1016+
'_get_metadata_proxy_process_manager',
1017+
return_value=process_instance) as gmppm:
1018+
self.dhcp.enable_isolated_metadata_proxy(fake_network)
1019+
gmppm.assert_called_with(FAKE_NETWORK_UUID,
1020+
cfg.CONF,
1021+
ns_name=FAKE_NETWORK_DHCP_NS,
1022+
callback=mock.ANY)
1023+
process_instance.enable.assert_called_once()
10051024

10061025
def test_disable_isolated_metadata_proxy(self):
10071026
method_path = ('neutron.agent.metadata.driver.MetadataDriver'

neutron/tests/unit/agent/metadata/test_driver.py

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,7 @@
1818
from unittest import mock
1919

2020
from neutron_lib import constants
21+
from neutron_lib import exceptions as lib_exceptions
2122
from neutron_lib import fixture as lib_fixtures
2223
from oslo_config import cfg
2324
from oslo_utils import uuidutils
@@ -241,6 +242,26 @@ def test_spawn_metadata_proxy(self):
241242
def test_spawn_metadata_proxy_dad_failed(self):
242243
self._test_spawn_metadata_proxy(dad_failed=True)
243244

245+
@mock.patch.object(metadata_driver.LOG, 'error')
246+
def test_spawn_metadata_proxy_handles_process_exception(self, error_log):
247+
process_instance = mock.Mock(active=False)
248+
process_instance.enable.side_effect = (
249+
lib_exceptions.ProcessExecutionError('Something happened', -1))
250+
with mock.patch.object(metadata_driver.MetadataDriver,
251+
'_get_metadata_proxy_process_manager',
252+
return_value=process_instance):
253+
process_monitor = mock.Mock()
254+
network_id = 123456
255+
metadata_driver.MetadataDriver.spawn_monitored_metadata_proxy(
256+
process_monitor,
257+
'dummy_namespace',
258+
self.METADATA_PORT,
259+
cfg.CONF,
260+
network_id=network_id)
261+
error_log.assert_called_once()
262+
process_monitor.register.assert_not_called()
263+
self.assertNotIn(network_id, metadata_driver.MetadataDriver.monitors)
264+
244265
def test_create_config_file_wrong_user(self):
245266
with mock.patch('pwd.getpwnam', side_effect=KeyError):
246267
config = metadata_driver.HaproxyConfigurator(_uuid(),

neutron/tests/unit/agent/ovn/metadata/test_driver.py

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,7 @@
1616
import os
1717
from unittest import mock
1818

19+
from neutron_lib import exceptions as lib_exceptions
1920
from neutron_lib import fixture as lib_fixtures
2021
from oslo_config import cfg
2122
from oslo_utils import uuidutils
@@ -112,6 +113,29 @@ def test_spawn_metadata_proxy(self):
112113
run_as_root=True)
113114
])
114115

116+
@mock.patch.object(metadata_driver.LOG, 'error')
117+
def test_spawn_metadata_proxy_handles_process_exception(self, error_log):
118+
process_instance = mock.Mock(active=False)
119+
process_instance.enable.side_effect = (
120+
lib_exceptions.ProcessExecutionError('Something happened', -1))
121+
122+
with mock.patch.object(metadata_driver.MetadataDriver,
123+
'_get_metadata_proxy_process_manager',
124+
return_value=process_instance):
125+
process_monitor = mock.Mock()
126+
network_id = 123456
127+
128+
metadata_driver.MetadataDriver.spawn_monitored_metadata_proxy(
129+
process_monitor,
130+
'dummy_namespace',
131+
self.METADATA_PORT,
132+
cfg.CONF,
133+
network_id=network_id)
134+
135+
error_log.assert_called_once()
136+
process_monitor.register.assert_not_called()
137+
self.assertNotIn(network_id, metadata_driver.MetadataDriver.monitors)
138+
115139
def test_create_config_file_wrong_user(self):
116140
with mock.patch('pwd.getpwnam', side_effect=KeyError):
117141
config = metadata_driver.HaproxyConfigurator(mock.ANY, mock.ANY,

0 commit comments

Comments
 (0)