Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

An openstack cloud definition that is failing (e.g. bad credentials) should not affect other working openstack clouds #380

Open
dbilling opened this issue Jul 15, 2024 · 0 comments
Labels

Comments

@dbilling
Copy link

Jenkins and plugins versions report

Environment
Jenkins: 2.346.4.1
OS: Linux - 4.18.0-513.9.1.el8_9.x86_64
Java: 11.0.16.1 - Eclipse Adoptium (OpenJDK 64-Bit Server VM)
---
ace-editor:1.1
amazon-ecr:1.73.v741d474abe74
analysis-model-api:10.13.0
ansicolor:1.0.2
ant:475.vf34069fef73c
antisamy-markup-formatter:2.7
apache-httpcomponents-client-4-api:4.5.13-138.v4e7d9a_7b_a_e61
artifactory:4.0.6
async-http-client:1.7.24.3
authentication-tokens:1.4
aws-credentials:191.vcb_f183ce58b_9
aws-java-sdk:1.12.246-349.v96b_b_f7eb_a_c3c
aws-java-sdk-cloudformation:1.12.246-349.v96b_b_f7eb_a_c3c
aws-java-sdk-codebuild:1.12.246-349.v96b_b_f7eb_a_c3c
aws-java-sdk-ec2:1.12.246-349.v96b_b_f7eb_a_c3c
aws-java-sdk-ecr:1.12.246-349.v96b_b_f7eb_a_c3c
aws-java-sdk-ecs:1.12.246-349.v96b_b_f7eb_a_c3c
aws-java-sdk-elasticbeanstalk:1.12.246-349.v96b_b_f7eb_a_c3c
aws-java-sdk-iam:1.12.246-349.v96b_b_f7eb_a_c3c
aws-java-sdk-logs:1.12.246-349.v96b_b_f7eb_a_c3c
aws-java-sdk-minimal:1.12.246-349.v96b_b_f7eb_a_c3c
aws-java-sdk-sns:1.12.246-349.v96b_b_f7eb_a_c3c
aws-java-sdk-sqs:1.12.246-349.v96b_b_f7eb_a_c3c
aws-java-sdk-ssm:1.12.246-349.v96b_b_f7eb_a_c3c
aws-secrets-manager-credentials-provider:1.2.0
basic-branch-build-strategies:1.3.2
blueocean:1.25.5
blueocean-autofavorite:1.2.5
blueocean-bitbucket-pipeline:1.25.5
blueocean-commons:1.25.5
blueocean-config:1.25.5
blueocean-core-js:1.25.5
blueocean-dashboard:1.25.5
blueocean-display-url:2.4.1
blueocean-events:1.25.5
blueocean-git-pipeline:1.25.5
blueocean-github-pipeline:1.25.5
blueocean-i18n:1.25.5
blueocean-jira:1.25.5
blueocean-jwt:1.25.5
blueocean-personalization:1.25.5
blueocean-pipeline-api-impl:1.25.5
blueocean-pipeline-editor:1.25.5
blueocean-pipeline-scm-api:1.25.5
blueocean-rest:1.25.5
blueocean-rest-impl:1.25.5
blueocean-web:1.25.5
bootstrap4-api:4.6.0-5
bootstrap5-api:5.1.3-7
bouncycastle-api:2.26
branch-api:2.1046.v0ca_37783ecc5
caffeine-api:2.9.3-65.v6a_47d0f4d1fe
checks-api:1.7.4
cisco-kafka-build-log:1.2.4
cisco-spark-notifier:1.2.0
cloud-stats:254.v47891b_b_5b_6f6
cloudbees-administrative-monitors:1.0.4
cloudbees-analytics:1.42
cloudbees-assurance:2.276.0.23
cloudbees-aws-cli:1.5.20
cloudbees-bitbucket-branch-source:805.v7f97d29dc0f5
cloudbees-blueocean-default-theme:0.8
cloudbees-folder:6.729.v2b_9d1a_74d673
cloudbees-folders-plus:3.28
cloudbees-license:9.68
cloudbees-platform-common:1.17
cloudbees-platform-data:1.27
cloudbees-plugin-usage:2.15
cloudbees-quiet-start:1.7
cloudbees-request-filter:1.8
cloudbees-support:3.29
cloudbees-uc-data-api:4.50
cloudbees-unified-ui:1.21
cobertura:1.17
code-coverage-api:3.0.5
command-launcher:84.v4a_97f2027398
commons-lang3-api:3.12.0-36.vd97de6465d5b_
commons-text-api:1.10.0-27.vb_fa_3896786a_7
config-file-provider:3.10.0
configuration-as-code:1559.v38a_b_2e3b_6b_b_7
conjur-credentials:1.0.12
copyartifact:1.46.4
credentials:1143.vb_e8b_b_ceee347
credentials-binding:523.vd859a_4b_122e6
data-tables-api:1.12.1-2
display-url-api:2.3.6
docker-commons:1.19
docker-workflow:1.29
dtkit-api:3.0.2
durable-task:496.va67c6f9eefa7
echarts-api:5.3.3-1
email-ext:2.90
embeddable-build-status:237.v37e2c03964c9
envinject:2.901.v0038b_6471582
envinject-api:1.199.v3ce31253ed13
extended-read-permission:3.2
favorite:2.4.1
font-awesome-api:6.1.1-1
forensics-api:1.15.1
ghprb:1.42.2
git:4.12.1
git-client:3.12.2
git-server:1.11
git-validated-merge:3.34
github:1.34.5
