Bug 1211591 - [SLE15SP3][Salt-minion][SUMA] some unexpected traceback error seen "ModuleNotFoundError: No module named 'salt.ext.six'"
Summary: [SLE15SP3][Salt-minion][SUMA] some unexpected traceback error seen "ModuleNot...
Status: RESOLVED FIXED
: 1211163 1213471 (view as bug list)
Alias: None
Product: PUBLIC SUSE Linux Enterprise Server 15 SP3
Classification: SUSE Linux Enterprise Server
Component: Salt (show other bugs)
Version: SLES15SP3Maint-Upd
Hardware: x86-64 SLES 15
: P5 - None : Normal
Target Milestone: unspecified
Assignee: Pablo Suárez Hernández
QA Contact: E-mail List
URL: https://openqa.suse.de/tests/11175334...
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2023-05-22 11:14 UTC by Richard Fan
Modified: 2024-06-18 12:02 UTC (History)
4 users (show)

See Also:
Found By: openQA
Services Priority:
Business Priority:
Blocker: Yes
Marketing QA Status: ---
IT Deployment: ---


Attachments
salt-minion logs (207.72 KB, text/plain)
2023-05-22 11:14 UTC, Richard Fan
Details

Note You need to log in before you can comment on or make changes to this bug.
Description Richard Fan 2023-05-22 11:14:02 UTC
Created attachment 867146 [details]
salt-minion logs

## Description:

The issue can be found on both sle15sp2 and sle15sp3

The issue starts to show up from salt package updated to 3006 [no such issue at version 3004]

## Step to reproduce the issue:

For now, the issue can be reproduced in openQA automation run and when we check the salt logs we can find the issue everytime.

Please refer to the attached log for detail information, but let me paste some error messages here:

Traceback (most recent call last):
  File "/usr/lib/python3.6/site-packages/salt/loader/lazy.py", line 772, in _load_module
    mod = self.run(spec.loader.load_module)
  File "/usr/lib/python3.6/site-packages/salt/loader/lazy.py", line 1234, in run
    return self._last_context.run(self._run_as, _func_or_method, *args, **kwargs)
  File "/usr/lib/python3.6/site-packages/contextvars/__init__.py", line 38, in run
    return callable(*args, **kwargs)
  File "/usr/lib/python3.6/site-packages/salt/loader/lazy.py", line 1249, in _run_as
    return _func_or_method(*args, **kwargs)
  File "<frozen importlib._bootstrap_external>", line 399, in _check_name_wrapper
  File "<frozen importlib._bootstrap_external>", line 823, in load_module
  File "<frozen importlib._bootstrap_external>", line 682, in load_module
  File "<frozen importlib._bootstrap>", line 265, in _load_module_shim
  File "<frozen importlib._bootstrap>", line 684, in _load
  File "<frozen importlib._bootstrap>", line 665, in _load_unlocked
  File "<frozen importlib._bootstrap_external>", line 678, in exec_module
  File "<frozen importlib._bootstrap>", line 219, in _call_with_frames_removed
  File "/usr/lib/python3.6/site-packages/salt/modules/saltsupport.py", line 41, in <module>
    from salt.cli.support.collector import SaltSupport, SupportDataCollector
  File "/usr/lib/python3.6/site-packages/salt/cli/support/collector.py", line 19, in <module>
    import salt.ext.six as six
ModuleNotFoundError: No module named 'salt.ext.six'

## More detail information.

Please see more discussion at https://suse.slack.com/archives/C02D16TCP99/p1684484361033739

Snip:
----
The bug itself is valid, there is a small regression on a rare salt module (an early feature only shipped in our package, not upstream) that is causing the module not to be available in Salt 3006.0. A customer would only notice this issue in case they have DEBUG log level enabled (as openQA tests does, therefore the failure), or in case they are making use of that particular module (saltsupport). Our understanding is that is very unlikely that a customer could be using this module, as this feature is not really much exposed and there is not much documentation about it.
Our plan, if you agree, would be to ship the fix in 4.3.7, and in the unlikely event of a customer is really using the module, we can provide PTF until 4.3.7.
----

Expect result:

No this traceback logs seen.