github-api:1.303-400.v35c2d8258028
github-branch-source:1656.v77eddb_b_e95df
github-pull-request-build:1.15
google-oauth-plugin:1.0.6
gradle:1.39.4
groovy:457.v99900cb_85593
handlebars:3.0.8
handy-uri-templates-2-api:2.1.8-22.v77d5b_75e6953
hashicorp-vault-pipeline:1.4
hashicorp-vault-plugin:336.v182c0fbaaeb7
htmlpublisher:1.30
http_request:1.16
ionicons-api:31.v4757b_6987003
ironfist:2.0.6
ivy:2.2
jackson2-api:2.13.4.20221013-295.v8e29ea_354141
jakarta-activation-api:2.0.1-2
jakarta-mail-api:2.0.1-2
javadoc:217.v905b_86277a_2a_
javax-activation-api:1.2.0-4
javax-mail-api:1.6.2-6
jaxb:2.3.6-1
jdk-tool:1.5
jenkins-design-language:1.25.5
jenkins-usage-logger:4.1.0
jersey2-api:2.36-2
jira:3.7.1
jjwt-api:0.11.5-77.v646c772fddb_0
job-import-plugin:3.6
jobConfigHistory:1176.v1b_4290db_41a_5
jquery-detached:1.2.1
jquery3-api:3.6.0-4
jsch:0.1.55.61.va_e9ee26616e7
junit:1119.1121.vc43d0fc45561
kube-agent-management:1.1.56
kubernetes:3670.v6ca_059233222
kubernetes-cli:1.10.3
kubernetes-client-api:5.12.2-193.v26a_6078f65a_9
kubernetes-credentials:0.9.0
ldap:2.10
lockable-resources:2.18
logstash:2.5.0205.vd05825ed46bd
mailer:435.438.v5b_81173f5b_a_1
mapdb-api:1.0.9.0
mask-passwords:3.3
matrix-auth:3.1.2
matrix-project:772.v494f19991984
maven-plugin:3.19
mercurial:2.16.2
metrics:4.1.6.2
mina-sshd-api-common:2.9.1-44.v476733c11f82
mina-sshd-api-core:2.9.1-44.v476733c11f82
momentjs:1.1.1
monitoring:1.95.0
multibranch-build-strategy-extension:48.v3dc306525d0c
nectar-license:8.41
nectar-rbac:5.75
notification:1.17
oauth-credentials:0.5
oic-auth:2.6
okhttp-api:4.9.2-20211102
openstack-cloud:2.64
operations-center-agent:2.346.0.2
operations-center-client:2.346.0.2
operations-center-context:2.346.0.8
parameterized-scheduler:1.1
pipeline-aws:1.43
pipeline-build-step:488.v8993df156e8d
pipeline-github:2.8-141.7e985db66f30
pipeline-github-lib:38.v445716ea_edda_
pipeline-graph-analysis:195.v5812d95a_a_2f9
pipeline-groovy-lib:593.va_a_fc25d520e9
pipeline-input-step:466.v6d0a_5df34f81
pipeline-milestone-step:101.vd572fef9d926
pipeline-model-api:2.2114.v2654ca_721309
pipeline-model-declarative-agent:1.1.1
pipeline-model-definition:2.2114.v2654ca_721309
pipeline-model-extensions:2.2114.v2654ca_721309
pipeline-multibranch-defaults:2.1
pipeline-rest-api:2.28
pipeline-stage-step:293.v200037eefcd5
pipeline-stage-tags-metadata:2.2114.v2654ca_721309
pipeline-stage-view:2.28
pipeline-utility-steps:2.15.0
plain-credentials:139.ved2b_9cf7587b
plugin-util-api:2.17.0
popper-api:1.16.1-3
popper2-api:2.11.5-2
prism-api:1.28.0-2
pubsub-light:1.16
remoting-security-workaround:1.0
resource-disposer:0.20
run-condition:1.5
saferestart:0.7
scm-api:631.v9143df5b_e4a_a
script-security:1229.v4880b_b_e905a_6
skip-notifications-trait:43.vea_da_7c53b_831
snakeyaml-api:1.30.2-76.vc104f7ce9870
sse-gateway:1.25
ssh-agent:333.v878b_53c89511
ssh-credentials:291.v8211e4f8efb_c
ssh-slaves:1.821.vd834f8a_c390e
sshd:3.242.va_db_9da_b_26a_c3
stashNotifier:1.28
structs:324.va_f5d6774f3a_d
support-core:1241.v32a_39d7032e5
swarm:3.34
synopsys-coverity:3.0.3
thinBackup:1.15
timestamper:1.18
token-macro:308.v4f2b_ed62b_b_16
tpsd-jenkins-plugin:3.0.19
trilead-api:1.67.vc3938a_35172f
unique-id:2.2.1
user-activity-monitoring:1.7
variant:1.4
versioncolumn:2.2
warnings-ng:9.14.0
windows-slaves:1.8.1
workflow-api:1192.v2d0deb_19d212
workflow-basic-steps:980.v82219a_ed188e
workflow-cps:2803.v1a_f77ffcc773
workflow-durable-task-step:1190.vc93d7d457042
workflow-job:1207.ve6191ff089f8
workflow-multibranch:716.vc692a_e52371b_
workflow-scm-step:400.v6b_89a_1317c9a_
workflow-step-api:639.v6eca_cd8c04a_a_
workflow-support:839.v35e2736cfd5c
ws-cleanup:0.43
xunit:3.1.0

What Operating System are you using (both controller, and any agents involved in the problem)?

controller is RHEL8, agents are Ubuntu 22.04

Reproduction steps

  1. Create two openstack cloud definitions, one that has valid credentials and another with invalid credentials (bad password)
  2. Notice that no nodes will launch on the cloud with valid credentials until the cloud definition with invalid credentials is either removed or fixed (credential updated)

Expected Results

One failed openstack cloud should not affect another. So when a credential is bad/expired/whatever for one definition, all the other ones that are correctly provisioned should still work.

Actual Results

When one openstack cloud has a bad credential or is otherwise misconfigured such that nodes are unable to launch, no launches will occur on any of the other openstack clouds on the same jenkins node, even if those are provisioned correctly.

Anything else?

Problem should be easy to reproduce with the information above, but if you need any additional information, please let me know!

Are you interested in contributing a fix?

Happy to help anyway I can.

@dbilling dbilling added the bug label Jul 15, 2024
@dbilling dbilling changed the title An openstack cloud definition that is failing (bad credentials) should not affect other other working openstack clouds An openstack cloud definition that is failing (e.g. bad credentials) should not affect other other working openstack clouds Jul 15, 2024
@dbilling dbilling changed the title An openstack cloud definition that is failing (e.g. bad credentials) should not affect other other working openstack clouds An openstack cloud definition that is failing (e.g. bad credentials) should not affect other working openstack clouds Jul 15, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

1 participant