## openQA automation test Observation

openQA test in scenario sle-15-SP3-Server-DVD-Updates-x86_64-qam-salt-minion@64bit fails in
[salt_minion](https://openqa.suse.de/tests/11175334/modules/salt_minion/steps/100)

## Test suite description
Testsuite maintained at https://gitlab.suse.de/qa-maintenance/qam-openqa-yml. Maintainer: pdostal@suse.cz, pcervinka@suse.cz


## Reproducible

Fails since (at least) Build [20230518-1](https://openqa.suse.de/tests/11158870)


## Expected result

Last good: [20230517-1](https://openqa.suse.de/tests/11151852) (or more recent)


## Further details

Always latest result in this scenario: [latest](https://openqa.suse.de/tests/latest?arch=x86_64&distri=sle&flavor=Server-DVD-Updates&machine=64bit&test=qam-salt-minion&version=15-SP3)
Comment 1 Pablo Suárez Hernández 2023-06-23 12:35:22 UTC
This is now fixed by: https://github.com/openSUSE/salt/pull/580

It should get released via next MU for Salt in upcoming weeks.

Closing as RESOLVED/FIXED. Thanks!
Comment 2 Richard Fan 2023-06-25 01:06:40 UTC
(In reply to Pablo Suárez Hernández from comment #1)
> This is now fixed by: https://github.com/openSUSE/salt/pull/580
> 
> It should get released via next MU for Salt in upcoming weeks.
> 
> Closing as RESOLVED/FIXED. Thanks!

Thanks, once the package is released, I will remove the 'softfail' tag from our test code as well.
Comment 10 Joachim Gleissner 2023-07-19 14:44:05 UTC
*** Bug 1213471 has been marked as a duplicate of this bug. ***
Comment 11 Victor Zhestkov 2023-07-24 14:18:17 UTC
*** Bug 1211163 has been marked as a duplicate of this bug. ***
Comment 12 Maintenance Automation 2023-08-02 08:45:10 UTC
SUSE-SU-2023:3145-1: An update that solves one vulnerability and has two fixes can now be installed.

Category: security (moderate)
Bug References: 1210994, 1211591, 1211741
CVE References: CVE-2023-28370
Sources used:
openSUSE Leap 15.4 (src): salt-3006.0-150400.8.37.2
openSUSE Leap Micro 5.3 (src): salt-3006.0-150400.8.37.2
openSUSE Leap Micro 5.4 (src): salt-3006.0-150400.8.37.2
SUSE Linux Enterprise Micro for Rancher 5.3 (src): salt-3006.0-150400.8.37.2
SUSE Linux Enterprise Micro 5.3 (src): salt-3006.0-150400.8.37.2
SUSE Linux Enterprise Micro for Rancher 5.4 (src): salt-3006.0-150400.8.37.2
SUSE Linux Enterprise Micro 5.4 (src): salt-3006.0-150400.8.37.2
Basesystem Module 15-SP4 (src): salt-3006.0-150400.8.37.2
Server Applications Module 15-SP4 (src): salt-3006.0-150400.8.37.2
Transactional Server Module 15-SP4 (src): salt-3006.0-150400.8.37.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 13 Maintenance Automation 2023-08-02 08:45:18 UTC
SUSE-SU-2023:3143-1: An update that solves one vulnerability and has two fixes can now be installed.

Category: security (moderate)
Bug References: 1210994, 1211591, 1211741
CVE References: CVE-2023-28370
Sources used:
SUSE Linux Enterprise Micro 5.2 (src): salt-3006.0-150300.53.53.2
SUSE Linux Enterprise Micro for Rancher 5.2 (src): salt-3006.0-150300.53.53.2
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): salt-3006.0-150300.53.53.2
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): salt-3006.0-150300.53.53.2
SUSE Linux Enterprise Real Time 15 SP3 (src): salt-3006.0-150300.53.53.2
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): salt-3006.0-150300.53.53.2
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): salt-3006.0-150300.53.53.2
SUSE Manager Proxy 4.2 (src): salt-3006.0-150300.53.53.2
SUSE Manager Retail Branch Server 4.2 (src): salt-3006.0-150300.53.53.2
SUSE Manager Server 4.2 (src): salt-3006.0-150300.53.53.2
SUSE Enterprise Storage 7.1 (src): salt-3006.0-150300.53.53.2
SUSE Linux Enterprise Micro 5.1 (src): salt-3006.0-150300.53.53.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 14 Maintenance Automation 2023-08-02 08:45:21 UTC
SUSE-SU-2023:3142-1: An update that solves one vulnerability, contains one feature and has four fixes can now be installed.

Category: security (moderate)
Bug References: 1210994, 1211591, 1211741, 1212516, 1212517
CVE References: CVE-2023-28370
Jira References: MSQA-679
Sources used:
SUSE Manager Client Tools for SLE 15 (src): venv-salt-minion-3006.0-150000.3.35.1
SUSE Manager Client Tools for SLE Micro 5 (src): venv-salt-minion-3006.0-150000.3.35.1
SUSE Manager Proxy 4.3 Module 4.3 (src): venv-salt-minion-3006.0-150000.3.35.1
SUSE Manager Server 4.3 Module 4.3 (src): venv-salt-minion-3006.0-150000.3.35.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 15 Maintenance Automation 2023-08-02 08:45:24 UTC
SUSE-SU-2023:3139-1: An update that solves one vulnerability and has two fixes can now be installed.

Category: security (moderate)
Bug References: 1210994, 1211591, 1211741
CVE References: CVE-2023-28370
Sources used:
openSUSE Leap 15.5 (src): salt-3006.0-150500.4.12.2
Basesystem Module 15-SP5 (src): salt-3006.0-150500.4.12.2
Server Applications Module 15-SP5 (src): salt-3006.0-150500.4.12.2
Transactional Server Module 15-SP5 (src): salt-3006.0-150500.4.12.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 16 Maintenance Automation 2023-08-02 08:45:28 UTC
SUSE-SU-2023:3137-1: An update that solves one vulnerability, contains one feature and has five fixes can now be installed.

Category: security (moderate)
Bug References: 1210994, 1211591, 1211741, 1211754, 1212516, 1212517
CVE References: CVE-2023-28370
Jira References: MSQA-679
Sources used:
SUSE Manager Client Tools for RHEL, Liberty and Clones 9 (src): venv-salt-minion-3006.0-1.19.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 17 Maintenance Automation 2023-08-02 08:45:45 UTC
SUSE-SU-202306:15228-1: An update that solves one vulnerability, contains one feature and has five fixes can now be installed.

Category: security (moderate)
Bug References: 1210994, 1211591, 1211741, 1211754, 1212516, 1212517
CVE References: CVE-2023-28370
Jira References: MSQA-679
Sources used:

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 18 Maintenance Automation 2023-08-02 08:45:48 UTC
SUSE-SU-2023:3134-1: An update that solves one vulnerability, contains one feature and has five fixes can now be installed.

Category: security (moderate)
Bug References: 1210994, 1211591, 1211741, 1211754, 1212516, 1212517
CVE References: CVE-2023-28370
Jira References: MSQA-679
Sources used:

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 19 Maintenance Automation 2023-08-02 08:45:51 UTC
SUSE-SU-2023:3132-1: An update that solves one vulnerability, contains one feature and has five fixes can now be installed.

Category: security (moderate)
Bug References: 1210994, 1211591, 1211741, 1211754, 1212516, 1212517
CVE References: CVE-2023-28370
Jira References: MSQA-679
Sources used:

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 20 Maintenance Automation 2023-08-02 08:45:54 UTC
SUSE-SU-2023:3131-1: An update that solves one vulnerability and has two fixes can now be installed.

Category: security (moderate)
Bug References: 1210994, 1211591, 1211741
CVE References: CVE-2023-28370
Sources used:
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): salt-3006.0-150200.101.2
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): salt-3006.0-150200.101.2
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): salt-3006.0-150200.101.2
SUSE Enterprise Storage 7 (src): salt-3006.0-150200.101.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 21 Maintenance Automation 2023-08-02 08:46:00 UTC
SUSE-SU-2023:3129-1: An update that solves one vulnerability, contains one feature and has seven fixes can now be installed.

Category: security (moderate)
Bug References: 1208612, 1210994, 1211591, 1211741, 1211754, 1212516, 1212517, 1213432
CVE References: CVE-2023-28370
Jira References: MSQA-679
Sources used:

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 22 Maintenance Automation 2023-08-02 08:46:03 UTC
SUSE-SU-2023:3128-1: An update that solves one vulnerability, contains one feature and has five fixes can now be installed.

Category: security (moderate)
Bug References: 1210994, 1211591, 1211741, 1211754, 1212516, 1212517
CVE References: CVE-2023-28370
Jira References: MSQA-679
Sources used:
SUSE Manager Client Tools for SLE 12 (src): venv-salt-minion-3006.0-3.33.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 23 Maintenance Automation 2023-08-02 08:46:06 UTC
SUSE-SU-202306:15226-1: An update that solves one vulnerability, contains one feature and has five fixes can now be installed.

Category: security (moderate)
Bug References: 1210994, 1211591, 1211741, 1211754, 1212516, 1212517
CVE References: CVE-2023-28370
Jira References: MSQA-679
Sources used:

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 24 Maintenance Automation 2023-08-02 08:46:09 UTC
SUSE-SU-202306:15225-1: An update that solves one vulnerability, contains one feature and has five fixes can now be installed.

Category: security (moderate)
Bug References: 1210994, 1211591, 1211741, 1211754, 1212516, 1212517
CVE References: CVE-2023-28370
Jira References: MSQA-679
Sources used:

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 25 Maintenance Automation 2023-08-02 08:46:17 UTC
SUSE-SU-2023:3123-1: An update that solves one vulnerability and has two fixes can now be installed.

Category: security (moderate)
Bug References: 1210994, 1211591, 1211741
CVE References: CVE-2023-28370
Sources used:
SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): salt-3006.0-150100.100.2
SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): salt-3006.0-150100.100.2
SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): salt-3006.0-150100.100.2
SUSE CaaS Platform 4.0 (src): salt-3006.0-150100.100.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 26 Maintenance Automation 2023-08-02 08:46:24 UTC
SUSE-SU-202306:15224-1: An update that solves one vulnerability, contains one feature and has seven fixes can now be installed.

Category: security (moderate)
Bug References: 1208612, 1210994, 1211591, 1211741, 1211754, 1212516, 1212517, 1213432
CVE References: CVE-2023-28370
Jira References: MSQA-679
Sources used:

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 27 Maintenance Automation 2023-08-02 12:31:03 UTC
SUSE-SU-202306:15222-1: An update that solves one vulnerability, contains one feature and has seven fixes can now be installed.

Category: security (moderate)
Bug References: 1208612, 1210994, 1211591, 1211741, 1211754, 1212516, 1212517, 1213432
CVE References: CVE-2023-28370
Jira References: MSQA-679
Sources used:

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 30 Maintenance Automation 2023-11-09 08:30:23 UTC
SUSE-RU-2023:4408-1: An update that solves eight vulnerabilities, contains two features and has 48 fixes can now be installed.

Category: recommended (important)
Bug References: 1097531, 1182851, 1186738, 1190781, 1193357, 1193948, 1194632, 1195624, 1195895, 1196050, 1196432, 1197288, 1197417, 1197533, 1197637, 1198489, 1198556, 1198744, 1199149, 1199372, 1199562, 1200566, 1200596, 1201082, 1202165, 1202631, 1203685, 1203834, 1203886, 1204206, 1204939, 1205687, 1207071, 1208691, 1209233, 1210954, 1210994, 1211591, 1211612, 1211741, 1211754, 1212516, 1212517, 1212794, 1212844, 1212855, 1213257, 1213293, 1213441, 1213518, 1213630, 1213926, 1213960, 1214796, 1214797, 1215489
CVE References: CVE-2022-22934, CVE-2022-22935, CVE-2022-22936, CVE-2022-22941, CVE-2022-22967, CVE-2023-20897, CVE-2023-20898, CVE-2023-28370
Jira References: MSQA-706, PED-3139
Sources used:

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.